Escolar Documentos
Profissional Documentos
Cultura Documentos
Developed by:
1. M. Samiullah 021
2. Mubashar Hussain 016
3. Mehmood Latif 013
4. Asad Iqbal 004
Supervised by:
COMSATS Lahore, as a partial fulfillment of the requirements for the award of the
degree of Master of Business Administration
Department of Management Sciences
COMSATS Institute of IT, M.A Jinnah Campus
(2005-2006)
WIRELESS
COMMUNICATION
Contents Page No
1. Dedication…………………………………………………………..01
2. Background…………………………………………………………02
3. Acknowledgement………………………………………………….03
4. Abstract.....................................................................................…….04
5. Introduction………………………………………………….….. 05
6. Introduction to Technology……………………………….……. 06
8. Definition of Wireless………………………………………..……..07
20.
Conclusion…………………………………………………………..15
21. Reference……………………………………………………………
16
Dedication
We dedicate this project to our loving parents whose prayers are always with us.
Furthermore, We confer this project to all the teachers in our whole educational
career. Along with all we, bestow our project to some special personalities, whose
help leaded us towards the completion of this project.
……………………..
……………………..
…………………….
…………………….
…………………….
…………………….
Background
Before we start our project, we take help from different sources like we read the
book ‘Management Information System’ sixth edition by James A.O’Bries, and
one article of “Wireless Security” and Wireless from DAWN news paper, and
Knowledge from our previous semester (IIT), from internet an article on
Introduction of Wireless Communication from
http://scholar.lib.vt.edu/theses/available/etd-04262000-15330030/unrestricted/ch1.pdf.,
and www.itesoftware.com.
Acknowledgement
First of all we are grateful to Almighty Allah, Lord of Creations, of our life and of
everything in the Universe and His Holy Prophet Mohammad (S.A.W) whose
blessings enabled us to perceive and pursuit higher ideas of life, who has given us
the courage insight and knowledge to complete this project.
We would like to acknowledge the help of persons who helped us lot in our
project and in our educational career that is
We would also like to thank “Sir Gulam Rasool” and our fellow “Mr. Ejaz
Maitla” for helping us much in the development of our Concepts of Wireless
Communication and his lots of encouragement, his devotions and his advices in
educational stay during MBA degree.
Abstract
With the expansion of modern technologies, like Computer, Internet, etc great
opportunities have become available for people to come closer. In this day and
age computer is not limited to one roof. Different people have tried to use the
internet for communication in different ways. This facility provides an easy
access to knowledge around the world. In new era it is becoming need of every
one to access the information not only through Internet but also through mobiles
and lot of wireless devices.
Due to the scope of the wireless communication new companies are entering in
the field of wireless communication their main business is not the manufacturing
of wireless devices but the companies are taking keen interest in wireless
products. The research and development on wireless devices is also at peak.
Challenges for the companies are the production of new wireless devices and
other challenge is with low prices. We will study later that the Research and
Development companies are performing well in producing new wireless
technologies at low prices. Security is main problem in wireless communication
but now a day wireless communication is going toward secure communication
media. With the expansion of internet and mobiles the usage of Wireless Medias
has increased. In this way the future of wireless communication is to much bright,
and in future each and every thing will be connected with wireless devices or
channels. Landing on moon was impossible without wireless. That was wireless
communication which makes it easy.
1) Introduction
This project is about wireless communication. In this project we are going discuss
all about wireless communication. Wireless Communication means the
communication or transmission of data through radio waves, microwave, infrared,
and visible light pulses to transport digital communications without wires between
communication devices. So many technologies are in use to communicate without
physical wires. Some major technologies are, Terrestrial Microwave,
Communication Satellites, VSAT (very small aperture terminal), Internet Intranet
Extranet, Wireless LANs, LEO (Low earth orbit), etc. these technologies are
covering different ranges of distances with different frequencies. The wireless
communication is the modern method of communication. Its growth is very high.
Day by day new devices are introducing in the market. Their distance ranges and
data transmission speed and data transmission rate is also increasing. All
computer accessories and electronic devices accessories are converting in wireless
devices, like wireless keyboard, mouse, flash, remote, Bluetooth and infrared in
mobiles and computers, etc. all other electronic and electric devices are in process
to convert in wireless devices, like TV, Refrigerator, Microwave oven, tube lights,
doorbells, etc.
2) Introduction to Technology
Wireless Devices
4) Definition of Wireless
The wireless communication model is more complex because there are more ways
in which the connection could be achieved. The model that we will examine at
this point in time is one which many, possibly the majority of, connections that
take place between the person-in-the-street and some WAP enabled web site will
take place over. That is not to say that this is necessarily the best model from any
particular point of view, just that many connections will be effected in this
manner.
In this model the remote client is a mobile device, but still dials into an RAS
server on some network somewhere. This is likely to be an RAS server hosted and
owned by the network provider, and is therefore likely to be on the network
provider's own local network. The network provider will typically also host the
WAP gateway, and a web server to provide access to the premium rate services
that the network provider offers to their members. If access is required to services
hosted on another server somewhere across the network, then the WAP gateway
will act as a proxy for the client mobile device in establishing the required
sessions with the remote host.
From the point of view of security, this scenario has various implications. WTLS
is the security protocol that will be used to secure communications to and from
the mobile device, but the mobile device's session is necessarily with the WAP
gateway rather than the remote host's web server. At the gateway, the secure
session terminates and all encrypted material is decrypted. Should there be a
requirement for a secure session for communication with the web server, it will be
established by the WAP gateway on behalf of the mobile device. The WAP
gateway will use TLS to establish such a secure session. While TLS is obviously
a robust security protocol, it remains a fact that the secure session is not between
the mobile device and the web server. There are actually two secure sessions in
play: one between the mobile device and the WAP gateway and the other between
the WAP gateway and the web server. This means that there is a security gap, in
which the data is not encrypted, at the WAP gateway.
This gap, and the span of control of the host server and network operator are
below:
Terrestrial Microwave:
Communication Satellites:
Because this is a small satellite system, so people use it to connect their offices,
stores, shops, etc.
These satellites are placed on only 500 miles above the earth. This satellite
normally use for cellular phone companies, paging and messaging services to
mobile users any where on the globe.
Wireless LANs:
Networking in big and small buildings with wires is too much difficult. Because
old buildings have no proper wiring systems. The solution of this problem is
installing wireless LAN, with the use of several technologies like infrared,
Bluetooth, low and high frequency radio technology.
8) Wireless Usage
The communication satellites were used initially for voice and video transmission;
they are now also used for high speed transmission of large volumes of data. The
usage of Wireless communication is rapidly increasing all over the world.
Especially mobile phones and internet have introduced wireless communication
on large scale. In various areas Cardless phones are very famous wireless
communication, where physical phone lines are not available. Now a day
Bluetooth and Infrared in mobile phones is also increment in wireless usage.
Wireless LANs get familiarity, because this is the simple way to interconnect
computers.
9) Wireless Security
Security of applications and computer systems is an issue that, quite rightly, many
IT professionals are concerned about. As corporations have utilized technologies,
such as remote access, Java and component technologies, and infrastructure
advances like the Internet, to facilitate new ways of working, new ways of doing
business with clients, partners and suppliers, and even to create entirely new
products, services and business models, the need for mechanisms to secure
applications, networks and systems has become more and more important.
Before beginning this investigation of WAP security, it is worth noting that there
is no such thing as a secure system. The phrase 'secure system' means one that
cannot be compromised or accessed without authorization. Considering that
hackers who set out to compromise or penetrate systems are resourceful and
always target unexpected aspects of the systems, it would be a brave fool who
declared a system to be immune to attack. What can be said is that a particular
system meets certain predefined security criteria in that it can withstand attacks of
a known type, and is therefore considered secure enough for its intended purpose.
This paper investigates the facilities and technologies that WAP has to offer for
building and deploying secure applications. The presentation itself draws on the
WAP Security chapter of the Wrox book "Professional WAP", and is intended to
pick out some of the highlights from the book. The presentation, and this paper,
do not necessarily provide a full treatment of the subject, or explain all of the
concepts in detail; for that information you will need to read the book.
We are going to begin the investigation of the topic of security with a discussion
of what security is about and why it matters. In this section we will investigate:
The importance of security in mobile applications .The role of security in
protecting data and systems .The basic issues which security solutions of all types
need to address
Security has an obvious role to play with regard to m-commerce and the ability to
secure transactions. Most people are aware of the need for securing information
such as credit card numbers, but the need for security in both the wired and
wireless environments is much broader than that.
Information can also be sensitive. There are many reasons why this may be the
case, ranging from a justifiable desire for privacy to information that is sensitive
on a national security level. Sometimes the sensitivity comes from the content of
the information, at other times the timing of the information. For example, it is
unacceptable to allow some stock market investors to become aware of an
impending profits warning from a company before others, so the information is
regarded as sensitive until it is published formally to all investors.
The power associated with information must also not be underrated. Some
organizations have legal obligations to safeguard certain items of information. In
some cases divisions within organizations are subject to similar constraints. There
are many examples of information that are intrinsically powerful, for example,
information about military weapons.
Along with all of the sensitivity that naturally accompanies information, there is a
growing need to communicate digitally, because of the speed and convenience of
doing so. However, in certain ways these digital communications are more
vulnerable to compromise. Two major weaknesses in digital communications
arise from the fact that it is notoriously easy to intercept digital messages, and the
fact that it is notoriously difficult to establish identity conclusively in an online
environment.
All of this leads us to two inevitable conclusions that drive the need for robust
security implementations: computer systems are critical to the operation of almost
every society on earth; and computer systems are very vulnerable to abuse.
Some years ago wireless devices prices was very high and was not affordable by
individuals or general public. Because small no of devices was available, only
small number of Manufactures were include in research and development of
wireless devices. With the passage of time people knowing that wireless
communication is cheap and easy way to communicate. So large number of
manufacturers have start research on wireless devices. Wireless devices prices are
reducing day by day, due to latest technologies and industrial competition.
b) SENAO
c) SIEMENS
d) MOTOROLA
e) SONY ERICSON\
f) PANASONIC
g) PHILIPS
h) L.G
i) SANDO
j) I.B.M
k) DELL
l) COMAPQ
m) ASUS
n) TOSHIBA
o) SAMSUNG
Due to the scope of the field new companies are entering in the field their main
business is not the manufacturing of these devices but the companies are taking
keen interest in these products.
Presently the company Hyundai entered in the field its basic business is car
manufacturing but due to high return the company has entered in the wireless
communication as well.
16) Wireless Service Companies
COMSAT
Intel-sat
17) Conclusion
18) Reference
1. http://www.asp.net.com
2. http://www.codeproject.com
3. http://scholar.lib.vt.edu/theses/available/etd-04262000-
15330030/unrestricted/ch1.pdf
4. http://www.w3schools.com/wap
5. http://www.microsoft.com
6. http://www.netsec.iseca.org/en/InfromationSecurity.pdf
7. http://www.topxml.com/wap/articles/wap_security/default.asp
8. http://www.cas.mcmaster.ca/~wmfarmer/SE-4C03-01/papers/Zrobok-WAP.html
9. http://www.cellular.co.za/wap_secruity.htm
10. http://www.123wapinfo.com/faqs/security