Analysis of Methods for Mobile Device Tracking. David Nix Chief Scientific Advisor
|
|
- Mabel West
- 8 years ago
- Views:
Transcription
1 Analysis of Methods for Mobile Device Tracking David Nix Chief Scientific Advisor October 2013
2 Table of Contents 1. Document Purpose and Scope 3 2. Overview Mobile Device Penetration Mobile Device Tracking Options 3 3. Wireless Interfaces G/4G Discoverability Measurability Identification Viability Bluetooth Discoverability Measurability Identification Viability Wi-Fi Discoverability Measurability Identification Viability 6 4. Conclusions 6 5. References 7 October 2013 Page 2
3 1. Document Purpose and Scope This document describes the options for tracking mobile devices via their wireless interfaces, and ascertains the viability of each approach relative to a large indoor space, such as a retail store. 2. Overview 2.1 Mobile Device Penetration According to Pew Internet statistics from May of 2013, 91% of adults (18 years or older) in the United States own a mobile device. This number has steadily increased, most steeply amongst younger demographics. These mobile devices fall into roughly two categories: Feature phones. These phones refer to the original mobiles which specialize in voice calls only. The feature nomenclature stems from various features added by phone manufacturers to differentiate from competitor phones. These include built-in applications such as simple calendars, games, and texting services. Smartphones. These phones use hefty microprocessors and sophisticated operating systems that serve as a platform for an unlimited number of applications. The primary operating systems are Android, ios (Apple), and Windows. The ratio of smartphone ownership to feature phone ownership is approximately 2-to-1, meaning 61% of US adults own a smartphone, while 30% own a feature phone. Slightly more recent statistics from Nielsen show that smartphones make up 64% of the ownership. More importantly, smartphones comprised 80% of mobile devices sold in the three months prior to the report. The ownership percentages are highest amongst younger demographics. For example, 97% of year olds own a mobile device, and 80% own a smartphone. The rising ownership of mobile devices combined with the steady increase of smartphones as a share of overall mobile devices, particularly amongst the young, signifies two things: The number of adults owning mobile devices in the U.S. will approach 100% over the next decade. The portion of that number who own smartphones will increase, eventually approaching 100% as feature phones are phased out due to market pressure from smartphone sales. The current split amongst smartphone operating systems is: Android: 53% ios (Apple): 40% Windows: 2% Other: 5% The Android share is growing fastest. 2.2 Mobile Device Tracking Options Mobile device penetration and share statistics are important to mobile device tracking when considering the differences between feature phones and smartphone relative to wireless interfaces. Mobile devices have a combination of up to three radio interfaces: October 2013 Page 3
4 3G/4G Bluetooth Wi-Fi (IEEE ) The primary function of virtually all wireless devices is to provide cellular access to voice and data networks. In marketing lingo, this connectivity is referred to a 3G/4G. The 3G/4G radio can connect to cell towers up to several kilometers distant, where range is affected by the presence of obstacles such as walls, ceilings, buildings, and hills. Virtually all smartphones and most feature phones also incorporate Bluetooth radios. These are primarily used for wirelessly connecting to nearby, low bandwidth peripherals such as headsets and keyboards. The Bluetooth radios in most mobiles have an effective range of about 10 meters, with some connectivity up to 30 meters line-of-sight. Virtually all smartphones but very few feature phones also incorporate Wi-Fi radios. These are used for wirelessly connecting to data networks at higher effective bandwidths ranging from 5 Mbps to over 100 Mbps. The range of Wi-Fi radios on mobile devices varies from 50 meters to hundreds of meters, depending on the transmit power of Wi-Fi Access Points, the presence of obstacles such as walls and floors, and the presence of other RF interference. In theory, any one of the three wireless interfaces can be used for location tracking as long as it meets the following minimum criteria: Discoverability: The location tracking node can discover the presence of a mobile device using the particular wireless interface. In short, the location tracking node must be able to intercept mobile device transmissions or prompt mobile devices to transmit. Measurability: The complementary wireless interface on the location tracking node must be able to measure Received Signal Strength (RSS) of the transmitting device. Identification: The mobile device must expose a unique identifier in a detectable packet. The unique identifier must be unencrypted and must not vary from appearance to appearance. The remaining sections discuss the minimum criteria per interface. 3. Wireless Interfaces 3.1 3G/4G Discoverability After power on, a GSM mobile scans RF channels for a Broadcast Control Channel (BCCH) with the strongest signal. The BCCH is emitted by the Base Station at a cell tower periodically at frequent intervals. The mobile listens passively until it is ready to register its location with the Base Station. At that time the mobile initiates a location update procedure where it requests association with Base Station. The update procedure, which includes authentication, is very brief no more than a few seconds. After successful location update, the mobile passively monitors the Base Station indefinitely. The mobile only emits signals under the following conditions: - The Base Station broadcasts a paging request for the particular mobile device because it has an incoming call or data for the device. Once connected, the mobile will continue transmitting for the duration of the call or data transfer. - The mobile wishes to initiate a call or transfer data, whereupon it issues a channel request to the Base Station to start the process. Once connected, the mobile will continue transmitting for the duration of the call or data transfer. In summary, the GSM mobile only transmits evidence of its presence when changing its location from one Base Station to another, and when it originates or receives a call. October 2013 Page 4
5 The competing CDMA protocol behaves much the same way for the same underlying reason: minimizing power by keeping the radio off most of the time Measurability GSM and CDMA radios can identify the RSSI of each signal and report this upstream. Some radios swallow the RSSI information in the firmware, while some pass the data up to the drivers. The behavior is vendor specific Identification GSM assigns unique numbers to each mobile device (IMEI) and each mobile subscriber (IMSI). For example, each mobile phone has a hardwired IMEI, and each SIM card stores an IMSI. Therefore, the Base Station can identify not only each unique phone, but the unique subscriber using the phone (e.g. which SIM card is installed in the phone). The competing CDMA protocol also uses the IMSI as a subscriber identifier Viability In terms of passively sniffing for the presence of mobile devices, GSM presents many difficulties. First and foremost, GSM mobile devices are effectively invisible unless actively involved in a call or during a period of data transfer. This results in an inability for a passive sniffer to deterministically track the presence of a GSM mobile. The only way to deterministically track the presence of a GSM phone is for the sniffer to masquerade as a Base Station whose signal strength is higher than those of surrounding cell towers. This would cause the mobile devices in the vicinity to attempt a location update with the sniffer. This practice has been used successfully by hackers and law enforcement. However, each sniffer would cost more than $1000 to construct. Worse, the service providers paid billions of dollars for the right to use the GSM spectrum, so FCC rules prohibit anyone other than the service providers from using the spectrum at GSM transmit levels. The construction of an active sniffer would undoubtedly bring down an army of attorneys from the service provider and stiff fines from the FCC. For this reason alone, an active GSM sniffer is not viable. The competing CDMA protocol faces similar obstacles: there is not enough information on air for passive sniffing, and active sniffers are expensive and illegal. 3.2 Bluetooth Discoverability Passive discovery of Bluetooth devices is relatively straightforward because most Bluetooth devices periodically issue Inquiry or Page packets to discover or attempt association with other Bluetooth devices. However, a more deterministic mechanism for discovering other devices is for an active sniffer to issue frequent Inquiry packets on all channels. The sniffer would start with the first channel, issue an Inquiry packet, and listen for Inquiry responses for some number of milliseconds before repeating the process on the next channel. This works because Bluetooth devices are required to respond to Inquiry packets. Bluetooth radios in typical mobile devices are Class 2, meaning a theoretical range of 30 meters but a realistic range of about 10 meters. Class 1 radios work at up to 100 meters with realistic ranges of 30 meters Measurability Bluetooth radios can identify the RSSI of each signal and report this upstream. Some radios swallow the RSSI information in the firmware, while some pass the data up to the drivers. The behavior is vendor specific Identification Bluetooth Inquiries expose the MAC address of each radio. The MAC address is unique to each radio, so it can serve as a unique consumer identifier. October 2013 Page 5
6 3.2.4 Viability An active Bluetooth sniffer is inexpensive and simple to implement. In fact, Linux includes built-in sniffing support. Getting the RSSI might prove more challenging, but it is doable. Furthermore, Bluetooth operates in public spectrum, so active sniffers violate no FCC rules or laws. The primary drawback of Bluetooth as a tracking mechanism is the limited range. The common Class 2 Bluetooth radio is only reasonably detectable within 10 to 20 meters of the sniffer. A dense configuration of sniffers would be needed to track consumers throughout a retail area. 3.3 Wi-Fi Discoverability Wi-Fi access points can be discovered simply by listening for beacons. However, because Access Points broadcast beacons approximately every 100 milliseconds, scanning all channels (as many as 60) may take multiple seconds. To make matters worse, client devices (non-access Points) do not beacon. Fortunately, Wi-Fi allows a mobile device to issue a Probe Request on a channel. Every Access Point and mobile device must respond to the Probe Request with identity information. As such, an active sniffer that sends Probe Requests on every channel can determine the presence of every other Wi-Fi device in range, and relatively quickly. In addition, the sniffer can infer the presence of hidden nodes and cloaked devices by intercepting other Wi-Fi packets. Most mobile devices issue Probe Requests instead of waiting for beacons to save power, making them even more visible to a sniffer. The range of Wi-Fi, typically 50 to several hundred meters even in enclosed spaces, allows a sniffer to detect devices in a large area. The primary drawback of Wi-Fi as a tracker is that it only works if the Wi-Fi radio is enabled on the mobile device. To save battery life, many users turn Wi-Fi off when not using it. However, the recent 4.3 Android release leaves the radio on in a reduced activity state even when the user has turned it off. The behavior can be overridden, but the typical user is unlikely to do so. In short, any Apple, Windows, or pre-4.3 Android phone with Wi-Fi turned off will not be detectable. Any other device will respond to Probe Requests or issue periodic Probe Requests or beacons Measurability Wi-Fi radios can identify the RSSI of each signal and report this upstream. Wi-Fi supports monitoring mode, which is implemented by a majority of vendor solutions. Monitoring mode allows the upstream drivers to obtain every received packet, while still supporting the ability to send Probe Requests Identification Wi-Fi Probe Responses expose the MAC address of each radio. The MAC address is unique to each radio, so it can serve as a unique consumer identifier. Other packets also expose MAC or related information, allowing the sniffer to also use other types of packets for identification Viability Given the existence of well-supported sniffer programs, inexpensive Wi-Fi hardware, and a protocol that allows the sniffer to quickly and comprehensively find mobile devices, Wi-Fi is an ideal method to locate subscribers. The long range of the signal allows for good coverage in a retail environment. Furthermore, Wi-Fi operates in public spectrum, so active sniffers violate no FCC rules or laws. 4. Conclusions In practice, 3G/4G tracking is not viable without the assistance of service providers. Such assistance is highly unlikely given service provider protectiveness of network equipment. Bluetooth tracking is limited due to the short range of the radios. Wi-Fi is the best of the available wireless interfaces when considering range, cost, and coverage of users. October 2013 Page 6
7 The coverage of Wi-Fi as a detection method is a function of the number of consumers with Wi-Fi enabled devices and the behavior of the consumer in terms of turning Wi-Fi on or off and carrying their Wi-Fi devices with them. As mentioned earlier, approximately 60% of consumers own a Wi-Fi capable device, and that number is growing. No study was found that measured consumer behavior regarding enabling/disabling Wi-Fi. However, over half of the smartphones are Android based and that segment is growing. New Android releases allow Wi-Fi to continue scanning and probing by default even when the consumer turns Wi-Fi off. Assuming Android continues this practice, the percentage of smartphones that are always detectable should increase over time. A possible improvement on Wi-Fi is Wi-Fi and Bluetooth working together. The primary drawback of using both simultaneously is that each radio reports a unique MAC address. Correlating a Wi-Fi signal and a Bluetooth signal as belonging to the same phone could be difficult. However, after multiple visits of the same consumer and through some logic of elimination, the sniffer system might be able to correlate the MAC addresses such that the presence of either radio is enough to recognize a consumer. In that case, the Bluetooth RSSI might be helpful in calculating locations that are nearby, while Wi-Fi RSSI is more suited to the wider area location. Also, Bluetooth would help discover consumers whose mobiles either did not support Wi-Fi or had Wi-Fi turned off. 5. References Brenner, Joanna. Pew Internet Commentary: Mobile. 18 September Taken from Patterson, Sean. U.S. Smartphone Penetration Hits 64%, Young Lead the Way. 19 September Taken from October 2013 Page 7
Wireless LANs vs. Wireless WANs
White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,
More informationCSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
More informationChapter 2 Wireless Settings and Security
Chapter 2 Wireless Settings and Security This chapter describes how to set up the wireless features of your WGT624 v4 wireless router. In planning your wireless network, select a location for the wireless
More informationcommunication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
More informationChapter 2 Configuring Your Wireless Network and Security Settings
Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless
More informationWireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
More informationWI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION
WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION Ingenico is often asked: what are the differences between Bluetooth and Wi-Fi technologies, which is the best one,
More informationBasic Network Design
Frequency Reuse and Planning Cellular Technology enables mobile communication because they use of a complex two-way radio system between the mobile unit and the wireless network. It uses radio frequencies
More informationWIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
More informationIntroductory Concepts
Chapter 1 Introductory Concepts 1.1 Introduction Communication is one of the integral parts of science that has always been a focus point for exchanging information among parties at locations physically
More informationHow To Know If You Are Safe To Use An Antenna (Wired) Or Wireless (Wireless)
1 2 The range of RF spans 3 KHz (3000 Hz) to 300 GHz (300 million Hz) Frequencies of RF devices range from the low frequency AM broadcasts (80 MHz) to higher frequency mobile phones (1900 MHz) smart meters
More informationSmartDiagnostics Application Note Wireless Interference
SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine
More informationGSM Risks and Countermeasures
GSM Risks and Countermeasures STI Group Discussion and Written Project Authors: Advisor: Johannes Ullrich Accepted: February 1, 2010 Abstract Recent research has shown that GSM encryption can be cracked
More information10. Wireless Networks
Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221
More informationCS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
More informationGuide for wireless environments
Sanako Study Guide for wireless environments 1 Contents Sanako Study... 1 Guide for wireless environments... 1 What will you find in this guide?... 3 General... 3 Disclaimer... 3 Requirements in brief...
More informationTesting a Wireless LAN
Chapter 17 Testing a Wireless LAN This chapter will introduce you to: Wireless LAN Testing Considerations Signal Coverage Testing Performance Testing In-Motion Testing Security Vulnerability Testing Acceptance/Verification
More informationChapter 3 Safeguarding Your Network
Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate
More informationLoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0
LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does
More informationROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK
ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK The Rogue Access Point Problem One of the most challenging security concerns for IT managers today is the
More informationLTE Test: EE 4G Network Performance
LTE Test: EE 4G Network Performance An Analysis of Coverage, Speed, Latency and related key performance indicators, from October 31 st to December 20 th, 2012. Disclaimer Epitiro has used its best endeavours
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
More informationWHITE PAPER. WEP Cloaking for Legacy Encryption Protection
WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area
More informationHigh-Density Wi-Fi. Application Note
High-Density Wi-Fi Application Note Table of Contents Background... 3 Description... 3 Theory of Operation... 3 Application Examples... Tips and Recommendations... 7 2 Background One of the biggest challenges
More informationVirtual Access Points
Virtual Access Points Performance Impacts in an 802.11 environment and Alternative Solutions to overcome the problems By Thenu Kittappa Engineer Author: Thenu Kittappa Page 1 Virtual Access Points... 1
More informationWireless Phone GSM tracking. Denis Foo Kune, John Koelndorfer, Nick Hopper, Yongdae Kim
Wireless Phone GSM tracking Denis Foo Kune, John Koelndorfer, Nick Hopper, Yongdae Kim Can someone track your phone? GPS Need access to phone Cell network trilateration/triangulation Multiple base stations
More informationLegacy 802.11 Security
Legacy 802.11 Security Contents Authentication Open System Authentication Shared Key Authentication Wired Equivalent Privacy (WEP) Encryption Virtual Private Networks (VPNs) Point-to-Point Tunneling Protocol
More informationTHE SUNSET OF. A KORE White Paper Better Coverage, Choice & Reliability
THE SUNSET OF 2G A KORE White Paper Better Coverage, Choice & Reliability The dawn of 4G LTE connectivity brings with it new possibilities for connectivity and mobile devices. But as the introduction of
More informationComputer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1
Computer Networks Wireless and Mobile Networks László Böszörményi Computer Networks Mobile - 1 Background Number of wireless (mobile) phone subscribers now exceeds number of wired phone subscribers! Computer
More informationWireless Broadband Access
Wireless Broadband Access (Brought to you by RMRoberts.com) Mobile wireless broadband is a term used to describe wireless connections based on mobile phone technology. Broadband is an electronics term
More informationCellular Analysis for Legal Professionals Larry E. Daniel Digital Forensic Examiner and Cellular Analyst EnCE, DFCP, BCE, ACE, CTNS, AME
Cellular Analysis for Legal Professionals Larry E. Daniel Digital Forensic Examiner and Cellular Analyst EnCE, DFCP, BCE, ACE, CTNS, AME Copyright 2015, Guardian Digital Forensics Cellular Telephone Easy
More informationCHAPTER 1 1 INTRODUCTION
CHAPTER 1 1 INTRODUCTION 1.1 Wireless Networks Background 1.1.1 Evolution of Wireless Networks Figure 1.1 shows a general view of the evolution of wireless networks. It is well known that the first successful
More informationVersion Date Author Changes - 6/24/2005 D. Liff Initial draft and release 1.0 11/18/2005 K. Adkins Minor spelling and format changes 1.
1 Version Date Author Changes - 6/24/2005 D. Liff Initial draft and release 1.0 11/18/2005 K. Adkins Minor spelling and format changes 1.1 08/19/2008 D. Liff Added 802.11.n information 1.2 11/09/2010 J.
More informationWireless Local Area Network Deployment and Security Practices
HIGHLIGHTS AUDIT REPORT Wireless Local Area Network Deployment and April 24, 2014 Report Number HIGHLIGHTS BACKGROUND: The U.S. Postal Service is committed to providing a high quality, secure, and cost-effective
More informationHow To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
More informationTop 10 Security Checklist for SOHO Wireless LANs
Expert Reference Series of White Papers Top 10 Security Checklist for SOHO Wireless LANs 1-800-COURSES www.globalknowledge.com Top 10 Security Checklist for SOHO Wireless LANs David Coleman, AirSpy Networks
More informationChapter 3 Cellular Networks. Wireless Network and Mobile Computing Professor: Dr. Patrick D. Cerna
Chapter 3 Cellular Networks Wireless Network and Mobile Computing Professor: Dr. Patrick D. Cerna Objectives! Understand Cellular Phone Technology! Know the evolution of evolution network! Distinguish
More informationWireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
More informationConnecting your Aiki phone to a network
Connecting your Aiki phone to a network Connect to mobile networks Depending on your carrier and service plan, your phone may connect automatically to your carrier s fastest available data network. Or
More informationDepartment of Public Safety and Correctional Services. Non-Jamming Cell Phone Pilot Summary
Department of Public Safety and Correctional Services Non-Jamming Cell Phone Pilot Summary January 20, 2010 INTRODUCTION The Department s Cell Phone Pilot is a follow-up to the September 2009 Cell Phone
More informationSite Survey and RF Design Validation
CHAPTER 8 Site Survey Introduction In the realm of wireless networking, careful planning is essential to ensure that your wireless network performs in a manner that is consistent with Cisco s design and
More informationWLAN Positioning Technology White Paper
WLAN Positioning Technology White Paper Issue 1.0 Date 2014-04-24 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationCanopy Wireless Internet Platform Frequently Asked Questions. August, 9 2002
Canopy Wireless Internet Platform Frequently Asked Questions August, 9 2002 Frequently Asked Questions Technology Q: What is a Canopy system? A: A Canopy system is based on wireless broadband technology
More informationSPYTEC 3000 The system for GSM communication monitoring
SPYTEC 3000 The system for GSM communication monitoring The SPYTEC 3000 system is intended for passive (if system encryption is absent of if A5.2 encryption is used) or semi-active (if A5.1 encryption
More informationQuick Start Guide v1.0. This Quick Start Guide is relevant to Laird s BT800, BT810 and BT820 Bluetooth modules.
v1.0 This is relevant to Laird s BT800, BT810 and BT820 Bluetooth modules. INTRODUCTION The Linux operating system, and Android by extension, has excellent USB support for a variety of devices. This makes
More informationEnterprise A Closer Look at Wireless Intrusion Detection:
White Paper Enterprise A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Josh Wright Senior Security Researcher Introduction As wireless enterprise networks become
More informationThe Wireless Network Road Trip
The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in
More informationSubtitle. VoIP Trends. What to Expect in 2016. VoIP 2016 Compare Business Products 2015 1
Subtitle VoIP Trends What to Expect in 2016 VoIP 2016 Compare Business Products 2015 1 Contents The VoIP Market Is Set to Grow... 3 Nomadic VoIP Stakes a Claim... 4 Some Key Technologies for 2016... 5
More informationEnvironmental Monitoring: Guide to Selecting Wireless Communication Solutions
Environmental Monitoring: Guide to Selecting Wireless Communication Solutions By: Scott South Published in WaterWorld, January 2005 (Page 48) Rapidly growing demands for information and increased productivity
More informationDemystifying Wi-Fi Roaming
EDUCATIONAL BRIEF Demystifying Wi-Fi Roaming What You Need to Know to Avoid Costly Mistakes A wide variety of modern conveniences are made possible through Wi-Fi Networking. Home automation, real-time
More informationModule 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular
More informationEPS and Network Engineering
Introduction This application note explains the functions and applications of a powerful unique feature of the SeeGull EX and MX Scanning Receivers: the Enhanced Power Scan (EPS). Unlike standard tools,
More informationNode A. Universal Multi-Band, Multi-Service, Software-Based Repeater Platform. So Flexible You Can Accommodate Just About Any Application Requirement
Node A Universal Multi-Band, Multi-Service, Software-Based Repeater Platform So Flexible You Can Accommodate Just About Any Application Requirement Node A Universal Multi-Band, Multi-Serv The Standard
More informationCrestron Best Practices for Installation and Setup of Crestron RF Products Reference Guide
Crestron Best Practices for Installation and Setup of Crestron RF Products Reference Guide The specific patents that cover Crestron products are listed at patents.crestron.com. Crestron, the Crestron logo,
More informationTECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012
TECHNICAL NOTE GoFree WIFI-1 web interface settings Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 1/14 Web interface settings under admin mode Figure 1: web interface admin log
More informationWiLink 8 Solutions. Coexistence Solution Highlights. Oct 2013
WiLink 8 Solutions Coexistence Solution Highlights Oct 2013 1 Products on market with TI connectivity 2004 2007 2009-11 2013 Use cases: BT voice, WLAN data Features: TDM based operation Strict protection
More informationA Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Table of Contents Introduction 3 Deployment approaches 3 Overlay monitoring 3 Integrated monitoring 4 Hybrid
More informationWireless Network Standard
Last Modified: 10/20/15 Wireless Network Standard Purpose The standard and guidelines described in this document will ensure the uniformity of wireless network access points at the University of Georgia.
More informationTop 10 Security Checklist for SOHO Wireless LANs
Introduction Corporations, government agencies, the military, and enterprises in fact all medium to large scale wireless LANs have a different set of security requirements compared to the wireless LAN
More informationWireless (Select Models Only) User Guide
Wireless (Select Models Only) User Guide Copyright 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its
More informationVALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203.
VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year & Semester : VII/ IV Section : CSE-1 & 2 Subject Code : CS2402 Subject Name : MOBILE
More informationOptimizing Wireless Networks.
from the makers of inssider Optimizing Wireless Networks. Over the past few years, MetaGeek has created tools to help users optimize their wireless networks. MetaGeek s tools help visualize the physical
More informationHow To Improve Data Speeds On A Mobile Phone In Australia
IMPROVING MOBILE INTERNET SPEEDS Introduction The purpose of this guide is to educate consumers on ways to improve their mobile internet speeds and offer an insight into how the mobile networks operate
More informationPwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure
PwC Outline Wireless LAN Security: Attacks and Countermeasures 1. Introduction 2. Problems with 802.11 security 3. Attacks on and risks to Wireless Networks 4. Defending wireless networks ISACA Hong Kong
More informationLogitech Advanced 2.4 GHz Technology
Logitech Advanced 2.4 GHz Technology Revision 1.1H March 2, 2009 TABLE OF CONTENTS 1 INTRODUCTION... 3 2 SYSTEM OVERVIEW... 4 2.1 NETWORK TOPOLOGY...4 2.2 MAIN FEATURES...4 3 ASSOCIATION MODEL... 5 4 ENCRYPTION...
More informationLTE-Advanced Carrier Aggregation Optimization
Nokia Networks LTE-Advanced Carrier Aggregation Optimization Nokia Networks white paper LTE-Advanced Carrier Aggregation Optimization Contents Introduction 3 Carrier Aggregation in live networks 4 Multi-band
More informationWhite Paper. Wireless Network Considerations for Mobile Collaboration
White Paper Wireless Network Considerations for Mobile Collaboration Table of Contents I. Introduction... 3 II. Wireless Considerations... 4 Channel Selection... 4 Interference... 4 Coverage... 5 Covering
More informationUS Postal Service - Effective Security Policies and Controls For Wireless Networks
Wireless Local Area Network Deployment and Security Practices Audit Report Report Number IT-AR-14-005-DR April 24, 2014 Highlights Our objectives were to determine whether the Postal Service has effective
More informationDOCUMENT REFERENCE: SQ312-003-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. May 2015
DOCUMENT REFERENCE: SQ312-003-EN SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper May 2015 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG STATUS OWNER DATED 312 003 EN FINAL JP
More informationTesting Wi-Fi Functionality in Medical Devices
Testing Wi-Fi Functionality in Medical Devices Originally Published: October 2013 A from Laird Technologies Applications on many medical devices require secure and persistent network connections. Hospitals
More informationECE/CS 372 introduction to computer networks. Lecture 13
ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:
More informationBroadband Technology Clinic. Burlington Telecom Advisory Board
Broadband Technology Clinic Burlington Telecom Advisory Board 1 What are the Defining Characteristics of a Broadband Service? Speed - Throughput capability both down and upstream Performance - Latency
More informationAlcatel-Lucent In-building Wireless Continuity Solution for Healthcare
S T R A T E G I C W H I T E P A P E R Alcatel-Lucent In-building Wireless Continuity Solution for Healthcare Healthcare facilities are under pressure to provide high-quality wireless coverage using a range
More informationImproving SCADA Operations Using Wireless Instrumentation
Improving SCADA Operations Using Wireless Instrumentation April 2010 / White paper by Hany Fouda Make the most of your energy Summary Executive Summary... p 2 Introduction... p 3 The Evolution of Wireless...
More informationINFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee
More informationCopyright 2014 Luxul. All rights reserved. All trademarks and registered trademarks are property of respective holders.
Copyright 2014 Luxul. All rights reserved. All trademarks and registered trademarks are property of respective holders. Things you need to know about Wi-Fi Roaming to avoid Costly Mistakes Martin Boulter,
More informationHow to Make Your Wireless LAN Work:
WHITE PAPER How to Make Your Wireless LAN Work: Design for Context, Coverage & Capacity February 2006 How to Make Your Wireless LAN Work: Design for Context, Coverage & Capacity 1 WLAN Design Challenges
More informationHOW W I R E L E S S T E C H N O L O G Y WORKS
HOW WORKS OW ORKS WHAT S INSIDE Inside your wireless phone, there is a compact speaker, a microphone, a keyboard, a display screen, and a powerful circuit board with microprocessors that make each phone
More informationCOMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION
COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION Answers to End-of-Chapter Questions Matching g 1. whiteboard i 2. sending device o 3. streaming j 4. WiFi m 5. Webcam d 6. data transfer
More informationThe data can be transmitted through a variety of different communications platforms such as:
COMMUNICATION NETWORK General Overview of SCADA Communications Without a properly designed communication network system, a SCADA system cannot exist. All supervisory control and data acquisition aspects
More informationScanning Delays in 802.11 Networks
Scanning Delays in 802.11 Networks David Murray Murdoch University D.Murray@murdoch.edu.au Michael Dixon Murdoch University M.Dixon@murdoch.edu.au Terry Koziniec Murdoch University T.Koziniec@murdoch.edu.au
More informationC Spire Indoor Cell Zone FAQs
C Spire Indoor Cell Zone FAQs General What is the C Spire Indoor Cell Zone? The Indoor Cell Zone enhances indoor coverage in your home or small office. It works like a miniature cell tower in your home
More informationChapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
More informationIMPROVING MOBILE SIGNAL
IMPROVING MOBILE SIGNAL Introduction The purpose of this guide is to educate consumers on ways to improve their mobile signal and also find the causes of their poor signal. One of the biggest complaints
More informationWireless (Select Models Only) User Guide
Wireless (Select Models Only) User Guide Copyright 2007, 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by
More informationBluetooth wireless technology basics
Bluetooth wireless technology basics Abstract... 2 Introduction... 2 How Bluetooth wireless technology works... 3 BWT network topologies... 4 BWT security... 5 Establishing BWT connections... 6 Activating
More informationChapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
More informationGSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010
Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010 Dennis Wehrle, Konrad Meier, Dirk von Suchodoletz, Klaus Rechert, Gerhard Schneider Overview 1. GSM Infrastructure
More informationdect provides high protection against unauthorized access
dect provides high protection against unauthorized access BACKGROUND 2 Wireless communication for voice and data is growing worldwide. The amount of DECT (Digital Enhanced Cordless Telecommunications)
More informationWireless Network Policy
Wireless Network Policy Purpose Guide the deployment and integrity of wireless networking on the Kettering University campus to ensure reliable, compatible, and secure operation Protect the security of
More informationWireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:
WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce
More informationMunicipal Mesh Network Design
White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves
More informationAir Marshal. White Paper
White Paper Air Marshal SEPTEMBER 2013 This document discusses potential security threats in a WiFi environment, and outlines how enterprises can use a best-in-class Wireless Intrusion Prevention System
More informationDOCUMENT REFERENCE: SQ312-002-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. March 2014
DOCUMENT REFERENCE: SQ312-002-EN SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper March 2014 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG STATUS OWNER DATED 312 002 EN FINAL
More informationWhat is DECT? DECT stands for Digital Enhanced Cordless Telecommunications.
DECT 6.0 vs 900 MHz vs 2.4GHz vs 5.8 GHz DECT 6.0 (1.9 GHz) 900 MHz 2.4 GHz 5.8 GHz FCC approved frequency for cordless telecommunication Baby monitors, microwave oven Wi-Fi electronics (routers), wireless
More informationBluetooth: Understanding the Technology, Its Vulnerabilities, and Security Recommendations
Bluetooth: Understanding the Technology, Its Vulnerabilities, and Security Recommendations 19 March 2015 Key Points Continuous development of Bluetooth technology is rapidly increasing the use of Bluetoothenabled
More informationCh 2.3.3 GSM PENN. Magda El Zarki - Tcom 510 - Spring 98
Ch 2.3.3 GSM In the early 80 s the European community decided to work together to define a cellular system that would permit full roaming in all countries and give the network providers freedom to provide
More information