Transcript and Presenter’s Notes
Title: Thesis Proposal Defense
1
Thesis Proposal Defense
Performance and Reassurance in the Distributed
Wireless Networking Atmosphere
Committee Dr. Andrew Yang Dr. Alfredo
Perez-Davila Ms. Wei Ding
- Presented by
- Karthik Sadasivam
2
Motivation and Background
- Wireless systems are employed in just about any
organization today - Newest fashion in wireless systems is pervasive
and ubiquitous computing serving both
nomadic and glued users anytime and anywhere - 802.11 or Wi-fi standards for Wireless Local
Area Systems ( 802.11a, 802.11b, 802.11g,
802.11i) is most generally present in enterprises
today - Distributed wireless systems are deployed round the
wide geographic area and contain mobile
clients and base stations - Two factors of prime importance of these systems
Performance and Security - Achieving an ideal balance between both of these
factors such systems is definitely an ongoing research
problem
3
Wireless Systems A Taxonomy
- Single-hop cellular systems
- Multi-hop cellular systems
- Random systems
4
Wireless Neighborhood Systems (WLANs)
- A Hidden Lan includes a set
of mobile clients contacting an access
point (AP). - IEEE 802.11 – adopted worldwide standard for
wireless LANs - Transmission speeds not the same as 1 Mbps to 54
Mbps both in the two.4 GHz or 5 GHz frequency
bands - Various standards for IEEE 802.11 802.11a,
802.11b, 802.11g, 802.11i - 802.11 protocol has been seen to obtain vulnerable
to several types of attacks for example DoS, WEP key
vulnerability, rogue APs
5
Ultra WideBand (UWB) Systems
- Latest standard to get the best speed wireless systems
(200-400 Mbps range) - It truly does work impulsively radio (short pulses of
picoseconds duration) as opposed to carrier based
radio - US FCC has allotted a spectrum between 3.1 and
10.6 GHz - Initially it had been present in radar communications
- Current research targets the introduction of
Physical and greater layer protocols because of its use
in WPANs and WMANs (IEEE 802.15 group for WPANs
for PHY layer)
6
Distributed Wireless Systems
- Usage Scenarios enterprise-wide wireless
network management, Battlefield, geographic
survey operations, search and save operations
7
Typical Configurations
- Fixed Entrance – Single Hop Systems
- Fixed path mobile clients
8
Typical Configurations (contd.)
- Fixed Entrance – Single Hop Systems
- Variable path (roaming) mobile clients
9
Typical Configurations (contd.)
- Mobile Access points Multi Hop Systems
10
Performance Factors
- Listed here are factors which affect
performance of wireless systems generally - Amount of nodes Since bandwidth is shared
equally of nodes, the performance and
throughput decreases fat loss nodes type in the
network - The specific protocol Each layer within the
TCP/IP protocol suite adds a distinctive header, which
features a inclination to alter the performance significantly. - The topology In situation in the dynamically altering
topology (for instance, in random systems), the
nodes need to maintain routing tables, that have
to obtain recalculated every time a node leaves a
current network and enters a totally new network
11
Performance Factors (contd.)
- Fixed Entrance – Single Hop Systems
- In addition for that factors as listed above, the
following factors are specific to these kinds of
systems - Within the situation of fixed path clients, the region
within the clients inside the entrance plays an
component in working the performance - Within the situation of roaming mobile clients.
re-authentication is required whenever a client
moves from selecting a one entrance to
enter all of the different another entrance (referred to as
handoff)

12
Performance Factors (contd.)
- Performance in Mobile Entrance – Multi Hop
Systems - The next factors happen to be located to affect
the performance of multi hop wireless systems- - Routing protocols Many of the routing protocols
helpful for random systems demand considerable
bandwidth and power - Node speed With rise in node mobility, the
routing overhead along with the bit error rate increases - Traffic sources In multi hop systems, the
method of getting traffic keeps different constantly. In the
particular instant of energy, once we consider the
bandwidth for your traffic source, it might
not remain constant a duration of time because the
topology changes.
13
Performance Metrics
- Measurement of performance within the wireless network
involves many interdependent factors. We consider
the packet-level metrics just for sake of
simplicity - Finish-to-Finish Throughput – Approach to calculating the amount of
packets effectively transmitted for final
destination per unit time. - Finish-to-Finish Delay – Average time a packet requires to
achieve its destination - Link Utilization – Extended term proportion of energy
or probability there are transmission across the
link. - Packet Loss – Ratio of transmitted packets that
might have been discarded or lost within the
network.
.
14
Security issues
- Within the distributed wireless network made up of
both wireless and wired segments, the threat to
the network is bending. - A few in the threats are common to both wireless
and wired systems for example- - invasion and resource stealing
- traffic redirection
- Denial and services information (DoS)
- Most people are specific to wireless systems for example
Rogue APs, WEP key vulnerability, MAC address
spoofing, etc. - Random systems introduce more security issues in
routing because there are no natural security
mechanisms.
.
15
Security issues (contd.)
- Authentication is among the most significant
security issues for distributed wireless
systems. Listed here are kinds of
authentication methods used - Mutual authentication Both authenticator
along with the user must manage to mutually
authenticate one another, to avoid
threats for example rogue access points. - Self-protecting A hidden node must safeguard
itself from eavesdropping and impersonation - Protected against dictionary attacks
- Secure session keys – Session keys provide
message authentication, confidentiality and
integrity for the user session. - User-level authentication
- Fast re-authentication essential in the issue of
roaming clients
.
16
Security issues (contd.)
- Classification of Authentication methods
- Certificate based methods Such methods use
public key infrastructure (PKI) to authenticate
users. E.g PEAP and EAP - Disadvantage
- price of administration
- provides device authentication as opposed to
user-level authentication - Password based methods They originate from
password authentication mechanism. E.g Ciscos
LEAP - Disadvantage
- weaker to attacks like the
Man-in-the-Middle (MITM)
.
17
Security issues (contd.)
- Reassurance in Fixed Entrance – single hop
systems - Reauthentication could be a major problem such
systems - centralized certificate-based authentication
(RADIUS) - Authentication Way of example EAPOL (EAP over
LAN) used
18
Security issues (contd.)
- Reassurance in Mobile Entrance Multi Hop
Systems - Inter-Entrance authentication essential for
this situation. Inter Entrance Protocol can be utilized
for this reason - Reassurance in routing between mobile hosts-
- No centrally administered secure routers
- No strict security policies
- Highly dynamic nature of MANETs
- Current random protocols trust all participating
nodes.
19
Research Plan
- The study into performance may be
simulation-based - An exam of countless factors affecting the
performance will probably be performed and a lot of important ones
will most likely be derived - Test cases will most likely be attracted of individuals factors
- The main security issues in distributed systems
will most likely be used along with the impact of individuals across the
performance will most likely be examined - The outcome within the security and gratification
analysis easily available cases will most likely be aggregated and
when compared with uncover the tradeoffs between these
two factors, to make certain that the perfect solution might be
achieved.
20
Methods and instrumentation
- Hardware
- Pentium IV or greater machine with 512 MB RAM and
wireless network adapter - ‘cisco’ Wireless Entrance
- Software
- Os’s Home home home windows 2K/ XP, Linux
- Network simulators
- Ns-2
- OPNET
- Programming platform Java SDK 1.4.2
- ‘cisco’ Aironet client utility (ACU)
21
Acknowledgements
My sincere because of Dr. Andrew Yang for his
guidance and support along with the NSF for funding my
position
22
Thanks!
- Questions?
PowerShow.com could be a leading presentation/slideshow discussing website. When the application is business, how-to, education, medicine, school, church, sales, marketing, online training or entertainment, PowerShow.com is a great resource. And, on top of this, almost all its awesome features is free of charge and simple to use.
You should utilize PowerShow.com to uncover and download example online PowerPoint ppt presentations on almost any subject imaginable so that you can learn to improve your own slides and presentations free of charge. Or apply it to uncover and download high-quality how-to PowerPoint ppt presentations with highlighted or animated slides which will educate you the way some factor new, additionally free. Or apply it to upload your own personal PowerPoint slides so that you can share all of them your teachers, class, students, bosses, employees, customers, potential investors or possibly the planet. Or apply it to produce really awesome photo slideshows – with 2D and 3D transitions, animation, and selecting a music – you can tell your Facebook buddies or Google+ circles. That’s all free too!
For his or her fee you are getting the industry’s best online privacy or freely promote your presentations and slide shows wealthy in the search engines rankings. But furthermore compared to that it’s free. We’ll even convert your presentations and slide shows towards the universal Flash format wonderful their original multimedia glory, including animation, 2D and 3D transition effects, embedded music or any other audio, or even video part of slides. All free of charge. Many of the presentations and slideshows on PowerShow.com can watch, nearly all are free of charge to download. (You might decide should you allow people to download your original PowerPoint presentations and photo slideshows for their fee reely or by no means.) Take a look at PowerShow.com today – free of charge. There’s truly something for everybody!
presentations free of charge. Or apply it to uncover and download high-quality how-to PowerPoint ppt presentations with highlighted or animated slides which will educate you the way some factor new, additionally free. Or apply it to upload your own personal PowerPoint slides so that you can share all of them your teachers, class, students, bosses, employees, customers, potential investors or possibly the planet. Or apply it to produce really awesome photo slideshows – with 2D and 3D transitions, animation, and selecting a music – you can tell your Facebook buddies or Google+ circles. That’s all free too!
For his or her fee you are getting the industry’s best online privacy or freely promote your presentations and slide shows wealthy in the search engines rankings. But furthermore compared to that it’s free. We’ll even convert your presentations and slide shows towards the universal Flash format wonderful their original multimedia glory, including animation, 2D and 3D transition effects, embedded music or any other audio, or even video part of slides. All free of charge. Many of the presentations and slideshows on PowerShow.com can watch, nearly all are free of charge to download. (You might decide should you allow people to download your original PowerPoint presentations and photo slideshows for their fee reely or by no means.) Take a look at PowerShow.com today – free of charge. There’s truly something for everybody!