How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) (Ipam) (Networking) 2 (Ipom) 2(2
|
|
- Maximilian Gordon
- 3 years ago
- Views:
Transcription
1 Workshop Presentation Chapter4 Yosuke TANAKA
2 Agenda(Framing in Detail) Data Frames Control Frames type RTS Duration CTS Addressing (!!important!!) Variation on Data Frame Theme Applied Data Framing ACK PS-Poll
3 Data Frames Octets: Frame Duration/ Address Address Address Sequence Address Frame FCS Control ID Control 4 Body type Duration Addressing MAC Header Variation on Data Frame Theme Applied Data Framing Figures are from nakaji's presentation
4 See Table4-1 Destinct 1 Type of Data Frame Contention-free service (no fear of contention) Contention-based service (some probability ) Destinct 2 Carry data or not
5 Duration It carries Network Allocation Vector(NAV) There are 4 rules 1. Transmit during contention-free period Set 32,768 Any data frames transmitted during this period 2. Broadcast/Multicast destination No need atomic exchange, no need ACK by receivers Set 0
6 Duration 3 More Fragment bit is 0 -> Figure 4-2 no more fragment Set 1 SIFS + 1 ACK 4 More Fragment bit is 1 -> Figure 4-3 More fragment remain Set 3 SIFS + 2 ACK + time for next fragment
7 Before explaining Addressing BSSID Each BSS has a BSSID (48 bit) In infrastructure BSS, BSSID = MAC-addr of AP In IBSS, Universal/Local bit for new BSSID Set 1 -> local address Set 0 -> Universal address Individual/Group bit Set 0 in IBSS And generate random 46 bits All 1s BSSID is the Broadcast BSSID pass through any BSSID Used only when sta try to locate a Network by sending probe requests
8 Addressing See Table 4-2 Address1 receiver Address2 transmitter = put frames onto radio link Also served Address3,4 There are 4 cases
9 Addressing Case 1 IBSS No AP, only mobile station Address1 -> dst-addr(sta) Address2 -> src-addr(sta) Address3 -> BSSID (random 46 bits + 2 optional bits)
10 Addressing Case 2 To AP (Infrastructure BSS) See Figure 4-4 Address1 -> BSSID(AP's interface MAC-addr) Address2 -> src-addr Address3 -> dst-addr
11 Addressing Case 3 From AP (Infrastructure BSS) See Figure 4-5 Address1 -> dst-addr Address2 -> BSSID(AP's interface MAC-addr) Address3 -> src-addr
12 Addressing Case 4 WDS (bridge) See Figure 4-6 Address1 -> ReceiverAP-addr (server side AP) Address2 -> TransmitterAP-addr (client side AP) Address3 -> dst-addr (server) Address4 -> src-addr (client)
13 Variation on the Data Frame Theme Depends on contention-based or contention-free service Contention-based Data Simple frames to move the body from one sta to another Null -> Figure 4-7 Consists of MAC header + FCS trailer e.g. When sta inform AP of changes in power-saving status. Then, AP must begin buffering frames for sleeping sta. Contention-free -> detail in chapter9
14 Applying Data Framing MAC header format of Previous 4 cases IBSS frames Frames From AP Frames To AP Frames in WDS already explain in previous pages(in Addressing) SEE Figure
15 Agenda(Framing in Detail) Data Frames Control Frames type RTS Duration CTS Addressing (!!important!!) Variation on Data Frame Theme Applied Data Framing ACK PS-Poll
16 Control Frames
17 Request to Send (RTS) Only header, no data transmitted Frame Control = 1011 Duration -> figure 4-14 Time require = 3 SIFS + 1 CTS + 1 ACK + frametime Address1 dst-addr Address2 src-addr
18 Clear to Send (CTS) Generated only to answer for RTS Frame Control = 1100 Duration -> figure 4-16 Time require = 2 SIFS + frametime + 1 ACK = subtract 1CTS and 1 SIFS from Duration in RTC
19 Acknowledgement (ACK) Positive ACK (received a frame -> send ack) Frame Control = 1101 Duration -> figure 4-18 ACK for final fragment or a complete data Duration = 0 ACK for not final fragment (there are more fragment) Duration = subtract 1CTS and 1 SIFS from most recent Duration
20 Power-Save Poll (PS-Poll) When station wake from power-save mode, this frame is transmitted to AP Frame Control = 1010
21 Workshop presentation 11/24 Hongguang Jia
22 Management Frames Establishing the identity 3 procedures locate a network be authenticated by network associate with an access point
23 The Structure of Management Frames MAC header is same information elements
24 Address fields(1/2) destination address Stations check BSSID to limit broadcast and multicast management frames Exception: Beacon frames
25 Address fields(2/2) BSSIDs Access points: Interface MAC address Stations In BSS access point s BSSID In IBSS random BSSID Exception: seeking network BSSID broadcast BSSID
26 Duration calculations in contention-free period 32,768 in contention-based access periods broadcast or multicast 0 If a nonfinal fragment is part of a multiframe exchange microseconds taken up by three SIFS intervals + the next fragment and its acknowledgment Final fragments the time required for one acknowledgment + one SIFS
27 Frame body fixed-length fields: fixed fields variable-length fields: information elements
28 Fixed-Length Management Frame Components 10 fixed-length fields may appear do not have a header
29 Authentication Algorithm Number Authentication Algorithm Number 2 bytes Value 0 meaning Open System authentica tion 1 Shared Key authentica tion 2-65,535 Reserved
30 Authentication Transaction Sequence Number track progress through authentication exchange 2 bytes 1 ~ 65,535
31 Beacon interval Beacon transmissions announce the network existence at regular intervals Beacon frames BSS parameters and the buffered frames 2 bytes TU: 1024 ms
32 Capability Information 2 bytes
33 Capability Information ESS/IBSS 10: access point is part of an infrastructure network 01: IBSS Privacy requires the use of WEP Short Preamble Use of the short preamble PBCC Use of the packet binary convolution coding modulation scheme
34 Capability Information Channel Agility use of the Channel Agility option Short Slot Time use of the shorter slot time DSSS-OFDM use of DSSS-OFDM frame construction Contention-free polling bits Stations and access points use these two bits as a label Read pages for label s meaning
35 Current AP Address 5 bytes Listen Interval 2 bytes number of Beacon intervals Association ID 2 bytes the two most significant bits are set to 1 1-2,007
36 Timestamp 8 bytes allows synchronization between the stations in a BSS master timekeeper for a BSS periodically transmits the number of microseconds it has been active
37 Reason Code 2 bytes disassociation or deauthentication reason Status code 2 bytes indicate the success or failure of an operation 0: success nonzero: fail Read page for detailed status code meaning
38 Management Frame Information Elements variable-length components ID number, a length, and a variable-length component Read 92 page for details
39 Service Set Identity (SSID) a string of bytes that labels the BSSID 0-32 bytes 0 byte: broadcast SSID
40 Supported Rates a string of bytes Each byte seven low-order bits: data rate the most significant bit: whether the data rate is mandatory 1: mandatory 0: optional Extended Supported Rates handles more than eight data rates multiple of 500 kbps, max is 63.5Mbps
41 Read page for details
42 FH Parameter Set Dwell Time time spent on each channel in the hopping sequence Hop Set the set of hop patterns Hop Pattern hopping pattern Hop Index the current point in the hop sequence
43 DS Parameter Set channel number
44 Traffic Indication Map (TIM) which stations have buffered traffic waiting to be picked up DTIM Count the number of Beacons that will be transmitted before the next DTIM frame DTIM frames indicate that buffered broadcast and multicast frames will be delivered shortly Not all Beacon frames are DTIM frames
45 Traffic Indication Map (TIM) DTIM Period the number of Beacon intervals between DTIM frames 0 is reserved and is not used Bitmap Control and Partial Virtual Bitmap Bit 0 reserved for multicast traffic traffic indication status of Association ID 0 Bit 1-7 Bitmap Offset field
46 CF Parameter Set transmitted in Beacons by access points that support contention-free operation IBSS Parameter Set the announcement traffic indication map (ATIM) window only in IBSS Beacon frames the number of time units (TUs) between ATIM frames
47 Country Country String (3 bytes) first two letters: ISO country code 3rd character I: indoor regulation O: outdoor regulation First Channel Number (1 byte) the lowest channel subject to the power constraint Number of Channels (1 byte) The size of the band subject to the power constraint Maximum Transmit Power (1 byte) Unit: dbm Pad (1 byte; optional) even number of bytes When odd: 0
48 Hopping Pattern Parameters and Hopping Pattern Table Request ask the network for certain information elements Challenge Text shared-key authentication requires successfully decrypt an encrypted challenge Power Constraint the maximum transmit power local constraint reduces the regulatory maximum
49 Power Capability a station reports its minimum and maximum transmit power TPC Request request radio link management information length field is always zero TPC Report For stations to know how to tune transmission power two one-byte fields transmit power (dbm) link margin: the number of decibels of safety
50 Supported Channels describes sub-bands that are supported
51 Channel Switch Announcement impending channel change information Channel Switch Mode 1: associated stations stop transmitting 0: no restriction New Channel Number Max 255 Channel Switch Count the number of Beacon frame transmission intervals that it will take to change the channel.
52 Measurement Request and Measurement Report Quiet To find the presence of radar or other interference 8 bytes Quiet Count the number of Beacon transmission intervals until the quiet period begins Quiet Period 0: no scheduled quiet periods Otherwise: the number of beacon intervals between quiet periods Quiet Duration the number of time units the quiet period lasts Quiet Offset the number of time units after a Beacon interval that the next quiet period will begin
53 IBSS DFS dynamic frequency selection BSS (1 bit) If frames from another network are detected OFDM Preamble (1 bit) If the a short training sequence is detected Unidentified Signal (1 bit) If the signal cannot be classified Radar (1 bit) If a radar signal is detected Unmeasured (1 bit) If the channel was not measured
54 ERP Information Non-ERP present when an older, non g station associates to a network when overlapping networks that are not capable of using g are detected Use Protection incapable of operating at g data rates are present Barker Preamble Mode if the stations are not capable of the short preamble mode
55 Robust Security Network a way to communicate security information between stations Version 1: i 0: reserved Other: not defined Group cipher suite AP must select a single group cipher compatible with all associated stations to protect broadcast and multicast frames cipher suite selector: 4 bytes an OUI for the vendor a number to identify the cipher
56 Robust Security Network Pairwise Cipher Suites (count + list) may be several pairwise cipher suites to protect unicast frames 2 bytes Zero: support for only the group cipher suite Authentication and Key Management (AKM) suites (count + list) multiple authentication types A count A series of 4 bytes suite identifiers an OUI a suite type number
57 Robust Security Network RSN Capabilties what the transmitter is capable of Followed by reserved bits that must be set to zero Pre-authentication indicate AP can perform pre-authentication with other APs No Pairwise support a manual WEP key for broadcast data in conjunction with a stronger unicast key Pairwise Replay Counter and Group Replay Counter the number of replay counters PMK list (count + list) list of master keys
58 Extended Supported Rates identically to the Supported Rates element element body of up to 255 bytes
59 Wi-Fi Protected Access (WPA) a slight modification of a subset of i identical to the Robust Security Network information element The element ID is 221, not 48. A WPA-specific tag of 00:50:F2:01 is inserted before the version field. Microsoft's OUI (00:50:F2) is used instead of the working group's OUI. Only one cipher suite and one authentication suite are supported TKIP is the default cipher, rather than CCMP. preauthentication capabilities bit is always zero
60 Types of Management Frames Beacon Frames announce the existence of a network transmitted at regular intervals Probe Request scan an area for existing networks Probe Response If a Probe Request encounters a network with compatible parameters, the network sends a Probe Response frame
61 Types of Management Frames IBSS announcement traffic indication map (ATIM) a station in an IBSS has buffered frames Disassociation and Deauthentication Disassociation frames: end an association relationship Deauthentication frames: end an authentication relationship
62 Types of Management Frames Association Request Sent when a station try to join a compatible network Reassociation Request moving between basic service areas within the same extended service area rejoin the coverage area of an access point
63 Types of Management Frames Association Response and Reassociation Response Response to association request Authentication stations authenticated using a shared key, and exchanged Authentication frames Action frame trigger measurements Read page for detailed frame structure
Basic processes in IEEE802.11 networks
Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters.11 Architect. 1 IEEE 802.11 Terminology Station (STA) Architecture: Device
More informationEETS 8316 Wireless Networks Fall 2013
EETS 8316 Wireless Networks Fall 2013 Lecture: WiFi Discovery, Powersave, and Beaconing http://lyle.smu.edu/~skangude/eets8316.html Shantanu Kangude skangude@lyle.smu.edu Discovery and Beaconing Discovery?
More information802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak
802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture
More informationCS 356 Lecture 29 Wireless Security. Spring 2013
CS 356 Lecture 29 Wireless Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
More informationMustafa Ergen June 2002 ergen@eecs.berkeley.edu. Department of Electrical Engineering and Computer Science University of California Berkeley
Mustafa Ergen June 2002 ergen@eecs.berkeley.edu Department of Electrical Engineering and Computer Science University of California Berkeley 2 Abstract This document describes IEEE 802.11 Wireless Local
More informationWhite paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points. http://www.veryxtech.com
White paper Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points http://www.veryxtech.com White Paper Abstract Background The vulnerabilities spotted in the Wired Equivalent Privacy (WEP) algorithm
More informationIEEE 802.11 Technical Tutorial. Introduction. IEEE 802.11 Architecture
IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle
More informationResearch In Motion D. Stanley, Ed. Aruba Networks March 2009
Network Working Group Request for Comments: 5416 Category: Standards Track P. Calhoun, Ed. Cisco Systems, Inc. M. Montemurro, Ed. Research In Motion D. Stanley, Ed. Aruba Networks March 2009 Control and
More informationLab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
More informationIEEE 802.11 frame format
IEEE 802.11 frame format Pietro Nicoletti www.studioreti.it 802-11-Frame - 1 P. Nicoletti: see note pag. 2 Copyright note These slides are protected by copyright and international treaties. The title and
More informationSecurity in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
More informationIEEE 802 Protocol Layers. IEEE 802.11 Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.
IEEE 802.11 Wireless LAN Standard IEEE 802 Protocol Layers Chapter 14 Protocol Architecture Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit
More informationChapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
More informationCSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
More informationConfiguration. Windows 98 and Me Configuration
Configuration Windows 98 and Me Configuration Installing the TCP/IP Protocol Windows 2000 Configuration Windows XP Configuration Wireless Configuration 128-Bit Encryption Wireless Security in Windows XP
More informationA Technical Tutorial on the IEEE 802.11 Protocol
A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner Director of Engineering copyright BreezeCOM 1997 Introduction The purpose of this document is to give technical readers a basic overview
More informationTube-U(G) Long-Range Outdoor IEEE 802.11g USB Adapter User s Guide
Tube-U(G) Long-Range Outdoor IEEE 802.11g USB Adapter User s Guide Alfa Network, Inc. Page 1 Table of Content Over view... 3 Unpacking information... 3 Introduction to the Tube-U(G) outdoor USB Adapter...
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
More informationThe Wireless Network Road Trip
The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in
More informationTroubleshooting Wireless Clients Version 1.1
Troubleshooting Wireless Clients Version 1.1 Basic Connectivity Troubleshooting information in this section covers problems with basic wireless connectivity, such as inability to associate or inability
More informationLong-Range 500mW IEEE 802.11g Wireless USB Adapter. User's Guide
Long-Range 500mW IEEE 802.11g Wireless USB Adapter User's Guide TABLE OF CONTENTS OVERVIEW... 4 UNPACKING INFORMATION... 4 INTRODUCTION TO THE IEEE 802.11G WIRELESS USB ADAPTER... 5 Key Features...5 INSTALLATION
More informationAdjacent Overlapping Channel / Adjacent Non-overlapping Channel - The IEEE 802.11-2007 standard defines the following terms:
CWNP Exam Terms Active Mode - Power management of a non-ap station (STA) operates in either active mode or powersave mode. A STA in active mode is always in an awake state. Vendors have called this, Continually
More information802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to
More informationWireless LAN Pen-Testing. Part I
Wireless LAN Pen-Testing Part I To know your Enemy, you must become your Enemy (Sun Tzu, 600 BC) Georg Penn 23.03.2012 Motivation Read manuals, documentation, standards Check sources for their reliability,
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More informationWiereless LAN 802.11
Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks
More informationLecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
More informationLecture 6.1 Introduction. Giuseppe Bianchi, Ilenia Tinnirello
PART 6 IEEE 802.11 Wireless LANs Lecture 6.1 Introduction WLAN History Ł Original goal: Deploy wireless Ethernet First generation proprietary solutions (end 80, begin 90) WaveLAN (AT&T)) HomeRF (Proxim)
More informationCS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
More informationLP-348. LP-Yagy2415. LP-510G/550G 54M Wireless Adapter PCMCIA/PCI. User Guide Ver:2.0 LP-5420G WWW.LANPRO.COM
LP-348 LP-Yagy2415 LP-1518 LP-5P LP-510G/550G 54M Wireless Adapter PCMCIA/PCI User Guide Ver:2.0 LP-5420G WWW.LANPRO.COM COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a
More informationKey Features. Multiple Operation Modes ENH500 can operate into four different modes with Access Point, Client Bridge, Client Router and WDS Mode.
802.11a/n Long Range Wireless Outdoor CPE Key Features IEEE 802.11 a/n compliant Up to 300Mbps (5GHz) 24V Proprietary PoE support Waterproof Housing IP65 rated AP/CB/CR/WDS Modes 4 SSIDs support + VLAN
More information150Mbps 802.11N 3G Mobile Wireless Router. R36 User Guide
150Mbps 802.11N 3G Mobile Wireless Router R36 User Guide 1 Contents INTRODUCTION... 3 KEY HARDWARE FEATURES... 3 DESCRIPTION OF CAPABILITIES... 3 HARDWARE DESCRIPTION... 5 LED INDICATORS... 7 INITIAL CONFIGURATION...
More informationWL-5460AP. User s Manual. 54Mbps Multi-Function Wireless AP. AirLive WL-5460AP v2 User Manual
WL-5460AP 54Mbps Multi-Function Wireless AP User s Manual 1 Copyright The contents of this publication may not be reproduced in any part or as a whole, stored, transcribed in an information retrieval system,
More informationSymm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2
Wi-Fi Security FEUP>MIEIC>Mobile Communications Jaime Dias Symmetric cryptography Ex: RC4, AES 2 Digest (hash) Cryptography Input: variable length message Output: a fixed-length bit
More informationVirtual Access Points
Virtual Access Points Performance Impacts in an 802.11 environment and Alternative Solutions to overcome the problems By Thenu Kittappa Engineer Author: Thenu Kittappa Page 1 Virtual Access Points... 1
More information802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved
802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"
More informationA Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Access Point with SRX User Guide Model No. WAP54GX Copyright and Trademarks Specifications are subject to change without notice. Linksys
More informationWLAN 802.11w Technology
Technical white paper WLAN 80.w Technology Table of contents Overview... Technical background... Benefits... 80.w technology implementation... Management Frame Protection negotiation... Protected management
More informationCS 336/536 Computer Network Security. Summer Term 2010. Wi-Fi Protected Access (WPA) compiled by Anthony Barnard
CS 336/536 Computer Network Security Summer Term 2010 Wi-Fi Protected Access (WPA) compiled by Anthony Barnard 2 Wi-Fi Protected Access (WPA) These notes, intended to follow the previous handout IEEE802.11
More informationMultiple WiFi Clients on a Single Wireless Card
Multiple WiFi Clients on a Single Wireless Card Juan M Torrescusa Supervisor: Andrea Bittau April 27, 2006 This report is submitted as part requirement for the BSc Degree in Computer Science at University
More informationCSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
More informationchap18.wireless Network Security
SeoulTech UCS Lab 2015-1 st chap18.wireless Network Security JeongKyu Lee Email: jungkyu21@seoultech.ac.kr Table of Contents 18.1 Wireless Security 18.2 Mobile Device Security 18.3 IEEE 802.11 Wireless
More informationLevelOne User Manual WPC-0600 N_One Wireless CardBus Adapter
LevelOne User Manual WPC-0600 N_One Wireless CardBus Adapter V2.0.0-0712 Safety FCC WARNING This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to
More informationA Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 Christian Röhl, Hagen Woesner, Adam Wolisz * Technical University Berlin Telecommunication Networks Group {roehl,
More informationHow To Understand The Latest Wireless Networking Technology
GLOSSARY 802.11 The IEEE standard that specifies carrier sense media access control and physical layer specifications for 1- and 2-megabit-per-second (Mbps) wireless LANs operating in the 2.4-GHz band.
More informationNokia Siemens Networks. CPEi-lte 7212. User Manual
Nokia Siemens Networks CPEi-lte 7212 User Manual Contents Chapter 1: CPEi-lte 7212 User Guide Overview... 1-1 Powerful Features in a Single Unit... 1-2 Front of the CPEi-lte 7212... 1-2 Back of the CPEi-lte
More informationTECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012
TECHNICAL NOTE GoFree WIFI-1 web interface settings Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 1/14 Web interface settings under admin mode Figure 1: web interface admin log
More informationWelch Allyn Connex, VitalsLink by Cerner, and Connex CSK Network installation. Best practices overview
Welch Allyn Connex, VitalsLink by Cerner, and Connex CSK Network installation Best practices overview ii Welch Allyn Network installation 2015 Welch Allyn. All rights are reserved. To support the intended
More informationTL-WN310G 54M Wireless CardBus Adapter
54M Wireless CardBus Adapter Rev: 1.0.1 1910010042 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and
More informationIEEE 802.11 Wireless LAN Standard. Updated: 5/10/2011
IEEE 802.11 Wireless LAN Standard Updated: 5/10/2011 IEEE 802.11 History and Enhancements o 802.11 is dedicated to WLAN o The group started in 1990 o First standard that received industry support was 802.11b
More informationWUA-0605 300Mbps Wireless USB Network Adapter
WUA-0605 300Mbps Wireless USB Network Adapter User Manual V1.0 Certification FCC CE FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant
More informationWhitepaper. Author: Jerome Henry. Editor: Marcus Burton. November 2011 Version 1.00
802.11s Mesh Networking Whitepaper Author: Jerome Henry Editor: Marcus Burton November 2011 Version 1.00 Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 What are mesh networks, and why an amendment
More informationHow To Secure Wireless Networks
Lecture 24 Wireless Network Security modified from slides of Lawrie Brown Wireless Security Overview concerns for wireless security are similar to those found in a wired environment security requirements
More informationWL-5460AP. User s Manual. 54Mbps Multi-Function Wireless AP. AirLive WL-5460AP v2 User Manual
WL-5460AP 54Mbps Multi-Function Wireless AP User s Manual 1 Regulatory Information Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits
More informationWildPackets Guide to Wireless LAN Analysis
WildPackets Guide to Wireless LAN Analysis Executive Summary The market for wireless communications has grown rapidly since the introduction of 802.11 wireless local area networking (WLAN) standards. Business
More informationChapter 2 Wireless Networking Basics
Chapter 2 Wireless Networking Basics Wireless Networking Overview Some NETGEAR products conform to the Institute of Electrical and Electronics Engineers (IEEE) 802.11g standard for wireless LANs (WLANs).
More informationWireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
More informationOverview of 802.11 Networks and Standards
Overview of 802.11 Networks and Standards Mauri Kangas, Helsinki University of Technology, 17.02.2004 Mauri Kangas 17.2.2004 Page 1 (34) Family of 802.xx Standards ISO/IEC 8802-xx = IEEE 802.xx IEEE 802.1
More informationChapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
More informationWireless security. Any station within range of the RF receives data Two security mechanism
802.11 Security Wireless security Any station within range of the RF receives data Two security mechanism A means to decide who or what can use a WLAN authentication A means to provide privacy for the
More informationCh 2.3.3 GSM PENN. Magda El Zarki - Tcom 510 - Spring 98
Ch 2.3.3 GSM In the early 80 s the European community decided to work together to define a cellular system that would permit full roaming in all countries and give the network providers freedom to provide
More informationRecommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
More informationTL-WN612AG / TL-WN652AG / TL-WN653AG
TL-WN612AG / TL-WN652AG / TL-WN653AG 108M Dualband(2.4GHz/5GHz) Wireless Adapter Rev: 1.0.1 1910010033 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark
More informationIEEE 802.11 WLAN (802.11) ...Copyright. Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/
WLAN (802.11) Renato Lo Cigno www.disi.unitn.it/locigno/didattica/nc/...copyright Quest opera è protetta dalla licenza Creative Commons NoDerivs-NonCommercial. Per vedere una copia di questa licenza, consultare:
More informationWi-Fi Alliance Voice-Enterprise Certification: Standardized Fast Secure Roaming. Whitepaper
Wi-Fi Alliance Voice-Enterprise Certification: Standardized Fast Secure Roaming Whitepaper Wi-Fi Roaming: The Intersection of Performance and Security Revolution Wi-Fi One of the most important aspects
More informationWL-5450AP & WL-5460AP Wireless Access Point. User s Guide
WL-5450AP & WL-5460AP Wireless Access Point User s Guide 1 FCC Certifications This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the
More informationMeasuring the service level in the 2.4 GHz ISM band
Measuring the service level in the 2.4 GHz ISM band Internal report Jan-Willem van Bloem and Roel Schiphorst University of Twente Department of Electrical Engineering, Mathematics & Computer Science (EEMCS)
More informationIntroduction to IEEE 802.11 Wireless LAN
Introduction to IEEE 802.11 Wireless LAN Li-Hsing Yen Chung Hua University Fall 2006 Difference Between Wired and Wireless LANs The medium impacts the design stations are mobile different MAC 1 Medium
More informationNXC5500/2500. Application Note. 802.11w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015
NXC5500/2500 Version 4.20 Edition 2, 02/2015 Application Note 802.11w Management Frame Protection Copyright 2015 ZyXEL Communications Corporation 802.11w Management Frame Protection Introduction IEEE 802.11w
More informationWireless LAN Security Analysis & Diagnostic Tool
Technion Israel Institute of Technology Department of Electrical Engineering Networked Software Systems Laboratory Final Report Wireless LAN Security Analysis & Diagnostic Tool Submitted By: Liran Manor
More informationWireless LAN Concepts
Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied
More informationIEEE 802.11a/ac/n/b/g Enterprise Access Points ECW5320 ECWO5320. Management Guide. www.edge-core.com. Software Release v2.0.0.1
IEEE 802.11a/ac/n/b/g Enterprise Access Points ECW5320 ECWO5320 Management Guide Software Release v2.0.0.1 www.edge-core.com Management Guide ECW5320 Indoor Enterprise Access Point IEEE 802.11a/ac/n/b/g
More informationYour 802.11 Wireless Network has No Clothes
Your 802.11 Wireless Network has No Clothes William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland College Park, Maryland 20742 March 30, 2001 Abstract
More informationGetting Started with HP Wireless Networks. Version 10.41
Getting Started with HP Wireless Networks Version 10.41 Copyright 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties
More informationIEEE802.11 Wireless LAN
IEEE802.11 The broadband wireless Internet Maximilian Riegel wlan-tutorial.ppt-1 (28.11.2000) WLAN Dream Finally Seems to Happen... Recently lots of serious WLAN activities have been announced Big players
More informationA Neighborhood Awareness Method for Handoff Assistance in 802.11 Wireless Networks
A Neighborhood Awareness Method for Handoff Assistance in 802.11 Wireless Networks Gurpal Singh *, Ajay Pal Singh Atwal ** and B.S. Sohi *** * Deptt of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India,
More informationSection 1 Wireless Packet Captures & Connection Analysis- A Review
Section 1 Wireless Packet Captures & Connection Analysis- A Review Many of you will have already used many of these tools, or at least had some experience with them in previous CWNP or vendor Wireless
More informationJournal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 4074
Issues in WiFi Networks Nicolae TOMAI Faculty of Economic Informatics Department of IT&C Technologies Babes Bolyai Cluj-Napoca University, Romania tomai@econ.ubbcluj.ro Abstract: The paper has four sections.
More informationTable of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example
Table of Contents Wi Fi Protected Access 2 (WPA 2) Configuration Example...1 Document ID: 67134...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Conventions...2 Background Information...2
More informationIEEE802.11 A/G Access Point
IEEE802.11 A/G Access Point User Guide V1.3, JUL. 2006 Copyright Statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, whether
More informationVerifying Detection of Asset Tags in WLAN Controllers
APPENDIXB Verifying Detection of Asset Tags in WLAN Controllers Asset Tags Detection The protocol analyzer trace in Figure B-1 provides important information with regard to how asset tags compliant with
More information12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
More informationUNIK4250 Security in Distributed Systems University of Oslo Spring 2012. Part 7 Wireless Network Security
UNIK4250 Security in Distributed Systems University of Oslo Spring 2012 Part 7 Wireless Network Security IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s charter to develop
More informationAjay Gummalla-July 2001
DOCSIS Overview Ajay Gummalla Ethernet in the First Mile Study Group July 2001 Ajay Gummalla-July 2001 1 HFC Plant Topology VIDEO combiner Fiber TX Fiber Fiber RX Tap CMTS Fiber RX Fiber Fiber TX 2way
More informationBasic Wireless Configuration and Security
Basic Wireless Configuration and Security This quick start guide provides basic wireless configuration information for the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N. For information about
More informationWiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1
WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless
More informationTRENDnet User s Guide. Table of Contents
Table of Contents Table of Contents Contents Introduction... 4 Package Contents... 5 Hardware Feature... 5 Product Benefit... 7 Installation Considerations... 7 Installation... 8 Configuration... 9 Applications...
More informationWLAN Access Security Technical White Paper. Issue 02. Date 2012-09-24 HUAWEI TECHNOLOGIES CO., LTD.
WLAN Access Security Technical White Paper Issue 02 Date 2012-09-24 HUAWEI TECHNOLOGIES CO., LTD. . 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by
More informationVideo Transmission over Wireless LAN. Hang Liu Hang.liu@thomson.net
Video Transmission over Wireless LAN Hang Liu Hang.liu@thomson.net Page 1 Introduction! Introduction! Wi-Fi Multimedia and IEEE 802.11e for QoS Enhancement! Error Control Techniques Page 2 Introduction!
More informationAn Overview of ZigBee Networks
An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...
More informationEAP9550 11N Wall Mount Access Point / WDS AP / Universal Repeater
EAP9550 is a powerful and multi-functioned 11n Access Point and it can act three modes AP/WDS/Universal Repeater. Smoke detector appearance will minimize visibility. So this model can work properly at
More informationWiFi Security Assessments
WiFi Security Assessments Robert Dooling Dooling Information Security Defenders (DISD) December, 2009 This work is licensed under a Creative Commons Attribution 3.0 Unported License. Table of Contents
More informationUniversiti Teknologi MARA. 802.11 MAC Layer Sniffer Using Spoof Detection Algorithm
Universiti Teknologi MARA 802.11 MAC Layer Sniffer Using Spoof Detection Algorithm Azwan Abdul Satar Thesis submitted in fulfillment of the requirements for Bachelor of Science (Hons) Information Technology
More informationTRENDnet User s Guide. Table of Contents
Table of Contents Table of Contents Contents Introduction... 4 Package Contents... 4 Hardware Feature... 5 System Concept... 6 Product Benefit... 7 Installation Considerations... 7 Installation... 7 Configuration...
More informationWireless communications systems security. Alexey Fomin, SUAI fomin@vu.spb.ru
Wireless communications systems security Alexey Fomin, SUAI fomin@vu.spb.ru Agenda Current security solutions in wireless systems (802.11) Open problems 2 Security Tasks Message authentication & privacy
More informationIEEE 802.11e WLANs / WMM. S.Rajesh (rajeshsweb@gmail.com) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd.
IEEE 802.11e WLANs / WMM S.Rajesh (rajeshsweb@gmail.com) AU-KBC Research Centre, BroVis Wireless Networks, smartbridges Pte Ltd. Outline A short review of 802.11 MAC Drawbacks of 802.11 MAC Application
More informationEOR7550. User s Manual. Dual Radio Multi Function Repeater V1.0
EOR7550 Dual Radio Multi Function Repeater User s Manual V1.0 Table of Content 1. Introduction...1 1.1. Features...1 1.2. Package Contents...2 1.3. System Requirement...2 1.4. Applications...2 2. Modes...5
More informationN600 WiFi USB Adapter
Model WNDA3100v3 User Manual December 2014 202-11470-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the serial
More information