Você está na página 1de 18

COMSATS Institute of Information Technology

M.A. Janah Campus, Lahore

Subject: Management Information System

Project Topic: Wireless Communication

Developed by:

1. M. Samiullah 021
2. Mubashar Hussain 016
3. Mehmood Latif 013
4. Asad Iqbal 004
Supervised by:

Sir Sameer Mahyudin


 
A DISSERTATION SUBMITTED TO THE DEPARTMENT OF MANAGEMENT
SCIENCES,

COMSATS Lahore, as a partial fulfillment of the requirements for the award of the
degree of Master of Business Administration
Department of Management Sciences
COMSATS Institute of IT, M.A Jinnah Campus

(2005-2006)

WIRELESS
COMMUNICATION
 

Contents Page No

1. Dedication…………………………………………………………..01

2. Background…………………………………………………………02

3. Acknowledgement………………………………………………….03

4. Abstract.....................................................................................…….04

5. Introduction………………………………………………….….. 05

6. Introduction to Technology……………………………….……. 06

7. Introduction to Wireless Communication……………….……….06

8. Definition of Wireless………………………………………..……..07

9. Wireless Communication Model……………………………..……07

10. Wireless Communication Technologies……………………..……08

11. Wireless Usage……………………………………………..


……….10

12. Wireless Security…………………………………………..……….10


13. Security about……………………………………………….……...11

14. Role of Security…………………………………………………….11

15. Wireless Devices…………………………………………….


……...13

16. Wireless Prices……………………………………………….


……..14

17. Wireless Devices Availability………………….…………………..14

18. Wireless Devices Manufacturers………………………….………14

19. Wireless Service Companies………………………………………15

20.
Conclusion…………………………………………………………..15

21. Reference……………………………………………………………
16

 
Dedication

We dedicate this project to our loving parents whose prayers are always with us.
Furthermore, We confer this project to all the teachers in our whole educational
career. Along with all we, bestow our project to some special personalities, whose
help leaded us towards the completion of this project.

……………………..

……………………..

…………………….

…………………….

…………………….

…………………….

 
Background

Before we start our project, we take help from different sources like we read the
book ‘Management Information System’ sixth edition by James A.O’Bries, and
one article of “Wireless Security” and Wireless from DAWN news paper, and
Knowledge from our previous semester (IIT), from internet an article on
Introduction of Wireless Communication from
http://scholar.lib.vt.edu/theses/available/etd-04262000-15330030/unrestricted/ch1.pdf.,
and www.itesoftware.com.

 
Acknowledgement

First of all we are grateful to Almighty Allah, Lord of Creations, of our life and of
everything in the Universe and His Holy Prophet Mohammad (S.A.W) whose
blessings enabled us to perceive and pursuit higher ideas of life, who has given us
the courage insight and knowledge to complete this project.

We would like to acknowledge the help of persons who helped us lot in our
project and in our educational career that is

“Sir Sameer Mohyudin” for supervising in this project

We would also like to thank “Sir Gulam Rasool” and our fellow “Mr. Ejaz
Maitla” for helping us much in the development of our Concepts of Wireless
Communication and his lots of encouragement, his devotions and his advices in
educational stay during MBA degree.

 
Abstract
With the expansion of modern technologies, like Computer, Internet, etc great
opportunities have become available for people to come closer. In this day and
age computer is not limited to one roof. Different people have tried to use the
internet for communication in different ways. This facility provides an easy
access to knowledge around the world. In new era it is becoming need of every
one to access the information not only through Internet but also through mobiles
and lot of wireless devices.

In the present century the advancement of technology is at peak. New


technologies are introducing day by day. Wireless Communication is the modern
shape of physical wire communication Medias.

New inventions of wireless communication devices are occurring day by day.


Existing devices are also performing well. In simple words a revolution of
wireless communication has starts.

Due to the scope of the wireless communication new companies are entering in
the field of wireless communication their main business is not the manufacturing
of wireless devices but the companies are taking keen interest in wireless
products. The research and development on wireless devices is also at peak.
Challenges for the companies are the production of new wireless devices and
other challenge is with low prices. We will study later that the Research and
Development companies are performing well in producing new wireless
technologies at low prices. Security is main problem in wireless communication
but now a day wireless communication is going toward secure communication
media. With the expansion of internet and mobiles the usage of Wireless Medias
has increased. In this way the future of wireless communication is to much bright,
and in future each and every thing will be connected with wireless devices or
channels. Landing on moon was impossible without wireless. That was wireless
communication which makes it easy.

 
 1) Introduction

This project is about wireless communication. In this project we are going discuss
all about wireless communication. Wireless Communication means the
communication or transmission of data through radio waves, microwave, infrared,
and visible light pulses to transport digital communications without wires between
communication devices. So many technologies are in use to communicate without
physical wires. Some major technologies are, Terrestrial Microwave,
Communication Satellites, VSAT (very small aperture terminal), Internet Intranet
Extranet, Wireless LANs, LEO (Low earth orbit), etc. these technologies are
covering different ranges of distances with different frequencies. The wireless
communication is the modern method of communication. Its growth is very high.
Day by day new devices are introducing in the market. Their distance ranges and
data transmission speed and data transmission rate is also increasing. All
computer accessories and electronic devices accessories are converting in wireless
devices, like wireless keyboard, mouse, flash, remote, Bluetooth and infrared in
mobiles and computers, etc. all other electronic and electric devices are in process
to convert in wireless devices, like TV, Refrigerator, Microwave oven, tube lights,
doorbells, etc.

The major problem in wireless communication is security. The channels of


wireless communication are microwaves, radio waves, and infrared. Hackers can
easily catch these waves and read information including in these waves. When
customers buy products via internet and mobiles, there are so many chances of
hacking their credit card numbers, because these numbers go through wireless
satellites or wireless boosters. Security has an obvious role to play with regard to
m-commerce and the ability to secure transactions. Most people are aware of the
need for securing information such as credit card numbers, but the need for
security in both the wired and wireless environments is much broader than that.

There is large variety of wireless communication devices available. Numbers of


devices are increasing day by day. Wireless manufacturers are spending more and
more money on research and development of wireless devices. They are trying to
connect each and every electronic and electric device in wireless device.

 
2) Introduction to Technology

Technology is the technical means people use to improve their surroundings. It is


also knowledge of using tools and machines to do tasks efficiently.

We use technology to control the world in which we live. Technology is people


using knowledge, tools, and systems to make their lives easier and better.

People use technology to improve their ability to do Work. Through technology,


people communicate better. Technology allows them to make more and better
products. Our buildings are better through the use of technology. We travel in
more comfort and speed as a result of technology. Yes, technology is every where
and can make life better.

3) Introduction to Wireless Communication

Wireless means the communication or transmission of data through radio waves,


microwave, infrared, and visible light pulses to transport digital communications
without wires between communication devices. Wireless usage is increasing day
by day. Now there are so many wireless manufacturers are producing wireless
devices, like Sony, Samsung, Ericsson, Nokia, LG, Panasonic, etc. The prices of
wireless devices are also reducing day by day. Because there is industrial
competition is increasing day by day. The wireless devices are covering different
distance ranges, like home usage cardless, long range cardless, infrared and
Bluetooth in mobile phones covering different distances with different
frequencies, Mobile telecommunication, etc. now a day the best examples of
wireless communication are terrestrial microwave, communication satellites
cellular and PCS telephone and pager systems, mobile data radio, wireless LANs,
and Internet, Intranet, Extranet, Wireless phones like PTCL and World Call
wireless, etc.

Wireless Devices

   4) Definition of Wireless

“The communication and transmission of data through radio waves, wireless


satellite, Infrared, or with out physical wires is called Wireless
Communication”.

5) Wireless Communication Model

The wireless communication model is more complex because there are more ways
in which the connection could be achieved. The model that we will examine at
this point in time is one which many, possibly the majority of, connections that
take place between the person-in-the-street and some WAP enabled web site will
take place over. That is not to say that this is necessarily the best model from any
particular point of view, just that many connections will be effected in this
manner.

This model is illustrated below:

In this model the remote client is a mobile device, but still dials into an RAS
server on some network somewhere. This is likely to be an RAS server hosted and
owned by the network provider, and is therefore likely to be on the network
provider's own local network. The network provider will typically also host the
WAP gateway, and a web server to provide access to the premium rate services
that the network provider offers to their members. If access is required to services
hosted on another server somewhere across the network, then the WAP gateway
will act as a proxy for the client mobile device in establishing the required
sessions with the remote host.

From the point of view of security, this scenario has various implications. WTLS
is the security protocol that will be used to secure communications to and from
the mobile device, but the mobile device's session is necessarily with the WAP
gateway rather than the remote host's web server. At the gateway, the secure
session terminates and all encrypted material is decrypted. Should there be a
requirement for a secure session for communication with the web server, it will be
established by the WAP gateway on behalf of the mobile device. The WAP
gateway will use TLS to establish such a secure session. While TLS is obviously
a robust security protocol, it remains a fact that the secure session is not between
the mobile device and the web server. There are actually two secure sessions in
play: one between the mobile device and the WAP gateway and the other between
the WAP gateway and the web server. This means that there is a security gap, in
which the data is not encrypted, at the WAP gateway.

This gap, and the span of control of the host server and network operator are
below:

 
 

The host server's span of control is severely compromised in comparison to the


Internet model. In fact, the host has absolutely no control over the security that
exists between the mobile device and the WAP gateway. The host also has limited
control over the TLS session between the WAP gateway and the web server, and
will be limited to providing security that does not exceed a level determined by
the network operator. This may or may not be adequate for the host.

6) Wireless Communication Technologies

In modern age, wireless is a method of communication that uses low-powered


radio waves, microwave, infrared, and visible light pulses to transport digital
communications without wires between communication devices or to transmit
data between devices. This term refers to communication without cables or cords,
chiefly using radio frequency and infrared waves. Now a day every one wants to
communicate without physical channels. Wireless communication is the best way
to communicate without physical channels. Common uses of wireless
communication include the various communications defined by the wireless
networking of computers and many other devices like mobiles, Cardless Phones,
Bluetooth, etc. Low powered radio waves, such as those used in networking to
transmit data between devices, are often unregulated. High powered transmission
sources usually require government licenses to broadcast on a specific
wavelength. This platform has historically carried voice and has grown into a
large industry, carrying many thousands of broadcasts around the world. Radio
waves are now increasingly being used by unregulated computers users. An
optimal bandwidth route within wireless networks requires the calculation in real-
time of the best way to direct traffic. Some major Wireless communication
technologies are:

Terrestrial Microwave:

It include earthbound microwave systems that transmit high speed radio


signals in a signals in a line-of-sight path between relay stations spaced
approximately 30 miles apart. Microwave antennas are usually place on
hights like towers, huge buildings etc. this is a popular medium for long
distance and metropolitan area networks.

 
 

Communication Satellites:

It is also microwave telecommunications medium. Many communications


satellites are placed stationary geosynchronous orbits approximately 24,000 miles
above the equator. Satellites are powered by solar panels and can transmit
microwave signals at a rate of several hundred million bites per second. These
satellites are serving as relay stations for communications signals transmitted
from earth stations. Earth stations use dish antennas to beam microwave signals to
the satellites that amplify and transmit the signals to other earth stations thousands
of miles away.

VSAT (very small aperture terminal)

Because this is a small satellite system, so people use it to connect their offices,
stores, shops, etc.

LEO (Low earth orbit)

These satellites are placed on only 500 miles above the earth. This satellite
normally use for cellular phone companies, paging and messaging services to
mobile users any where on the globe.

Wireless LANs:

Networking in big and small buildings with wires is too much difficult. Because
old buildings have no proper wiring systems. The solution of this problem is
installing wireless LAN, with the use of several technologies like infrared,
Bluetooth, low and high frequency radio technology.

Internet Intranet Extranet:

Wireless access to the internet, intranets, extranets is growing as more Web-


enabled information appliances. Some technologies like pagers, PDAs, and other
portable communications devices have become very thin clients in wireless
networks. The wireless application protocol has encouraged the development of
many wireless Web applications and services. The telecommunication industry is
working on wireless technologies whose goal is to raise wireless transmission
speeds to enable streaming video and multimedia applications on mobile devices.

Internet Communication Model:

A typical example of the Internet communication model is shown in the diagram


below:
7) Wireless

  

8) Wireless Usage

The communication satellites were used initially for voice and video transmission;
they are now also used for high speed transmission of large volumes of data. The
usage of Wireless communication is rapidly increasing all over the world.
Especially mobile phones and internet have introduced wireless communication
on large scale. In various areas Cardless phones are very famous wireless
communication, where physical phone lines are not available. Now a day
Bluetooth and Infrared in mobile phones is also increment in wireless usage.
Wireless LANs get familiarity, because this is the simple way to interconnect
computers.

9) Wireless Security

Security of applications and computer systems is an issue that, quite rightly, many
IT professionals are concerned about. As corporations have utilized technologies,
such as remote access, Java and component technologies, and infrastructure
advances like the Internet, to facilitate new ways of working, new ways of doing
business with clients, partners and suppliers, and even to create entirely new
products, services and business models, the need for mechanisms to secure
applications, networks and systems has become more and more important.

WAP is another technology that extends the reach of communication networks,


provides new opportunities for innovative corporations, and adds to the
complexity of the environment within which applications need to be designed,
built and deployed. There is a set of concerns over how secure WAP is as a
technology, and whether it is robust enough to implement mobile commerce
applications, and other applications with stringent security requirements.

Before beginning this investigation of WAP security, it is worth noting that there
is no such thing as a secure system. The phrase 'secure system' means one that
cannot be compromised or accessed without authorization. Considering that
hackers who set out to compromise or penetrate systems are resourceful and
always target unexpected aspects of the systems, it would be a brave fool who
declared a system to be immune to attack. What can be said is that a particular
system meets certain predefined security criteria in that it can withstand attacks of
a known type, and is therefore considered secure enough for its intended purpose.

If your interest in this paper is to come out with a definitive statement as to


whether WAP is 'secure' or not, you will be disappointed. It is only feasible to
make the assertion that WAP is or is not 'secure enough' for a particular
application when you understand the security requirements of that application, the
environment in which that application is to be deployed, the likelihood that the
application will be subject to attempts to compromise its security, and the nature
of the attempts that are likely to be made. Even then the statement is only valid
until something changes in the environment, or someone discovers a new security
exposure in the network, the environment, the technologies used or the platform
on which the application is deployed.

This paper investigates the facilities and technologies that WAP has to offer for
building and deploying secure applications. The presentation itself draws on the
WAP Security chapter of the Wrox book "Professional WAP", and is intended to
pick out some of the highlights from the book. The presentation, and this paper,
do not necessarily provide a full treatment of the subject, or explain all of the
concepts in detail; for that information you will need to read the book.

10) Security About

We are going to begin the investigation of the topic of security with a discussion
of what security is about and why it matters. In this section we will investigate:
The importance of security in mobile applications .The role of security in
protecting data and systems .The basic issues which security solutions of all types
need to address

11) Role of Security

Security has an obvious role to play with regard to m-commerce and the ability to
secure transactions. Most people are aware of the need for securing information
such as credit card numbers, but the need for security in both the wired and
wireless environments is much broader than that.

At the moment, information often has a commercial value. Many dot-com


organizations make money through the sale or re-sale of information. This is not a
new phenomenon — newspapers have been doing it for centuries — but the new
channels for this kind of commercial activity have lowered the barriers to entry
and increased the amount (and hence the value) of the information available.

Information can also be sensitive. There are many reasons why this may be the
case, ranging from a justifiable desire for privacy to information that is sensitive
on a national security level. Sometimes the sensitivity comes from the content of
the information, at other times the timing of the information. For example, it is
unacceptable to allow some stock market investors to become aware of an
impending profits warning from a company before others, so the information is
regarded as sensitive until it is published formally to all investors.

The power associated with information must also not be underrated. Some
organizations have legal obligations to safeguard certain items of information. In
some cases divisions within organizations are subject to similar constraints. There
are many examples of information that are intrinsically powerful, for example,
information about military weapons.

Along with all of the sensitivity that naturally accompanies information, there is a
growing need to communicate digitally, because of the speed and convenience of
doing so. However, in certain ways these digital communications are more
vulnerable to compromise. Two major weaknesses in digital communications
arise from the fact that it is notoriously easy to intercept digital messages, and the
fact that it is notoriously difficult to establish identity conclusively in an online
environment.

All of this leads us to two inevitable conclusions that drive the need for robust
security implementations: computer systems are critical to the operation of almost
every society on earth; and computer systems are very vulnerable to abuse.

 12) Wireless Devices

There is large variety of wireless devices available in market. Wireless


Communication Devices are increasing day by day. Wireless manufacturers and
R&D companies are spending more and more money on research and
development on wireless devices. They are trying to connect each and every
electronic and electric device through wireless. Some wireless devices are

 13) Wireless Prices

Some years ago wireless devices prices was very high and was not affordable by
individuals or general public. Because small no of devices was available, only
small number of Manufactures were include in research and development of
wireless devices. With the passage of time people knowing that wireless
communication is cheap and easy way to communicate. So large number of
manufacturers have start research on wireless devices. Wireless devices prices are
reducing day by day, due to latest technologies and industrial competition.

14) Wireless Devices Availability

With the increment of wireless devices revolution, the availability of wireless


devices has increased. Large no of wireless devices easily available in markets,
not in all markets but in medium level markets these devices are easily available.
Today our big markets are full with wireless devices. The sale of wireless is also
increasing with the passage of time. Every one wants to communicate through
wireless and every want to install modern wireless networks.

15) Wireless Devices Manufacturers

There are so many companies who are manufacturing so many products of


wireless like. These companies are also in high competition.
a) NOKIA

b) SENAO

c) SIEMENS

d) MOTOROLA

e) SONY ERICSON\

f) PANASONIC

g) PHILIPS

h) L.G

i) SANDO

j) I.B.M

k) DELL

l) COMAPQ

m) ASUS

n) TOSHIBA

o) SAMSUNG

Due to the scope of the field new companies are entering in the field their main
business is not the manufacturing of these devices but the companies are taking
keen interest in these products.

Presently the company Hyundai entered in the field its basic business is car
manufacturing but due to high return the company has entered in the wireless
communication as well.

 
16) Wireless Service Companies

Wireless communication systems are operated by several companies. There are


few biggest companies including

COMSAT

American Mobile Satellite

Intel-sat

THURIAY Satellite Phone.

17) Conclusion

In the present century the advancement of technology is at peak. New


technologies are introducing day by day. Wireless Communication is the
modern shape of physical wire communication Medias. Due to the scope
of the wireless communication new companies are entering in the field of wireless
communication their main business is not the manufacturing of wireless devices
but the companies are taking keen interest in wireless products. The research
and development on wireless devices is also at peak. Challenges for the
companies are the production of new wireless devices and other
challenge is with low prices. From above information we can conclude
that the Research and Development companies are performing well in
producing new wireless technologies at low prices. Security is main
problem in wireless communication but now a day wireless
communication is going toward secure communication media. With the
expansion of internet and mobiles the usage of Wireless Medias has
increased. In this way the future of wireless communication is to much
bright, and in future each and every thing will be connected with
wireless devices or channels. Landing on moon was impossible without
wireless. That was wireless communication which makes it easy.

 
18) Reference
1. http://www.asp.net.com

2. http://www.codeproject.com

3. http://scholar.lib.vt.edu/theses/available/etd-04262000-
15330030/unrestricted/ch1.pdf

4. http://www.w3schools.com/wap

5. http://www.microsoft.com

6. http://www.netsec.iseca.org/en/InfromationSecurity.pdf

7. http://www.topxml.com/wap/articles/wap_security/default.asp

8. http://www.cas.mcmaster.ca/~wmfarmer/SE-4C03-01/papers/Zrobok-WAP.html

9. http://www.cellular.co.za/wap_secruity.htm

10. http://www.123wapinfo.com/faqs/security

Você também pode gostar