Wireless Network Security Nate Arnold GE Transportation

Post on 15-Jan-2016

24 views 0 download

description

Wireless Network Security Nate Arnold GE Transportation. Wireless Networks What are they?. A Wireless Network is a system of physically separated devices which communicate via electronic waves in order to share information. Wireless Networks What’s out there?. - PowerPoint PPT Presentation

Transcript of Wireless Network Security Nate Arnold GE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Network Security

Nate ArnoldGE Transportation

Wireless Network Security

Nate ArnoldGE Transportation

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

What are they?Wireless Networks

What are they?

• A Wireless Network is a system of physically separated devices which communicate via electronic waves in order to share information.

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

What’s out there?Wireless Networks

What’s out there?

• Approximately 50 different types of wireless networks

• Examples– Cell Phones (GSM, 3GS)– UPS & Fed Ex sending messages using GPRS

and CDMA– 802.11 IEEE standards for WLAN– Satellites (Corporate networks, GPS, Iridium)

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Examples of Wireless Networks

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

What we will focus onWireless Networks

What we will focus on

• 802.11 IEEE – Current standards– Security– New and future standards– Examples

• Alternate Wireless Network Standards

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

• Why go wireless?

– Do the benefits outweigh the risks?

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

• Does wireless networking provide business value?

Soft Benefits vs. Hard Benefits

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

Soft Benefits of a WLAN:• Increased flexibility

• Faster decision making

• Higher employee satisfaction

• Greater accuracy of information

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

Real world examples of Soft Benefits • University of Illinois at Chicago Medical Center

– 507 beds, Outpatient Care Center, 715 physicians

– Originally 5 different terminals to carry out jobs

– Difficult for IT Dept. to support multiple devices

– Server based WLAN, and wireless computers improved the quality of the care given to patients

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

Real world examples of Soft Benefits • AOT Financial Services (The Netherlands)

– Amsterdam Options Exchange introduces new electronic trading with wireless access

– AOT provided its traders the with wireless devices and so the ability to make a trade or access market information at the touch of a button

– Results in a 300 percent increase in the speed of trading– 300 percent increase in profits?

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

Problems with Soft Benefits • Difficult if not impossible to quantify

• Hard to justify expenditure

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

Hard Benefits • Dollar amount of cost savings

• Measurable increases in productivity

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

Hard Benefits – Cost savings• Case study of a major national retail chain

with more than 500 stores• Focuses on total cost of ownership of

wireless vs. wired networks in stores • Initial installation, and store

reconfigurations both considered

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

Hard Benefits - Productivity Gains• Intel IT and Intel Finance collaboration• ROI based model based on the standard

discounted cash flow methodology

ROI = (Productivity benefits – Start-up costs – Sustaining costs)

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

Hard Benefits – Productivity Gains• Startup costs and Sustaining costs both

relatively easy to measure

• Converting the perceived value to actual ROI is much more difficult

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

Hard Benefits – Productivity Gains• Method to measure productivity benefits

– WLAN Pilot

• Determine data points

• Establish a baseline

• Segment the users

• Set expectations

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

Hard Benefits – Productivity Gains• Timesavings = Productivity

• Measuring Timesavings– Intel IT asked users how much time they saved

by using the WLAN and took 25 percent of those estimates to use in its ROI equations.

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wireless Networks

The Business CaseWireless Networks

The Business Case

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

WirelessSales

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

7 Security Problems of Wireless Networks7 Security Problems of Wireless Networks

• Easy Access

• Rogue Access Points

• Unauthorized Use of Service

• Service and Performance Constraints

• MAC Spoofing and Session Hi-jacking

• Traffic Analysis and Eavesdropping

• Higher Level of Attacks

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

802.11 Standards compared802.11 Standards compared

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Security Goals of 802.11Security Goals of 802.11

• To protect wireless transmissions that travel over the open radio frequencies.

– Confidentiality: protect data from being intercepted

– Access Control: protect access to private networks

– Data Integrity: prevent tampering with transmitted messages

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

802.11 WEP Design Flaws802.11 WEP Design Flaws

• Weak Authentication– Open System

Authentication

– Shared Key Authentication

– MAC Address Filtering

• Weak Encryption– Keystream Reuse

– Improper Key Management

– Short Encryption Keys

– WEP Packet Checksums are not Secure

– WEP is Turned off by Default

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Solution for Securing 802.11Solution for Securing 802.11

• 802.1X – Mutual Authentication using Extensible

Authentication Protocols (EAP)

• Wi-Fi Protected Access (WPA) – Enhanced encryption that replaces WEP

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

What is EAP?What is EAP?

• EAP stands for Extensible Authentication Protocol that is based on a process rather than an algorithm

• EAP is a one sided authentication protocol

• EAP allows for mutual authentication by running the protocol in both directions

• It is a request-response protocol

• It reduces exposure to key attacks

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

The EAP ProtocolsThe EAP Protocols

• EAP-TLS (Transport Layer Security)– Authentication by digital certificates

• PEAP (Protected EAP)– Server side authentication by digital certificate and

client side by user supplied password

• MD5-CHAP– Client side authentication by hashed password

• LEAP (Lightweight EAP)– Proprietary to Cisco – Mutual Authentication with random rekeying

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

EAP Authentication ProcessEAP Authentication Process

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Wi-Fi Protected Access (WPA)Wi-Fi Protected Access (WPA)

• Specification accepted early part of 2003

• Secure implementations of WPA involve– 802.1x infrastructure

• EAP protocol + RADIUS server

– Software upgrades for clients and Access Points

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

WPA Security EnhancementsWPA Security Enhancements

• 802.1x– EAP Authentication

• Temporal Key Integrity Protocol (TKIP)– Encryption method using 128 bit rekeying

– Allows different client stations to use different keys to encrypt data

– Key generating function that encrypts every data packet with it own unique key

• Message Integrity Code (MIC)– Checksum that prevents message tampering

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

802.11i Standard802.11i Standard

• Approved in August 2004• It incorporates the 802.1x specification• It adds security features

– Temporary Key Integrity Protocol (TKIP)– Advanced Encryption Standard (AES)

• Replacement for WEP• Mathematical ciphering algorithm that uses variable

key lengths (128, 192,256) making it almost impossible to decipher

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Newer StandardsNewer Standards

• 802.20 (MBWA) Mobile Broadband Wireless Access

– IEEE may ratify by the end of this year

– Offers blanket coverage to a large city sized area at speeds of 1.5 mbps

– Requires special hardware at cell transmission sites and client devices containing specialized chips

• 802.16 or Wi-Fi Max– Enables a single base station to support fixed and

mobile devices (30 mile radius/70 mbps)

– DSL providers can use this standard to provide last mile delivery of broadband to homes

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Newer Standards (2)Newer Standards (2)

• 802.11n “mesh networking” - home use

– IEEE expected to ratify this standard late 2005– Wireless transmissions hop from device to

device - Leaps could reach 100-200 mbps– The first TV to accept this standard is expected

to be released in 2006

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

New NetworksNew Networks

• Ultrawideband (UWB) for home use

– Expected to be ratified by IEEE in 2005

– Data transmission rates of 1 gbps

– Shorter transmit range than current Wi-Fi

• Freedom Link by SBC– Combines Wi-Fi and new cellular-data networks

• Voice Over Wi-Fi by Nortel Networks– Makes it possible to use Wi-Fi to make phone calls

over the Web

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

WLAN Security Best PracticesWLAN Security Best Practices

1. Educate Employees

2. Personal Firewalls on Mobile Machines

3. Scan for Rogue APs (ex: Netstumbler)

4. Change Default Passwords on APs

5. Turn on and use WEP

6. Avoid Placing APs near walls or windows

7. Reduce Broadcast Strength

8. Use VPN with secondary authentication

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

WLAN Security Survey

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

IPSec Based VPN

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

IPSec Based VPN

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

MU CampusMU Campus

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

MUnet Wireless LANMUnet Wireless LAN

– IT Services will install a university-wide 802.11 infrastructure over 75% of most heavily trafficked student areas (e.g., study areas, classrooms, and instructional spaces) and over 90% of office and conference areas by June 2005. The residence halls will be the first area to receive the 802.11 infrastructure, with coverage planned for Fall 2004.

– Wireless networking, even with WEP encryption, is inherently insecure. Sensitive data should not be transmitted on a wireless network unless encrypted by the application (e.g. SSL or SSH) or through use of MU's VPN service (see Related Items).

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

MU WiFi SecurityMU WiFi Security

Use the MUVPNhttp://software.muohio.edu/

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

MUnet Wireless LANMUnet Wireless LAN

• Access point connects to the MU network via 10/100MB Ethernet• 802.11b Compliant

– Uses the FCC unlicensed 2.4 GHz radio frequency• MUnet maintains central administrative control• MUnet requests that use of all other 2.4 GHz devices be discontinued in university-owned buildings• Interference: other wireless LAN devices, cordless telephones, cameras, and audio speakers

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

More MU WiFi InfoMore MU WiFi InfoMymiami.muohio.edu

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

What is Netstumbler?What is Netstumbler?

• A Windows utility for 802.11b based wireless network auditing– Compatible with Windows 9x, 2000, and XP

• MiniStumbler– Pocket PC 3.0 and 2002. Supports ARM, MIPS and

SH3 CPU types

• More info at netstumbler.com

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Who might use Netstumbler?Who might use Netstumbler?

• Security team wanting to check that their corporate LAN isn't wide open• Systems admins wanting to check coverage of their Wireless LAN• Gatherers of demographic information about 802.11 popularity• Drive-by snoopers• Overly curious bystanders

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Netstumbler National MapNetstumbler National Map

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

NetstumblerNetstumbler

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Questions?Questions?

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

The following slides include references and extra materialThe following slides include

references and extra material

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Reference MaterialsReference Materials• Securing WI-FI Wireless Networks with Today’s Technologies; WI-FI Alliance, 02/06/03, www.wi-

fi.org

•  Enterprise Solutions for Wireless Lan Security; WI-FI Alliance, 02/06/03,

– www.wi-fi.org

•  Intercepting Mobile Communications: The Insecurity of 802.11 –DRAFT-;Nikita Borisov and David WagnerUC Berkley, Ian Goldberg Zero Knowledge Systems.

•  Wireless Security: The Gaps and How to Fill Them; Jeff Moad, Larry Seltzer, Craig Ellison, Gary Bolles, Eweek Enterprise News & Reviews REPORT, 11/25/03

– http://www.eweek.com/article2/0,4149,1507241,00.asp

•  WPA Wireless Security Offers Multiple Advantages over WEP; Brien M. Posey, 08/20/03, www.techrepublic.com

• How the Wi-Fi Future Might Look; Olga Kharif, Business Week Online, 02/18/04

• Then There’s UWB, WIMAX,wOzNet…; Olga Kharif, Business Week Online, 02/18/04

•  Carnival sees world's largest public Wi-Fi network; Anthony Newman, 02/20/04

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

Reference MaterialsReference Materials• The CIO’s Guide to Mobile Wireless Computing; Citrix; White Paper; 2002 (16)

• Wireless LANs – Linking productivity gains to return on investment; Intel Information Technology; White Paper; December, 2002 (9)

• Assessing the Total Cost of Ownership for Wireless Versus Wired LAN; Syntegra; White Paper; 2003 (6)

• David Spence. Personal Interview. 2/12/04

• Kevin Kessler. Personal Interview. 2/17/04

•  http://ucit.uc.edu/, 2/17/04

•  http://www.netstumbler.com/, 2/17/04

• http://www.nova-data.com/images/, 2/18/04

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY802.16 How It Works802.16 How It Works

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

IEEE 802.16 ProgressIEEE 802.16 Progress

Work on 802.16 started in July 1999. Four years into its mission, the IEEE 802.16 Working Group on Broadband Wireless Access has delivered a base and three follow-on standards.

IEEE 802.16 (“Air Interface for Fixed Broadband Wireless Access Systems”) was approved in December 2001. This standard is for wireless MANs operating at frequencies between 10 and 66 GHz.

IEEE 802.16.2, published in 2001, specifies a “recommended practice” to address the operation of multiple, different broadband systems in the 10-66 GHz frequency range.

In January of this year, the IEEE approved an amendment to 802.16, called 802.16a, which adds to the original standard operation in licensed and unlicensed frequency bands from 2-11 GHz.

802.16c, which was approved in December 2002, is aimed at improving interoperability by specifying system profiles in the 10-66 GHz range.

 

D E P A R T M E N T O FCOMPUTER SCIENCEAND SYSTEMS ANALYSIS

SCHOOL OF ENGINEERING & APPLIED SCIENCEO X F O R D O H I O MIAMIUNIVERSITY

On 11 December 2002, the IEEE Standards Board approved the establishment of IEEE 802.20, the Mobile Broadband Wireless Access (MBWA) Working Group.

•Mission •The mission of IEEE 802.20 is to develop the specification for an efficient packet based air interface that is optimized for the transport of IP based services. The goal is to enable worldwide deployment of affordable, ubiquitous, always-on and interoperable multi-vendor mobile broadband wireless access networks that meet the needs of business and residential end user markets.

MBWA Scope •Specification of physical and medium access control layers of an air interface for interoperable mobile broadband wireless access systems, operating in licensed bands below 3.5 GHz, optimized for IP-data transport, with peak data rates per user in excess of 1 Mbps. It supports various vehicular mobility classes up to 250 Km/h in a MAN environment and targets spectral efficiencies, sustained user data rates and numbers of active users that are all significantly higher than achieved by existing mobile systems

IEEE 802.20 Mission and Project ScopeIEEE 802.20 Mission and Project Scope