Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.



Published on

this power point is on the topic wireless data transfer..also known as gigabit technology..a future in wireless world.

Published in: Entertainment & Humor
  • Login to see the comments


  2. 2. The Wireless Gigabit Alliance(also known as the WiGig)Operates on unlicensed 60 GHz frequency band.Allows wireless transfer of audio and video data at up to 7Gb persecond.Transfer data within an indoor environment usually within a range of10ms.
  3. 3. Two types of modulation and coding schemesOrthogonal frequency-division multiplexing (OFDM)supports communication over longer distances with greater delay spreadsproviding more flexibility in handling obstacles and reflected signals.OFDM allows the greatest transmission speeds of up to 7 Gbps.Single carrier (SC)Typically results in lower power consumption, so it is often a better fit for small, low-powerhandheld devices.SC supports transmission speeds up to 4.6 Gbps.
  4. 4. Enables use of previously unavailable wide band
  5. 5. 60 GHz SPECTRUM ALLOCATION Millimeter Wave Band57 GHZ 66 GHZ Europe : 57-66 USA and Canada : 57-64 Japan : 59-66 Australia : 59.4-62.9 7
  6. 6. Sync & Go Wireless IO 10-30sec SD clip/movieCE <5m; <1Gbps Clips Peer2Peer <1min 4GB Flash Gigabit WLAN 60GWireless “HDMI” WiFi
  7. 7.  IEEE 802.11 ad  State-of-the-art PHY/MAC standardization activities o improve WLAN data rate to MGbps  Dominated by Intel, Broadcom, NEC etc. WiGig (Wireless Gigabit Alliance)  60-GHz Industry alliance led by Intel  Promoters include Intel, Broadcom, NEC, Apple, Dell, Microsoft, Panasonic, LGE, Toshiba, Wilocity, etc. IEEE 802.15.3c (First IEEE standard on 60 GHz WPAN)  Promoted mainly by Japanese companies ECMA TC48  European standardization for 60 GHz WPAN WirelessHD 9
  8. 8. o To overcome signal decay, WiGig uses a process called adaptive beamforming .I. The antennas do this by adjusting both the amplitudes and the phase shifts of their broadcasted waves.II. The reception of the signal is optimized by minimizing different kinds of problems: the error between the antennas output and the expected signal.
  9. 9. WIRED EQUIVALENT PRIVACY (WEP) RC4 This algorithm is used for confidentiality WEP CRC-32 Wired equivalent privacy This is used for integrity
  10. 10. 64 bit standard WEP key 40 bit key 24 bit initial vector RC4 traffic keyA 128-bit WEP key is almost always entered by users as a string of 26hexadecimal characters. Each character represents four bits of the key.
  11. 11.  WEP is a protocol that adds security to wireless local area networks. WEP gives wireless networks the equivalent level of privacy protection as a comparable wired network. WEP offers interoperability, since all wireless devices support basic WEP encryption. Another advantage of WEP is that when uses happen to see your network during wireless detection, they will mostly likely be discouraged since it will require a key. This makes users that they are not welcome. Hence network is secure.
  12. 12. Key size is one of the security limitations in Wired Equivalent Privacy.Cracking a longer key requires interception of more packets, butthere are active attacks that simulate the necessary traffic.The other weaknesses in Wired Equivalent Privacy include thepossibility of IV collisions and altered packets that are not helped at allby a longer key.Most users usually do not change their keys. This gives hackersmore time to crack the encryption.Master keys, instead of temporary keys, are directly used.
  13. 13. A security protocol used in the IEEE 802.11 wireless networking standard.TKIP was designed by the IEEE 802.11i task group and the Wi-Fi Alliance. To replace WEP without requiring the replacement of legacy hardware.This was necessary because the breaking of WEP had left Wi-Fi networkswithout viable link-layer security, and a solution was required for already deployedhardware.Key size-128bits
  14. 14. Beck-Tews attackOhigashi-Morii attackFMS attackKoreK attackPTW attackThe Chopchop attack
  15. 15. WiFi Protected Access (WPA) and WiFi Protected Access II (WPA2) WiFi Protected Access (WPA) is a security standard for users of computersequipped with WiFi wireless connection. WiFi Protected Access (WPA) protocol implements the majority of the IEEE802.11i standard.TKIP encryption replaces WEP’s 40-bit or 128-bit encryption key that must bemanually entered on wireless access points and devices and does not change.
  16. 16. WEP with 64bit or 128bit encryption strength - a simple encryption that offers limited security and is relatively easy to break WPA-PSK (WPA-Pre Shared Key) - in the forms of WPA-TKIP which offers better security and is backwards compatible with older routers and USB keys, and WPA2-AES which offers the best security and performance but less compatibilitySince the problem with WEP AND WPA-TKIP.WIGIG MAKE USE OF WPA2-AES(ADVANCED ENCRYPTION STANDARD)Since only AES is not compatible with older devices thus a completely new devices should bemade for this technology.
  17. 17. A D VA N TA G E S O F W i G i gSmall in size.Portable.High speed of data transfer.Low power consumption.Cost-effective.
  18. 18. APPLICATIONS OF WiGigIn wireless LAN networks.Inter-vehiclecommunication system.Huge data file transfer.Office appliances.Video information transfer.
  19. 19. FUTURE OF WIGIG NO WIRE WORLD: Leave messy wires in your work places. And enter in to FAST AND FURIOUS WORLD A DIGITALIZED LIFE. Designed to work in high-density area Wirelessly connect all devices to your tablet (wireless Docking) Download the 25Gb blu-ray disc movie in a minute. Wireless display
  20. 20. “ NECCESITY IS THE MOTHER OF INVENTION”For security related topic:Wikipediawww.electronicbus.comPeter Smulders, “Exploiting the 60 GHz Band for Local Wirelesshtttp://www.pcpress.comand Future Communications,” IEEE“Special Issue on Gigabit WirelessDirections,” IEEE Comm.htttp://www.wikipedia.comWhite paper final ProspectsMultimedia Access: press release by wigig allianceJSAC, October 2009Magazine, January 2002