Professional Documents
Culture Documents
RAESystemsInc.
PervasiveSensingCompanybased
inSiliconValleyfoundedin1991
Capabilities
Radiationdetection
Gammaandneutron
Chemical/vapordetection
Toxicgas,VOC,combustible
gas,oxygen,CWA,temperature,
humidity,C02
Redeployablesensornetworks
Mobileandfixedwireless
monitors
CargoContainerSensorSystems
Contributors
Eachdotrepresentsonecellphonetower.
Wireless devices circa 1930
ISA Wireless Security, P. Fuhr
SensorMarket:$11Bin2001
Installation(wiring)costs:>$100B
Fragmented market
platform
opportunity
Installation cost limits
penetration
reducing
installation cost
increases market size
Highly Fragmented
Sensor Market
Freedonia Group report on Sensors, April 2002
IndustrialMarketSizing
SensorNetworkingProducts
NorthAmericanMarketforWirelessproductsusedin
Applicationswheretransmissiondistancesare1mileor
less:
LargestApplicationareas:
2002Total:$107million
2006Forecast:$713million
2010Estimates:$2.1billion
2002:TankLevelMonitoring,AssetTracking,Preventative
Maintenance
2006:TankLevelMonitoring,PreventativeMaintenance,
EnvironmentalMonitoring
Conclusions:
RapidGrowthinIndustrialmarkets
TankLevelMonitoringwillremainasignificantopportunity
KeyUserNeeds:
LowerCostsoverWired(orManual)Solutions
EducationofPotentialCustomersontheTechnology
DemonstrationofOperationalReliability&ApplicationDomain
Knowledge
Higher
SPARSE
DENSE
Bluetooth,
802.15.4, WiFi etc
1xRTT, FLEX
SAT, etc
Installation
Costs
3-Yr
TOC $$
$
Lower
Lower
Meters
$
Miles
$$$$$
Whattodowiththedata?
Parameter
ofInterest
Chemical
Electrical
Mechanical
Thermal
Radiation
Optical
Magnetic
MeasurementSystem
Sensor
Modifier
OutputSignal
Output
Transducer
Chemical
Electrical
Mechanical
Thermal
Radiation
Optical
Magnetic
Power
Supply
Great! But how do you get the output signal from the sensor to the location
where the information will be interpreted (used)?
Outline:
1. Security? Who needs it?
2. How is security achieved in a wired channel?
3. The Situation for Wireless (its RF in an industrial setting.
Spectrum, modulation, encryption, spatial)
5. An Integrated Solution
6. The Big Review
Oh,whoneedssecurityina
wirelesschannelanyway!
(prettyridiculousstatementisntit!
ISA Wireless Security, P. Fuhr
10
www.wireless4industrial.org
ISA Wireless Security, P. Fuhr
11
WhatsaWINA?
12
13
StrategyWorkshopParticipants
Suppliers(13)
Systemintegrators(6)
Industrialendusers(10)
Energy/Utilities
Chemicals
Petroleum
ForestProducts
Automotive
Electronics
Industryanalysts/venturecapitalists(3)
Others(associations,government,media,researchers)
14
Dislikes
Change to status quo
Complexity
High cost for coverage in large
plants
Security issues
Portability issues (power)
Unproven reliability
Too risky for process control
Lack of experience in
troubleshooting (staff)
Restricted infrastructure flexibility
once implemented
Lack of analysis tools
15
16
Shutdown
Biz
WLAN
35
23
35
RawThruput
(node/aggr.)
2/5
2.5/2.5
1/4
1/1
1/5
Scalability
(Max.#nodes)
23
DataReliability
15
LowCost
13
23
GatewayTechnology
34
EngineeredSolution
Attributes
Monitor
Control
Latency
23
DeviceReliability
Security
17
IndustrialCyberSecurity
TheCaseofVitekBoden
18
19
Rogue Radio
PLC
PLC
Sewage Plant
ISA Wireless Security, P. Fuhr
20
AFavorite2.4GHzAntenna
21
22
23
The Question:
Who needs security in a wireless channel
anyway!
The Answer:
We do. SoHow do you provide the
appropriate level of security within the
acceptable price and inconvenience margin
-> Risk Management!
ISA Wireless Security, P. Fuhr
24
Insidevs.Outside?
Wheredoattackscomefrom?
% of Respondents
*Source: 2002 CSI/FBI Computer Crime and Security Survey Computer
Security Institute - www.gocsi.com/losses.
ISA Wireless Security, P. Fuhr
25
An Outside Example.
When? April 2001
26
Hacker War I
27
Honker Union
Chinese Hacker Group working to advance
and in some cases impose its political agenda
During the spring of 2001, Honker Union
worked with other groups such as the Chinese
Red Guest Network Security Technology
Alliance
Hackers were encouraged to "...make use of
their skills for China..." Wired.com
Attack Methods:
28
Cyberwar
Cyberattacksandwebdefacements
increaseddramaticallyafterthestartofthe
waragainstIraq.
Morethan1,000siteswerehackedinthe
first48hoursoftheconflict,withmanyof
theattackscontainingantiwarslogans.
Securityconsultantsstatethatthewaragainst
IraqmadeMarchtheworstmonthfordigital
attackssincerecordsbeganin1995.
29
Hacker School
North Korea's Mirim College, is a
military academy specializing in
electronic warfare
100 potential cybersoldiers graduate
every year
30
The Question:
Who needs security in a wireless channel
anyway?
The Answer:
Everyone.
31
Outline:
1. Security? Who needs it?
5. An Integrated Solution
6. The Big Review
32
Afewdetails
LayeredCommunications
33
WiredDataSecurityEncryption
Outline:
1.
2.
3.
4.
5. An Integrated Solution
6. The Big Review
35
From many perspectives, THIS is what a wireless sensor network can provide.
WirelessBuildings
36
Modulation
E(t)=A(t)cos[t+(t)]
AmplitudeModulation(AM)
infoisinA(t)
FrequencyModulation(FM)
infoisin
PhaseModulation(PM)
infoisin(t)
Differentvendorsuse
differentschemesandthey
arenotinteroperable.
Phase=0o
Phase=180o
Phase=360o
(orbackto0o)
Phase=270o
37
TheFCCFrequencyAssignment
Differentvendorsmayuse
differentfrequencieswithin
thevariousISMbands
(greeninthediagram).
TheISMbandsmostcommonlyusedareat433,915and2400MHz.
38
MultipleSensorsSharingtheMedium:
Multiplexing.FDMA,TDMAandCDMA
39
40
NarrowbandorSpreadSpectrum?
Narrowbandusesafixedcarrierfrequency,F 0.
41
NarrowbandorSpreadSpectrum(cont.)?
Frequency Hopping Spread Spectrum. Uses a carrier
frequency that varies with time, F 0(t).
InventedandpatentedbyactressHeddy
LamarrandherpianistGeorgeAntheil.
42
Thereceiverthenlocksontothecarrierfrequency,F 0receivesthesignalandthen
mustundotheinterleaving.
Moredifficulttoimplement(moreexpensive).
Mostcomplicatedscheme(ofthesepresented).
Mostsecuremodulationscheme.
43
DIRECT-SEQUENCE SPREAD-SPECTRUM
SIGNALS
PN Clock
Local PN Clock
Carrier
Wide
BP Filter
Data
Power
Spectral
Density
Local
Carrier
PN Sequence
Generator
PN Sequence
Generator
Power
Spectral
Density
Narrow
BP Filter
Phase
Demod
fc
Narrow spectrum at
output of modulator
before spreading
Frequency
Data
Clock
Power
Spectral
Density
Spread
RFI
RFI
Frequency
Data
fc
Frequency
fc
44
NarrowbandorSpreadSpectrum(cont.)?
Whichisbest?
Eachhasitsplusesandminusesandeachschemehasitsshareofdiehard
advocatesand/ornaysayers!
Differentvendorsusethese
(andother)schemesat
differentfrequencieswithin
thevariousISMbands.
45
Reality
DSSS
FHSS
46
47
TheRFFootprint
NetworkSize
PersonalAreaNetwork:typicalradiatedpower:0dBm,size:10m
LocalAreaNetwork:typicalradiatedpower:20dBm,size:100m
WideAreaNetwork:typicalradiatedpower:>30dBm,size:>2000m
ISA Wireless Security, P. Fuhr
48
NetworkTopologies?
BusNetwork
TreeNetwork
RingNetwork
StarNetwork
ISA Wireless Security, P. Fuhr
Ad Hoc Network
49
50
Real World:
Multipath
The Effect
The Cause
51
Real World:
52
Real World:
53
Real World:
54
Real World:
ALERT! ALERT!!
Notice that the operation at 2.45 GHz is
WORSE than at 900MHz (which is worse
than 433 MHz).
55
Outline:
1. Security? Who needs it?
2. How is security achieved in a wired channel?
3. The Situation for Wireless (its RF in an industrial setting.
Spectrum, modulation, encryption, spatial)
5. An Integrated Solution
6. The Big Review
56
WirelessDataSecurity:Encryption,Spreading,Interleaving
Wirelessnetworksuseavarietyoftechniquestoenhancesecurity,
suchasspreadingandinterleaving.Thesetechniquescanmakethe
signalvirtuallyundetectablewithoutpriorknowledgeaboutthe
network.Thiscanimprovethesecurityofthenetworkbyorders
ofmagnitude.
ISA Wireless Security, P. Fuhr
57
TheWirelessMarket
GRAPHICS INTERNET
SHORT
LONG
TEXT
HI-FI
AUDIO
STREAMING
VIDEO
DIGITAL
VIDEO
MULTI-CHANNEL
VIDEO
802.11b
LAN
ZigBee
LOW
PAN
Bluetooth1
HIGH
58
Bluetoothvs.theRest(contd)
Parameter
Technology
802.11
HomeRF
Bluetooth
2.4 GHz, DSSS2.4GHz, FHSS 2.4 GHz, FHSS
11 chips/bit 50 hops/s
1000+hops/s
Data Rate
11Mbps
1 Mbps
1Mbps
Power
+20 dBm
+20 dBm
0, +20dBm
Range
50m
50m
1-10m, 50m
Topology
128 devices 128 devices 8 devices,
CSMA/CA
CSMA/CA
Piconet
Security
Optional WEP Optional
Encryption
Voice ChannelOptional
Optional
Yes
ZigBee
(proposed)
2.4 GHz,DSSS
15 chips/bit
40 kbits/s
0dBm
100m
100s devices,
CSMA/CA
Not yet
No
59
Side by Side
60
802.11?
61
TheWorldwideViewofthe802.11Spectral
Space
62
63
64
WEP
(encrypted traffic)
Theindustryssolution:WEP(WiredEquivalentPrivacy)
Shareasinglecryptographickeyamongalldevices
Encryptallpacketssentovertheair,usingthesharedkey
Useachecksumtopreventinjectionofspoofedpackets
65
EarlyHistoryofWEP
1997
Mar 2000
Oct 2000
Jan 30, 2001
Feb 5, 2001
ISA Wireless Security, P. Fuhr
SubsequentEvents
Jan 2001
Mar 2001
May 2001
Jun 2001
Aug 2001
Feb 2002
ISA Wireless Security, P. Fuhr
67
68
69
WPADataEncryption
WPAusesTemporalKeyIntegrityProtocol(TKIP)strongerdataencryption,addresses
knownvulnerabilitiesinWEP.
TKIPchosenasprimaryencryptionciphersuiteEasilydeployedand
supportedinlegacy802.11bhardwarecomparedtootheravailablecipher
suites.
TKIPbasedonRC4streamcipheralgorithm,surroundsWEPcipherenginewith4new
algorithms,
1. Extended48bitInitializationVector(IV)andIVsequencingrules(comparedtotheshorter24bitWEPRC4key).
2. Newperpacketkeymixingfunction.
3. Derivationanddistributionmethoda.k.a.rekeying.
4. Amessageintegritycheck(MIC)a.k.a. Michael,ensuresmessageshaventbeentamperedwithduringtransmission.
70
WPADataEncryption,contd
the Temporal Key Integrity Protocol.
Temporal Key
TA
Phase 1
key mixing
Phase 2
key mixing
TTAK Key
TSC
WEP seed(s)
(represented as
WEP IV + RC4
key)
MIC Key
SA + DA +
Plaintext MSDU
Data
MIC
Plaintext
MSDU +
MIC
Fragment(s)
Plaintext
MPDU(s)
WEP
Encapsulation
Ciphertext
MPDU(s)
DA Destination Address
TKIP Temporal Key Integrity Protocol
ICV Integrity Check Value
TSC TKIP Sequence Counter
MPDU Message Protocol Data Unit
TTAK result of phase 1 key mixing of Temporal Key
MSDU MAC Service Data Unit
and Transmitter Address
RSN Robust Security Network
WEP Wired Equivalent Privacy
SA Source Address
WEP IV Wired Equivalent Privacy Initialization Vector
TA Transmitter Address
ISA Wireless Security, P. Fuhr
71
72
Bluetooth?
73
74
PotentialBluetoothMarkets
75
Nov03:100MBluetoothcompliantdevicesworldwide
ISA Wireless Security, P. Fuhr
76
77
Bluetooth Security
Supports Unidirectional or Mutual Encryption based
on a Secret Link key Shared Between Two Devices
Security Defined In 3 modes:
Mode1- No Security
Mode 2 - Service Level Security: Not Established
Before Channel is Established at L2CAP
Mode 3 - Link Level Security: Device Initiates
Security Before LMP Link is Setup
78
BluetoothSecurity
Devices and Services can be Set for Different Levels
of Security
Two Trust Levels are Set for Devices
Trusted Device: Fixed Relationship and
Unrestricted Access to All Services
Untrusted: No Permanent relationship and
Restricted Services
79
BluetoothSecurity
3LevelsofServiceAccess
RequireAuthorizationandAuthenication
RequireAuthenticationOnly
DefaultSecurityforLegacyApplications
80
ButisthisWirelessLinkSecure?
81
High overhead?
82
802.15.4/Zigbee?
83
IEEE802.15.4standard
IncludeslayersuptoandincludingLinkLayerControl
LLCisstandardizedin802.1
SupportsmultiplenetworktopologiesincludingStar,ClusterTreeand
Features
of the MAC:
Mesh
Association/dissociation, ACK, frame
delivery, channel access mechanism,
frame validation, guaranteed time slot
management, beacon management,
channel scan
Low complexity: 26 primitives
versus 131 primitives for 802.15.1
(Bluetooth)
IEEE 802.2
LLC, Type I
IEEE 802.15.4
2400 MHz PHY
84
PHY overview
Speed
20, 40 or 250 kbps
Channels
1 channel in the 868MHz band
10 channels in the 915MHz band
16 channels in the 2.4GHz band
Modulation
BPSK (868MHz/20kbs)
BPSK (915MHz/40kbps)
O-QPSK (2.4GHz/250kbps)
Coexistence w/
802.11b DSSS
802.15.1 FHSS
802.15.3 DSSS
ISA Wireless Security, P. Fuhr
85
MAC overview
Securitysupport
Powerconsumption
consideration
Dynamicchannel
selection
Networktopology
Startopology
p2ptopology
clustertreenetwork
topology
ISA Wireless Security, P. Fuhr
86
Device classification
Full Function Device (FFD)
Any topology
Can talk to RFDs or other FFDs
Operate in three modes
PAN coordinator
Coordinator
Device.
Reduced Function Device (RFD)
Limited to star topology
Can only talk to an FFD
(coordinator)
Cannot become a coordinator
Unnecessary to send large
amounts of data
Extremely simple
Can be implemented using
minimal resources and memory
capacity
ISA Wireless Security, P. Fuhr
87
Transmissionmanagement
Acknowledgement
NoACK
ACK
Retransmission
Duplicatedetection
Indirecttransmission
88
Security
Unsecuredmode
ACLmode
Accesscontrol
Securedmode
Accesscontrol
Dataencryption
Frameintegrity
Sequentialfreshness
89
Scalable Security
Assumetheattackercandeployownnodes(can
createaringatsomedistancefromcontroller)
[Wisenet2003]
Enemynodesmimickthemeshnodes;they
ACKthehealthinquiryasifeverythingwasOK
buttheydonotforwardtotherestofthenet
Therestofthenetworkisvirtuallycutofffrom
inspectionbycontroller
Needsecurekeyandarandomseedthatchanges
ateachround
ISA Wireless Security, P. Fuhr
90
What About:
1451.5?
1xRTT?
SAT?
CDPD?
Others?
No time this morning!
91
Outline:
1. Security? Who needs it?
2. How is security achieved in a wired channel?
3. The Situation for Wireless (its RF in an industrial setting.
Spectrum, modulation, encryption, spatial)
5. An Integrated Solution
6. The Big Review
92
IntegratedIndustrialNetworks?
93
94
IndustrialDeviceNetworks
Generalcharacteristicsforindustrialdevice
networkshavearisen.
95
ClassificationofIndustrial
Networks
Threelogicalgroupingsofinstrumentationnetworksusedinan
industrialsetting.
There are over 100 different proprietary networks in the
field.
96
InsideSecurityIncident
EmployeeattacksPLCinanotherplantarea
overPLChighway.
Passwordchangedtoobscenity,blocking
legitimatemaintenanceandforcingprocess
shutdown.
Plant Highway
Disgruntled
Employee
PLC
Steam Plant
PLC
PLC
PLC
Paper Plant
97
NetworkPositioning
Data
Ethernet TCP/IP
Functionality
DeviceNet
Other CAN
SDS
Complexity
ControlNet
Foundation Fieldbus H2
Profibus-FMS
Profibus-DP
Data Highway+
Interbus-S
Modbus Plus
Remote I/O
Fieldbus H1
Profibus-PA
Modbus
HART
ASi, Seriplex,
Hardwiring, RS485 etc.
Cost
+
98
TooFocusedonInternetIssues?
Myth#1:OurSCADA/PLC/DCSissafeif
wedontconnecttotheInternet.
Myth#2:OurInternetfirewallwillprotect
ourcontrolsystems.
Myth#3:OurITdepartmentunderstands
processcontrolissuesandsecurity.
99
IsIndustrialCommSecurityToo
FocusedonInternetIssues?
Enterprise
Resource Planning
Manufacturing Logistics
Internet
Production
Planning
Firewall
Remote
Engineering
Enterprise Network
Production Networks
Ethernet
Programming Stations
PLC
SCAD
A
Control
Network
PLC
)))))
Handheld
Operator
Terminal
802.11
WLAN
Field Devices
Process
Historian
WarDialing
Attack
Modem
OEM
100
Outline:
1. Security? Who needs it?
2. How is security achieved in a wired channel?
3. The Situation for Wireless (its RF in an industrial setting.
Spectrum, modulation, encryption, spatial)
5. An Integrated Solution
6. The Big Review
101
How Many
Bits are
Needed?
102
103
DirectSequenceSpreadSpectrum
104
Comparing Wireless
Tech.
Range
DSSS
Battery
life
Numbers
InArea
Medium Low
longest
High
FHSS
Long
Short
Medium
UWB
Medium Lowest
short
High
RF
Power
High
105
Attribute
Long Range
Plug-and-Play
Long Battery life
Low RFI risk
Self Locating
Secure
High throughput
non line-of-sight
robust connections
low cost
small size
DSSS
FHSS
UWB
CDMA
TDMA
FDMA
NA
DSSS
FHSS
DSSS
DSSS
UWB
UWB
UWB
DSSS
FHSS
FHSS
NA
CDMA
FDMA
NA
CDMA
CDMA
NA
NA
CDMA
FDMA
TDMA
Technology
Low
Mobile
Power
Ad Hoc Power
Embedded
Designs Networks Harvesting Intelligence Diversity
NA
yes
NA
NA
yes
NA
NA
NA
NA
NA
yes
NA
yes
yes
yes
yes
yes
NA
yes
yes
NA
NA
NA
yes
yes
yes
NA
NA
yes
yes
NA
NA
NA
yes
yes
NA
yes
NA
NA
yes
NA
yes
NA
NA
yes
yes
NA
NA
NA
NA
yes
NA
NA
NA
NA
FEC
yes
NA
yes
NA
NA
NA
yes
NA
yes
NA
NA
BPSK
Open
QPSK
Standards M-ary
900MHz
2.4GHz
5.8GHz
NA
yes
NA
NA
NA
NA
NA
NA
NA
yes
NA
900MHz
NA
900MHz
5.8GHz
5.8GHz
5.8GHz
5.8GHz
900MHz
5.8GHz
900MHz
5.8GHz
NA
NA
M-ary
NA
NA
NA
M-ary
NA
BPSK
BPSK
BPSK
106
% of Respondents
*Source: 2002 CSI/FBI Computer Crime and Security Survey Computer
Security Institute - www.gocsi.com/losses.
ISA Wireless Security, P. Fuhr
107
OptimizationofSecurityvs.Cost
Risk reduction is balanced against the cost of
security counter measures to mitigate the risk.
Cost ($)
Cost of Security
Countermeasures
Cost of Security
Breaches
Security Level
ISA Wireless Security, P. Fuhr
108
109
Firewall Architectures
The external router blocks attempts to use the
underlying IP layer to break security (e.g. IP
spoofing, source routing, packet fragments, etc) and
forces all traffic to the proxy.
The proxy firewall handles potential security holes in
the higher layer protocols.
The internal router blocks all traffic except to the
proxy server.
Internet
External
Router
Internal
Router
110
ThereslotofWireless
FromcellphonestoPDAstoWiFito
Satellitebased
111
WirelessLANStandards
112
Existing/Developing
IEEE802.11Standards
802.11
802.11a
802.11b
802.11e
802.11f
802.11g
802.11h
802.11i
802.1x
802.15
802.16
FrequencyHopping/DSSS
54Mbps/HyperLAN
(1999)11Mbps
QualityofService
Point2PointRoaming
(2003)54Mbps
EuropeanInspiredChanges
(Q2,2004)NewEncryptionProtocols
(Q2,2004)PortBasedNetworkAccess
PersonalAreaNetwork(WPAN)
WirelessMetropolitanAreaNetwork(WMAN)
113
WirelessBackboneforInflightEntertainment
OnBoardNetworkIntegration
PicoCell
BTS
PicoCell
BTS
6 MCU
GSM SERVER
Noise
Floor
Lifter
SDU
ThereslotofWireless
AnditallneedstofeelmoreSecure!
115
Forarealreviewofnetworking
security
TakeEricByrnesISAcourseIC32C
116
WillHistoryRepeat?
Cellular networks
wireless networks
1999 802.11, WEP
1990
TDMA eavesdropping [Bar]
2000
Future: 3rd gen.: 3GPP,
ISA Wireless Security, P. Fuhr
sensor networks
2000
2001
2002
2003 WPA
Future: 802.11i
Proprietary systems
2002
117
PATRIOT Act
PATRIOT (Provide Appropriate Tools
Required to Intercept and Obstruct
Terrorism)
Legally classifies many hacking attacks
as acts of terrorism
118
119
Oh
And dont forget that as you layer in all of
these wacky encryption schemes and
CDMA and DSSS andand that it takes
some joules to actually implement this. So
if your wireless network has primepower
(a.k.a. AC) youre ok. But if youre going
off a battery then its a tradeoff of security
versus Power Consumption You
Choose that one!
ISA Wireless Security, P. Fuhr
120
...andintheend...
...or...
Twopotentialformsofwirelesssensornetworks.
And they should both be secure!
ISA Wireless Security, P. Fuhr
121
Outline:
1. Security? Who needs it?
2. How is security achieved in a wired channel?
3. The Situation for Wireless (its RF in an industrial setting.
Spectrum, modulation, encryption, spatial)
5. An Integrated Solution
6. The Big Review
7. Glossary and References
122
Glossary
10BASET:IEEE802.3standardforatwistedpairEthernetnetwork.10Mbpstransmissionrateoverbasebandusingunshielded,twisted
paircable.
802.11:TheIEEE802.11standarddefinesbothfrequencyhoppinganddirectsequencespreadspectrumsolutionsforuseinthe2.42.5MHz
ISM(Industrial,Scientific,Medical)band.
802.11a:TheGlobalSystemforMobileCommunicationsstandardforworldwidewirelesscommunicationsonwideareanetworks(WANs).
802.11b:Theportionofthe802.11specificationthatdefinesthe11Mbpsdatarate.
A
AccessPoint:ProvidesabridgebetweenEthernetwiredLANsandthewirelessnetwork.Accesspointsaretheconnectivitypointbetween
Ethernetwirednetworksanddevices(laptops,handheldcomputers,pointofsaleterminals)equippedwithawirelessLANadaptercard.
Analogphone:Comesfromtheword"analogous,"whichmeanssimilarto.Intelephonetransmission,thesignalbeingtransmittedfromthe
phonevoice,videoorimageisanalogoustotheoriginalsignal.
AntennaDirectional:Transmitsandreceivesradiowavesoffthefrontoftheantenna.Thepowerbehindandtothesidesoftheantennais
reduced.Thecoverageareaisovalwiththeantennaatoneofthenarrowends.Typicaldirectionalantennabeamwidthanglesarefrom90
(somewhatdirectional)toaslittleas20(verydirectional).Adirectionalantennadirectspowertoconcentratethecoveragepatternina
particulardirection.Theantennadirectionisspecifiedbytheangleofthecoveragepatterncalledthebeamwidth.
AntennaOmnidirectional:Transmitsandreceivesradiowavesinalldirections.Thecoverageareaiscircularwiththeantennaatthecenter.
Omnidirectionalantennasarealsoreferredtoaswhiporlowprofileantennas.
Association:Theprocessofdeterminingtheviabilityofthewirelessconnectionandestablishingawirelessnetwork'srootanddesignated
accesspoints.Amobileunitassociateswithitswirelessnetworkassoonasitispoweredonormovesintorange.
ATM:AsynchronousTransferMode.Atypeofhighspeedwideareanetwork.
ISA Wireless Security, P. Fuhr
123
Glossary
B
Backbone:Anetworkthatinterconnectsothernetworks,employinghighspeedtransmissionpathsandoftenspanningalargegeographic
area.
Bandwidth:Therangeoffrequencies,expressedinhertz(Hz),thatcanpassoveragiventransmissionchannel.Thebandwidthdeterminesthe
rateatwhichinformationcanbetransmittedthroughthecircuit.
BandwidthManagement:FunctionalitythatallocatesandmanagesRFtrafficbypreventingunwantedframesfrombeingprocessedbythe
accesspoint.
BC/MC:Broadcastframes;Multicastframes
Beacon:AuniframesystempacketbroadcastbytheAPtokeepthenetworksynchronized.AbeaconIncludestheNet_ID(ESSID),theAP
address,theBroadcastdestinationaddresses,atimestamp,aDTIM(DeliveryTrafficIndicatorMaps)andtheTIM(TrafficIndicator
Message).
BFAAntennaConnector:MiniaturecoaxialantennaconnectormanufacturedbyMuRataManufacturingCorporation.
Bluetooth:SeeWirelessPersonalAreaNetworks.
Bridge:AdevicethatconnectstwoLANsofthesameordissimilartypes.ItoperatesattheDataLinkLayer,asopposedtorouters.The
bridgeprovidesfastconnectionoftwocollocatedLANsegmentsthatappearasonelogicalnetworkthroughthebridge.
Buffer:Asegmentofcomputermemoryusedtoholddatawhileitisbeingprocessed.
124
Glossary
CAM:ContinuouslyAwareMode:Modeinwhichtheadapterisinstructedtocontinuallycheckfornetworkactivity.
CardandSocketServices:Packagesthatworkwiththehostcomputeroperatingsystem,enablingtheWirelessLANadaptertointerfacewith
hostcomputerconfigurationandpowermanagementfunctions.
CellularPhone:Lowpowered,duplex,radio/telephonethatoperatesbetween800and900MHz,usingmultipletransceiversiteslinkedtoa
centralcomputerforcoordination.Thesites,or"cells,"coverarangeofonetosixormoremilesineachdirection.
Centrex:Businesstelephoneserviceofferedbyalocaltelephonecompanyfromalocaltelephonecompanyoffice.Centrexisbasicallyasingle
linephonesystemleasedtobusinessesasasubstituteforabusinessthatisbuyingorleasingitsownonpremisesphonesystemorPBX.
CDMAandTDMA:TheCodeDivisionMultipleAccessandTimeDivisionMultipleAccessstandardforwirelesscommunicationsonwide
areanetworks(WANs)inNorthAmerica.
Circuitswitching:Theprocessofsettingupandkeepingacircuitopenbetweentwoormoreuserssothatusershaveexclusiveandfulluseof
thecircuituntiltheconnectionisreleased.
Client:Acomputerthataccessestheresourcesofaserver.
Client/Server:Anetworksystemdesigninwhichaprocessororcomputerdesignatedasaserver(suchasafileserverordatabaseserver)
providesservicestootherclientprocessorsorcomputers.
CODEC:CoderDecoder.Audiocompression/decompressionalgorithmthatisdesignedtoofferexcellentaudioperformance.Convertsvoice
signalsfromtheiranalogformtodigitalsignalsacceptabletomoderndigitalPBXsanddigitaltransmissionsystems.Itthenconvertsthose
digitalsignalsbacktoanalogsothatyoumayhearandunderstandwhattheotherpersonissaying.
ComputerTelephonyIntegration:Technologythatintegratescomputerintelligencewithmaking,receiving,andmanagingtelephonecalls.
Computertelephonyintegratesmessaging,realtimeconnectivity,andtransactionprocessingandinformationaccess.
125
Glossary
D
DataTerminal:Computertransmitandreceiveequipment,includingawidevarietyofdumbterminalsorterminalswithoutembedded
intelligenceintheformofprogrammedlogic.Mostdataterminalsprovideauserinterfacetoamorecapablehostcomputer,suchasa
mainframeormidrangecomputer.
Decryption:Decryptionisthedecodingandunscramblingofreceivedencrypteddata.Thesamedevice,hostcomputerorfrontend
processor,usuallyperformsbothencryptionanddecryption.
DesktopConferencing:AtelecommunicationsfacilityorserviceonaPCthatpermitscallersfromseveraldiverselocationstobeconnected
togetherforaconferencecall.
DigitalPhoneSystem:Proprietaryphonesystemprovidedbyavendor,suchasAT&T,Mitel,NorthernTelecom,andsoon.Thesignalbeing
transmittedinadigitalphonesystemisthesameasthesignalbeingtransmittedinananalogphonesystem.Thesystemcanconsistofa
proprietaryPBXsystemthatconvertsvoicesignalsfromtheiranalogformtodigitalsignals,andthenconvertsthosedigitalsignalsbackto
analog.Alternatively,theconversionfromanalogtodigitalcanoccurinadigitalphone.
DirectInwardDialing:DID.Theabilityforacalleroutsideacompanytocallaninternalextensionwithouthavingtopassthroughan
operatororattendant.InlargePBXsystems,thedialeddigitsarepassedfromthePSTNtothePBX,whichthencompletesthecall.
DirectSequence(DS)SpreadSpectrum:Directsequencetransmitsdatabygeneratingaredundantbitpatternforeachbitofinformationsent.
Commonlyreferredtoasa"chip"or"chippingcode,"thisbitpatternnumbers10chipstooneperbitofinformation.Comparedwith
frequencyhopping,directsequencehashigherthroughput,widerrangeandisupgradableinthe2.4GHzband.
DiversityReception:Theuseoftwoantennasattachedtoasingleaccesspointtoimproveradioreception.Thesecondantennaisusedonly
forreceivingradiosignals,whiletheprimaryisusedforbothtransmittingandreceiving.
Driver:Aprogramroutinethatlinksaperipheraldevice,suchasamobileunit'sradiocard,tothecomputersystem.
126
Glossary
ElementlevelManagement:Leveloftechnologiesaimedatsmallormediumsizedbusinesses.
Encryption:Entailsscramblingandcodinginformation,typicallywithmathematicalformulascalledalgorithms,beforetheinformationistransmittedoveranetwork.
Ethernet:Alocalareanetworkusedforconnectingcomputers,printers,workstations,terminals,servers,andsoon,withinthesamebuildingorcampus.Ethernet
operatesovertwistedwireandovercoaxialcableatspeedsupto100Mbps,with1Gbpsspeedscomingsoon.
Filtering:Preventsuserdefinedframesfrombeingprocessedbytheaccesspoint.
FragmentationThreshold:Themaximumsizefordirecteddatapacketstransmittedovertheradio.Largerframesfragmentintoseveralpacketsthissizeorsmallerbefore
transmissionovertheradio.Thereceivingstationreassemblesthetransmittedfragments.
FrameMode:AcommunicationsprotocolsupportedbytheOEMModules.TheframeprotocolimplementsasynchronousserialPointtoPoint(PPP)framessimilarto
thoseusedbyserialInternetprotocols.
FrequencyHopping(FH)SpreadSpectrum:HedyLamarr,theactress,iscreditedinnameonlyforinventingfrequencyhoppingduringWorldWarII.Asitslabel
suggests,frequencyhoppingtransmitsusinganarrowbandcarrierthatchangesfrequencyinagivenpattern.Thereare79channelsina2.4GHzISMband,eachchannel
occupying1MHzofbandwidth.Aminimumhoprateof2.5hopsperchannelpersecondisrequiredintheUnitedStates.Frequencyhoppingtechnologyisrecognized
assuperiortodirectsequenceintermsofechoresistance,interferenceimmunity,costandeaseofinstallation.Todate,therehasalsobeenagreaterselectionofWLAN
productsfromwhichtochose.
FTP(FileTransferProtocol):AcommonInternetprotocolusedfortransferringfilesfromaservertotheInternetuser.ItusesTCP/IPcommands.
Gain,dBi:Antennagain,expressedindecibelsreferencedtoahalfwavedipole.
Gain,dBi:Antennagain,expressedindecibelsreferencedtoatheoreticalisotropicradiator.
Gain,dBic:Antennagain,expressedindecibelsreferencedtoatheoreticalisotropicradiatorthatiscircularlypolarized.
Gatekeeper:Softwarethatperformstwoimportantfunctionstomaintaintherobustnessofthenetwork:addresstranslationandbandwidthmanagement.Gatekeepersmap
LANaliasestoIPaddressesandprovideaddresslookupswhenneeded.
Gateway:OptionalelementinanH.323conference.GatewaysbridgeH.323conferencestoothernetworks,communicationsprotocols,andmultimediaformats.
GatewaysarenotrequiredifconnectionstoothernetworksornonH.323compliantterminalsarenotneeded.
GHz:InternationalunitformeasuringfrequencyisHertz(Hz),whichisequivalenttotheolderunitofcyclespersecond.OneGigahertz(GHz)isonebillionHertz.
Microwaveovenstypicallyoperateat2.45GHz.
GSM:TheGlobalSystemforMobileCommunicationsstandardforworldwidewirelesscommunicationsonwideareanetworks(WANs).
ISA Wireless Security, P. Fuhr
127
Glossary
H.323:AnumbrellastandardfromtheInternationalTelecommunicationsUnion(ITU)thataddressescallcontrol,multimediamanagement,andbandwidthmanagement
forpointtopointandmultipointconferences,aswellasinterfacesbetweenLANsandothernetworks.Themostpopularstandardcurrentlyinuse.
HandheldPC(HPC):ThetermadoptedbyMicrosoftanditssupporterstodescribehandheldcomputersemployingMicrosoft'sWindowsCEoperatingsystem.
InteractiveVoiceResponse:Systemusedtoaccessadatabaseaccessapplicationusingatelephone.Thevoiceprocessingactsasafrontendtoappropriatedatabasesthat
resideongeneralpurposecomputers.Forinstance,DTMF(touchtone)inputofaPersonalIdentificationNumbercanberequiredforaccessormoreunusualand
expensivetechniquessuchasvoicerecognitionandvoiceprintmatching.
Internet:World'slargestnetwork,oftenreferredtoastheInformationSuperhighway.TheInternetisavirtualnetworkbasedonpacketswitchingtechnology.The
participantsontheInternetanditstopologychangeonadailybasis.
InternetCommerce:ElectronicbusinesstransactionsthatoccurovertheInternet.SamplesofInternetcommerceapplicationsincludeelectronicbanking,airline
reservationsystems,andInternetmalls.
InternetPhone:DeviceusedtotransmitvoiceovertheInternet,bypassingthetraditionalPSTNandsavingmoneyintheprocess.AnInternetphonecanbeasmallphone
(suchastheNetVisionPhone)oramultimediaPCwithamicrophone,speaker,andmodem.
Interoperability:Theabilityofequipmentorsoftwaretooperateproperlyinamixedenvironmentofhardwareandsoftware,fromdifferentvendors.Enabledbythe
IEEE802.11openstandard.
IP(InternetProtocol):TheInternetstandardprotocolthatdefinestheInternetdatagramastheunitofinformationpassedacrosstheInternet.Providesthebasisofthe
Internetconnectionlessbesteffortpacketdeliveryservice.TheInternetprotocolsuiteisoftenreferredtoasTCP/IPbecauseIPisoneofthetwofundamentalprotocols.
InternationalRoaming:Abilitytouseoneadapterworldwide.
Intranet:AprivatenetworkthatusesInternetsoftwareandInternetstandards.Inessence,anintranetisaprivateInternetreservedforusebypeoplewhohavebeengiven
theauthorityandpasswordsnecessarytousethatnetwork.
ISDN:IntegratedServicesDigitalNetwork.Emergingnetworktechnologyofferedbylocalphonecompaniesthatisdesignedfordigitalcommunications,computer
telephony,andvoiceprocessingsystems.
ISMBand:ISMbandsinstrumental(902928MHz),science(2.42.4835GHz),andmedical(5.7255.850GHz)aretheradiofrequencybandsallocatedbytheFCCfor
unlicensedcontinuousoperationsforupto1W.ThemostrecentbandapprovedbytheFCCforWLANswasthemedicalbandinJanuary1997.
ITU:InternationalTelecommunicationsUnion.StandardsbodythatdefinedH.323andotherinternationalstandards.
Jitter:Noiseonacommunicationslinewhichisbasedonphasehits,causingpotentialphasedistortionsandbiterrors..
ISA Wireless Security, P. Fuhr
128
Glossary
Kerberos:AwidelydeployedsecurityprotocolthatwasdevelopedattheMassachusettsInstituteofTechnology(MIT)toauthenticateusersandclientsinawired
networkenvironmentandtosecurelydistributeencryptionkeys.
KeyTelephoneSystem:Asysteminwhichthetelephonehasmultiplebuttonspermittingtheusertodirectlyselectcentralofficephonelinesandintercomlines.Key
phonesystemsaremostoftenfoundinrelativelysmallbusinessenvironments,typicallyaround50telephones.
Layer:Aprotocolthatinteractswithotherprotocolsaspartofanoveralltransmissionsystem.
LPD(LinePrinterDaemon):ATCPbasedprotocoltypicallyusedbetweenaUnixserverandaprinterdriver.Dataisreceivedfromthenetworkconnectionandsentout
overtheserialport.
MAC(MediaAccessControl):PartoftheDataLinkLayer,asdefinedbytheIEEE,thissublayercontainsprotocolsforgainingorderlyaccesstocableorwireless
media.
MD5Encryption:AnauthenticationmethodologywhenMUisinforeignsubnet.
MIB(ManagementInformationBase):AnSNMPstructurethatdescribesthespecificdevicebeingmonitoredbytheremotemonitoringprogram.
Microcell:Aboundedphysicalspaceinwhichanumberofwirelessdevicescancommunicate.Becauseitispossibletohaveoverlappingcellsaswellasisolatedcells,
theboundariesofthecellareestablishedbysomeruleorconvention.
Modem:Equipmentthatconvertsdigitalsignalstoanalogsignalsandviceversa.ModemsareusedtosenddigitaldatasignalsovertheanalogPSTN.
MMCXAntennaConnector:Miniaturecoaxialantennaconnectorinusebyseveralmajorwirelessvendors.
MobileIP:TheabilityofthemobileunittocommunicatewiththeotherhostusingonlyitshomeIPaddress,afterchangingitspointofattachmenttotheInternetand
intranet.
MobileUnit(MU):MaybeaSymbolSpectrum24terminal,PCCardandPCIadapter,barcodescanner,thirdpartydevice,andother
MobileUnitMode:Inthismode,theWLANadapterconnectstoanaccesspoint(AP)oranotherWLANinstalledsystem,allowingthedevicetoroamfreelybetweenAP
cellsinthenetwork.Mobileunitsappearasnetworknodestootherdevices.
Modulation:Anyofseveraltechniquesforcombininguserinformationwithatransmitter'scarriersignal.
Multipath:Thesignalvariationcausedwhenradiosignalstakemultiplepathsfromtransmittertoreceiver.
MultipathFading:Atypeoffadingcausedbysignalstakingdifferentpathsfromthetransmittertothereceiverand,consequently,interferingwitheachother.
ISA Wireless Security, P. Fuhr
129
Node:Anetworkjunctionsuchasaswitchoraroutingcenter.
Glossary
PacketSwitching:Referstosendingdatainpacketsthroughanetworktosomeremotelocation.Inapacketswitchednetwork,nocircuitisleftopenonadedicatedbasis.
Packetswitchingisadataswitchingtechniqueonly.
PBXPhoneSystem:PrivateBrancheXchange.Smallversionofthephonecompany'slargercentralswitchingoffice.AnalternativetoaPBXistosubscribetoalocal
telephonecompany'sCentrexservice.
PCMCIA(PersonalComputerMemoryCardInternationalAssociation)PCCard:Acreditcardsizedeviceusedinlaptopcomputersandavailableasremovablenetwork
adapters.
PCS(PersonalCommunicationsService):Anew,lowerpowered,higherfrequencycompetitivetechnologytocellular.Whereascellulartypicallyoperatesinthe800
900MHzrange,PCSoperatesinthe1.5to1.8GHzrange.TheideawithPCSisthatthephonearecheaper,havelessrange,andaredigital.Thecellsaresmallerand
closertogether,andairtimeischeaper.
PeertopeerNetwork:Anetworkdesigninwhicheachcomputersharesandusesdevicesonanequalbasis.
Ping:AtroubleshootingTCP/IPapplicationthatsendsoutatestmessagetoanetworkdevicetomeasuretheresponsetime.
PLD(DataLinkProtocol):ArawpacketprotocolbasedontheEthernetframeformat.Allframesaresenttothewirelessnetworkverbatimshouldbeusedwithcareas
improperlyformatteddatacangothroughwithundesirableconsequences.
PlugandPlay:AfeaturethatallowsacomputertorecognizethePCIadapterandconfigurethehardwareinterrupt,memory,anddevicerecognitionaddresses;requires
lessuserinteractionandminimizeshardwareconflicts.
PocketPC:ThetermadoptedbyMicrosoftanditssupporterstodescribehandheldcomputersemployingMicrosoft'sPocketPCoperatingsystem.
PointofSaleDevice:Aspecialtypeofequipmentthatisusedtocollectandstoreretailsalesdata.Thisdevicemaybeconnectedtoabarcodereaderanditmayquerya
centralcomputerforthecurrentpriceofthatitem.
POTS(PlainOldTelephoneService):Thebasicservicesupplyingstandardsinglelinetelephones,telephonelines,andaccesstothepublicswitchedtelephonenetwork.
PowerManagement:Algorithmsthatallowtheadaptertosleepbetweencheckingfornetworkactivity,thusconservingpower.
PSP(PowerSavePolling):stationspowerofftheirradiosforlongperiods.WhenamobileunitinPSPmodeassociateswithanaccesspoint,itnotifiestheAPofits
activitystatus.TheAPrespondsbybufferingpacketsreceivedfortheMU.
PSTN(PublicSwitchedTelephoneNetwork):Referstotheworldwidevoicetelephonenetworkaccessibletoallthosewithtelephonesandaccessprivileges.IntheU.S.,
thePSTNisprovidedbyAT&T.
ISA Wireless Security, P. Fuhr
130
Glossary
QoS(QualityofService):Measureofthetelephoneservicequalityprovidedtoasubscriber.QoSreferstothingslike:Isthecalleasytohear?Isitclear?Isitloud
enough?
RBOC(RegionalBellOperatingCompany):OneofthesevenBelloperatingcompaniessetupafterthedivestitureofAT&T,eachofwhichowntwoormoreBell
OperatingCompanies(BOCs).
Roaming:Movementofawirelessnodebetweentwomicrocells.Roamingusuallyoccursininfrastructurenetworksbuiltaroundmultipleaccesspoints.
Repeater:Adeviceusedtoextendcablingdistancesbyregeneratingsignals.
Router:Themaindeviceinanymodernnetworkthatroutesdatablocksfromsourcetodestinationusingroutingtablesanddeterminingthebestpathdynamically.It
functionsasanaddressableentityontheLANandisthebasicbuildingblockoftheInternet.
SNMP(SimpleNetworkManagementProtocol):ThenetworkmanagementprotocolofchoiceforTCP/IPbasedintranets.Definesthemethodforobtaininginformation
aboutnetworkoperatingcharacteristics,changeparametersforroutersandgateways.
Scanning:Aperiodicprocesswherethemobileunitsendsoutprobemessagesonallfrequenciesdefinedbythecountrycode.Thestatisticsenableamobileunittore
associatebysynchronizingitsfrequencytotheAP.TheMUcontinuescommunicatingwiththataccesspointuntilitneedstoswitchcellsorroam.
SiteSurvey:Physicalenvironmentsurveytodeterminetheplacementofaccesspointsandantennas,aswellasthenumberofdevicesnecessarytoprovideoptimal
coverage,inaneworexpandinginstallation.
SpreadSpectrum:AtransmissiontechniquedevelopedbytheU.S.militaryinWorldWarIItoprovidesecurevoicecommunications,spreadspectrumisthemost
commonlyusedWLANtechnologytoday.Itprovidessecurityby"spreading"thesignaloverarangeoffrequencies.Thesignalismanipulatedinthetransmittersothat
thebandwidthbecomeswiderthantheactualinformationbandwidth.Despreadingthesignalisimpossibleforthosenotawareofthespreadingparameters;tothem,the
signalsoundslikebackgroundnoise.Interferencefromnarrowbandsignalsisalsominimizedtobackgroundnoisewhenitisdespreadbythereceiver.Twotypesof
spreadspectrumexist:directsequenceandfrequencyhopping.
StreamMode:AcommunicationsprotocolsupportedonlybytheTelnetandTCPprotocols.Streammodetransfersserialcharactersastheyarereceivedbyencapsulating
theminapacketandsendingthemtothehost.
131
Glossary
T1:Atypeofdedicateddigitalleasedlineavailablefromapublictelephoneproviderwithacapacityof1.544Mbps.AT1linecannormallyhandle24voice
conversations,eachonedigitizedat64Kbps.Withmoreadvanceddigitalvoiceencodingtechniques,itcanhandlemorevoicechannels.T1isthestandardfordigital
transmissionintheU.S.Canada,HongKong,andJapan.
TCP/IP:Networkingprotocolthatprovidescommunicationacrossinterconnectednetworks,betweencomputerswithdiversehardwarearchitectures,andvarious
operatingsystems.TCP/IPisusedintheindustrytorefertothefamilyofcommonInternetprotocols.
TCP(TransportCommunicationProtocol):Controlsthetransferofdatafromoneclienttoonehost,providingthemechanismforconnectionmaintenance,flowcontrol,
retries,andtimeouts.
Telnet(TerminalEmulationProtocol):AprotocolthatusestheTCP/IPnetworkingprotocolasareliabletransportmechanism.Consideredextremelystable.
Terminal:Anendpoint,whichprovidesforrealtime,twowaycommunicationswithanotherterminal,gateway,ormobileunit.
TokenRing:Aringtypeoflocalareanetwork(LAN)inwhichasupervisoryframe,ortoken,mustbereceivedbyanattachedterminalorworkstationbeforethat
terminalorworkstationcanstarttransmitting.TokenringisthetechniqueusedbyIBMandothers.
UDP(UserDatagramProtocol):UDP/IPisaconnectionlessprotocolthatdescribeshowmessagesreachapplicationprogramsrunninginthedestinationmachine;
provideslowoverheadandfastresponseandiswellsuitedforhighbandwidthapplications.
VideoConferencing:VideoandaudiocommunicationbetweentwoormorepeopleviaavideoCODEC(coder/decoder)ateitherendandlinkedbydigitalcircuits.
VoiceMailSystem:Deviceorsystemthatrecords,stores,andretrievesvoicemessages.Thetwotypesofvoicemaildevicesarethosewhichare"standalone"andthose
whichoffersomeintegrationwiththeuser'sphonesystem.
WiFi:Alogograntedasthe"sealofinteroperability"bytheWirelessEthernetCompatibilityAlliance(WECA).Onlyselectwirelessnetworkingproductspossessthis
characteristicofIEEE802.11b.
WirelessAPSupport:AccessPointfunctionsasabridgetoconnecttwoEthernetLANs.
132
Glossary
WirelessLocalAreaNetwork(WLAN):AwirelessLANisadatacommunicationssystemprovidingwirelesspeertopeer(PCtoPC,PCtohub,orprintertohub)and
pointtopoint(LANtoLAN)connectivitywithinabuildingorcampus.InplaceofTPorcoaxialwiresoropticalfiberasusedinaconventionalLAN,WLANstransmit
andreceivedataoverelectromagneticwaves.WLANsperformtraditionalnetworkcommunicationsfunctionssuchasfiletransfer,peripheralsharing,email,and
databaseaccessaswellasaugmentingwiredLANs.WLANsmustincludeNICs(adapters)andaccesspoints(inbuildingbridges),andforcampuscommunications
buildingtobuilding(LANLAN)bridges.
WirelessPersonalAreaNetwork(WPAN):PersonalareanetworksarebasedonaglobalspecificationcalledBluetoothwhichusesradiofrequencytotransmitvoiceand
data.Overashortrange,thiscablereplacementtechnologywirelesslyandtransparentlysynchronizesdataacrossdevicesandcreatesaccesstonetworksandtheInternet.
Bluetoothisidealformobileprofessionalswhoneedtolinknotebookcomputers,mobilephones,PDAs,PIMs,andotherhandhelddevicestodobusinessathome,on
theroad,andintheoffice.
WirelessWideAreaNetwork(WWAN):Wideareanetworksutilizedigitalmobilephonesystemstoaccessdataandinformationfromanylocationintherangeofacell
towerconnectedtoadataenablednetwork.Usingthemobilephoneasamodem,amobilecomputingdevicesuchasanotebookcomputer,PDA,oradevicewitha
standaloneradiocard,canreceiveandsendinformationfromanetwork,yourcorporateintranet,ortheInternet.
133
A Few References
Berge J.,"Fieldbuses for Process Control: Engineering, Operation, Maintenance". ISA Press 2002, ISBN 1-55617
Black U., "Physical Level Interfaces and Protocols". IEEE, ISBN 0-8186-8824-6.
Black U., "The V-series recommendations". McGraw-Hill, ISBN 0-07-005592-0.
Bonfig K., "Feldbus-Systeme". Expert Verlag 1992, 3-8169-0771-7.
Borst W., "Der Feldbus in der Maschinen- und Anlagentechnik". Franzis Verlag, ISBN 3-7723-4621-9.
British Standard Institute, "Guide to the evaluation of fieldbus protocols". Report DISC PD0014:2000.
Brown, "The OSI Dictionary of acronyms". McGraw-Hill 1993, ISBN 0-07-057601-7.
Burton, "Fieldbus for Industrial Control Systems". Chapmann & Hall 1997, ISBN 0-412-57890-5.
Centrum voor Micro-elektronica, "Intelligente sensornetwerken". 1993, 1996
Control Engineering, issues of 1994 and 1995, "Fieldbus series".
Dietrich D., "Feldbustechnik in Forschung, Entwicklung und Anwendung". Springer Verlag, 1997.
ETG Fachbericht 37, "Datenbertragung auf Fahrzeugen mittels serieller Bussysteme". VDE Verlag, ISBN 3-80
ETZ Report 27, "Standardisierung der Prozedatenkommunikation". VDE Verlag 1991.
Fachzeitschrift DE, "Bussysteme fr die Gebudeinstallation. Hthig & Pflaum, 1999.
Frber, "Bussysteme - parallele und serielle Bussysteme in Theorie und Praxis". Oldenbourg Verlag, ISBN 3-4
Frankort, "Digitale Communicatie". Delta Press 1989, ISBN 90-6674-726-9.
Gladdis, "How to automate your home". Baran-Harper 1991, ISBN 0-9632170-0-3.
Gruhler, G. "Feldbusse und Gerte-Kommunikationssysteme". Franzis Verlag 2001, ISBN 3-7723-5745-8.
Hill, "A distributed control & diagnostic architecture for railway maintenance". University of South-Carolina 19
Holzmann, "Design and validation of computer protocols". Prentice-Hall, ISBN 0-13-539834-7.
Huber J.,"Industrial Fiber Optic Networks". ISA Press 1995, ISBN 1-55617-521-3-G.
Hulsebos, R., "Veldbussen". Kluwer 1996, ISBN 90-557-6059-5.
IEE, "Colloquium: Fieldbus devices - A changing future". IEE 1994, Ref. 1994/236.
ISA, "Fieldbus Standard for use in industrial control systems". ISA 1993, ISBN 1-55617-317-2.
ISA, "The ISA Fieldbus Guide". ISA 1997, ISBN 1-55617-637-6.
Johannsmeyer, "Investigation into the intrinsic safety of fieldbus systems (FISCO)". PTB, report W53, ISBN 3-8
Jordan, "Serial networked field instrumentation". Wiley 1995, ISBN 0-471-95236-1.
ISA Wireless Security, P. Fuhr
134
References (cont.)
Keithley Instruments, "Demanding measurements on the factory floor".
Kluwer, "Handboek Industrile Netwerken". Kluwer 2000, ISBN 90-5404-628-7.
Kriesel, "Bustechnologien fr die Automation, 2nd Ed.". Hthig Verlag 2000, ISBN 3-7785-2778-9.
Lian, "Performance evaluation of control networks for manufacturing systems". Proceedings of the
ASME
(Dynamics and Control Division), 1999.
Miklovic, "Real-time control networks". ISA 1993, ISBN 1-55617-231-1.
Mikrocentrum Nederland, Syllabi themadagen "Industrile netwerken". 1993-2001.
Newman, "Direct digital control of building systems". Wiley, 1994, ISBN 0-471-51696-1.
Phoenix, "Grundkurs Sensor/Aktor-Feldbustechnik". Vogel Verlag, ISBN 3-8023-1708-4.
Phoenix, "Grundkurs Feldbustechnik". Vogel Verlag 2000, ISBN 3-8023-1813-7.
Phoenix, "Basic course in sensor/actuator fieldbus technology". Vogel Verlag.
Physikalische Technische Bundesanstalt, "Investigations into the intrinsic safety of fieldbus systems".
PTB 1994, ISBN 3-89429-512-0.
Reinert, "Sichere Bussysteme fr die Automation" Hthig Verlag 2001, ISBN 3-7785-2797-5.
Reienweber B., "Feldbussysteme". Oldenbourg Verlag, 2002, ISBN 3-486-24536-8.
Rikkert de Koe, "OSI-Protocollen lagen 1 t/m 4". Kluwer Telematica, ISBN 90-201-2388-2.
Rosch, "Gebudesystemtechnik: Datenubertragung auf dem 230V Netz". Verlag Moderne Industrie
1998, ISBN 3-478-93185-1.
Scherff, B. "Feldbussysteme in der Praxis". Springer Verlag 1999, ISBN 3-540-63880-6.
Schnell, G. "Bussysteme in der Automatisierungs- and Prozesstechnik" (4th Ed.). Vieweg Verlag 2000,
ISBN 3-528-36569.
Svacina, "Understanding Device Level Buses". Turck.
Thompson, "Industrial Data Communications: Fundamentals And Applications" 3rd Edition. ISA Press
2002, ISBN 1-55617-767-4-G.
Texas Instruments, "RS422 and RS485 Application Guide".
VDI/VDE, "Richtlinien 3687: Auswahl von Feldbussysteme durch Bewertung ihrer
Leistungseigenschaften fr verschiedene Anwendungsbereiche". VDI/VDE, 1997.
Wittgruer, F. "Digitale Schnittstellen und Bussysteme". Vieweg Verlag 1999.
Wrobel, "Optische bertragungstechnik in der Praxis, 2nd Ed.". Hthig Verlag 1998, ISBN 3-7785ISA Wireless Security, P. Fuhr
2638-3.
135
Questions?
Comments?
136