Tuesday, May 24, 2016



 wireless technology 

Don't let wireless technology intimidate you. After all, it hasn’t been a big part of our day-to-day lives until recently. Now it’s everywhere, and the benefits are too significant to ignore.
We'll help you understand how it works, avoiding most of the techy terms and nerdy numbers.
We'll help you to understand and take advantage of this new wave of life-enhancing technology - giving you the freedom to use computers, phones, wireless sensors, telemetry systems, wireless music, games and an increasing number and variety of other products, such as wireless e-Book Readers... without the constraint of wires.
Check hundreds of products in a moving truck, in seconds - use Radio Frequency Identification (RFID). Track and account for items moving between countries, or around a warehouse, with an RFID System.

References

http://www.wireless-technology-advisor.com
http://searchmobilecomputing.techtarget.com/definition/wireless

this is shaikha tareq but i can't open the blog 

Cryptography

is an indispensable tool for protecting information in computer systems. In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic. We will examine many deployed protocols and analyze mistakes in existing systems. The second half of the course discusses public-key techniques that let two parties generate a shared secret key. Throughout the course participants will be exposed to many exciting open problems in the field and work on fun (optional) programming projects. In a second course (Crypto II) we will cover moe advanced cryptographic tasks such as zero-knowledge, privacy mechanisms, and other forms of encryption.





Replay Attack

replay attack (also known as playback attack) is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it, possibly as part of a masquerade attack by IP packet substitution.

Suppose Alice wants to prove her identity to Bob. Bob requests her password as proof of identity, which Alice dutifully provides (possibly after some transformation like a hash function); meanwhile, Darth is eavesdropping on the conversation and keeps the password (or the hash). After the interchange is over, Darth (posing as Alice) connects to Bob; when asked for a proof of identity, Darth sends Alice's password (or hash) read from the last session, which Bob accepts thus 
granting access to Darth


Wireless Technology

wireless networks and technologies allow devices to send data to each other and to the web (TCP/IP Networks) without cables. There are a number of different wireless technologies out there that can be implemented in hardware products for the Internet of Things (IoT) and Machine to Machine (M2M) communication.

These are 5 types of Wireless Technology For The IoT;

IEEE 802.15.4: [Zigbee]
A wireless technology currently gaining traction in the LPWAN group, ZigBee is an open global standard and is designed specifically to be used in M2M networks. The technology is inexpensive to run and doesn’t require a lot of power, making it an ideal solution for many industrial applications. The technology has a low latency, and a low duty cycle, allowing products to maximize battery life.


IEEE 802.11: [WiFi]
WiFi uses radio waves (RF) to allow two devices to communicate with one another. The technology is most commonly used to connect Internet routers to devices like computers, tablets and phones; however, it can be used to connect together any two hardware components. WiFi is a local wireless network that runs of the 802.11 standards set forth by the Institute of Electrical and Electronics Engineers (IEEE).

IEEE 802.15.1: [Bluetooth and BLE]
Bluetooth and Bluetooth Low Energy (BLE) are wireless technologies used to transfer data over short distances. The technology is frequently used in small consider devices that connect to users phones and tablets. For instance, the technology is used in many speaker systems. Bluetooth Low Energy uses less power than standard Bluetooth and is used in hardware such as fitness trackers, smart watches and other connected devices in order to wirelessly transmit data without heavily compromising the battery power in a user’s phone.

IEEE 802.16: [WiMax]

WiMax stands for Worldwide Interoperability for Microwave Access. This wireless technology allows data to be transferred at a rate of 30-40 megabits per second. The term refers specifically to interoperable implementations of the IEEE 802.16 wireless family. The technology was once used by several mobile carriers, notably Sprint, to deliver wireless data to its customers. Sprint, along with many of the other carriers who used the technology, has since switched over to using faster LTE 4G networks for data..



 References