Analysis of Methods for Mobile Device Tracking. David Nix Chief Scientific Advisor

Size: px
Start display at page:

Download "Analysis of Methods for Mobile Device Tracking. David Nix Chief Scientific Advisor"

Transcription

1 Analysis of Methods for Mobile Device Tracking David Nix Chief Scientific Advisor October 2013

2 Table of Contents 1. Document Purpose and Scope 3 2. Overview Mobile Device Penetration Mobile Device Tracking Options 3 3. Wireless Interfaces G/4G Discoverability Measurability Identification Viability Bluetooth Discoverability Measurability Identification Viability Wi-Fi Discoverability Measurability Identification Viability 6 4. Conclusions 6 5. References 7 October 2013 Page 2

3 1. Document Purpose and Scope This document describes the options for tracking mobile devices via their wireless interfaces, and ascertains the viability of each approach relative to a large indoor space, such as a retail store. 2. Overview 2.1 Mobile Device Penetration According to Pew Internet statistics from May of 2013, 91% of adults (18 years or older) in the United States own a mobile device. This number has steadily increased, most steeply amongst younger demographics. These mobile devices fall into roughly two categories: Feature phones. These phones refer to the original mobiles which specialize in voice calls only. The feature nomenclature stems from various features added by phone manufacturers to differentiate from competitor phones. These include built-in applications such as simple calendars, games, and texting services. Smartphones. These phones use hefty microprocessors and sophisticated operating systems that serve as a platform for an unlimited number of applications. The primary operating systems are Android, ios (Apple), and Windows. The ratio of smartphone ownership to feature phone ownership is approximately 2-to-1, meaning 61% of US adults own a smartphone, while 30% own a feature phone. Slightly more recent statistics from Nielsen show that smartphones make up 64% of the ownership. More importantly, smartphones comprised 80% of mobile devices sold in the three months prior to the report. The ownership percentages are highest amongst younger demographics. For example, 97% of year olds own a mobile device, and 80% own a smartphone. The rising ownership of mobile devices combined with the steady increase of smartphones as a share of overall mobile devices, particularly amongst the young, signifies two things: The number of adults owning mobile devices in the U.S. will approach 100% over the next decade. The portion of that number who own smartphones will increase, eventually approaching 100% as feature phones are phased out due to market pressure from smartphone sales. The current split amongst smartphone operating systems is: Android: 53% ios (Apple): 40% Windows: 2% Other: 5% The Android share is growing fastest. 2.2 Mobile Device Tracking Options Mobile device penetration and share statistics are important to mobile device tracking when considering the differences between feature phones and smartphone relative to wireless interfaces. Mobile devices have a combination of up to three radio interfaces: October 2013 Page 3

4 3G/4G Bluetooth Wi-Fi (IEEE ) The primary function of virtually all wireless devices is to provide cellular access to voice and data networks. In marketing lingo, this connectivity is referred to a 3G/4G. The 3G/4G radio can connect to cell towers up to several kilometers distant, where range is affected by the presence of obstacles such as walls, ceilings, buildings, and hills. Virtually all smartphones and most feature phones also incorporate Bluetooth radios. These are primarily used for wirelessly connecting to nearby, low bandwidth peripherals such as headsets and keyboards. The Bluetooth radios in most mobiles have an effective range of about 10 meters, with some connectivity up to 30 meters line-of-sight. Virtually all smartphones but very few feature phones also incorporate Wi-Fi radios. These are used for wirelessly connecting to data networks at higher effective bandwidths ranging from 5 Mbps to over 100 Mbps. The range of Wi-Fi radios on mobile devices varies from 50 meters to hundreds of meters, depending on the transmit power of Wi-Fi Access Points, the presence of obstacles such as walls and floors, and the presence of other RF interference. In theory, any one of the three wireless interfaces can be used for location tracking as long as it meets the following minimum criteria: Discoverability: The location tracking node can discover the presence of a mobile device using the particular wireless interface. In short, the location tracking node must be able to intercept mobile device transmissions or prompt mobile devices to transmit. Measurability: The complementary wireless interface on the location tracking node must be able to measure Received Signal Strength (RSS) of the transmitting device. Identification: The mobile device must expose a unique identifier in a detectable packet. The unique identifier must be unencrypted and must not vary from appearance to appearance. The remaining sections discuss the minimum criteria per interface. 3. Wireless Interfaces 3.1 3G/4G Discoverability After power on, a GSM mobile scans RF channels for a Broadcast Control Channel (BCCH) with the strongest signal. The BCCH is emitted by the Base Station at a cell tower periodically at frequent intervals. The mobile listens passively until it is ready to register its location with the Base Station. At that time the mobile initiates a location update procedure where it requests association with Base Station. The update procedure, which includes authentication, is very brief no more than a few seconds. After successful location update, the mobile passively monitors the Base Station indefinitely. The mobile only emits signals under the following conditions: - The Base Station broadcasts a paging request for the particular mobile device because it has an incoming call or data for the device. Once connected, the mobile will continue transmitting for the duration of the call or data transfer. - The mobile wishes to initiate a call or transfer data, whereupon it issues a channel request to the Base Station to start the process. Once connected, the mobile will continue transmitting for the duration of the call or data transfer. In summary, the GSM mobile only transmits evidence of its presence when changing its location from one Base Station to another, and when it originates or receives a call. October 2013 Page 4

5 The competing CDMA protocol behaves much the same way for the same underlying reason: minimizing power by keeping the radio off most of the time Measurability GSM and CDMA radios can identify the RSSI of each signal and report this upstream. Some radios swallow the RSSI information in the firmware, while some pass the data up to the drivers. The behavior is vendor specific Identification GSM assigns unique numbers to each mobile device (IMEI) and each mobile subscriber (IMSI). For example, each mobile phone has a hardwired IMEI, and each SIM card stores an IMSI. Therefore, the Base Station can identify not only each unique phone, but the unique subscriber using the phone (e.g. which SIM card is installed in the phone). The competing CDMA protocol also uses the IMSI as a subscriber identifier Viability In terms of passively sniffing for the presence of mobile devices, GSM presents many difficulties. First and foremost, GSM mobile devices are effectively invisible unless actively involved in a call or during a period of data transfer. This results in an inability for a passive sniffer to deterministically track the presence of a GSM mobile. The only way to deterministically track the presence of a GSM phone is for the sniffer to masquerade as a Base Station whose signal strength is higher than those of surrounding cell towers. This would cause the mobile devices in the vicinity to attempt a location update with the sniffer. This practice has been used successfully by hackers and law enforcement. However, each sniffer would cost more than $1000 to construct. Worse, the service providers paid billions of dollars for the right to use the GSM spectrum, so FCC rules prohibit anyone other than the service providers from using the spectrum at GSM transmit levels. The construction of an active sniffer would undoubtedly bring down an army of attorneys from the service provider and stiff fines from the FCC. For this reason alone, an active GSM sniffer is not viable. The competing CDMA protocol faces similar obstacles: there is not enough information on air for passive sniffing, and active sniffers are expensive and illegal. 3.2 Bluetooth Discoverability Passive discovery of Bluetooth devices is relatively straightforward because most Bluetooth devices periodically issue Inquiry or Page packets to discover or attempt association with other Bluetooth devices. However, a more deterministic mechanism for discovering other devices is for an active sniffer to issue frequent Inquiry packets on all channels. The sniffer would start with the first channel, issue an Inquiry packet, and listen for Inquiry responses for some number of milliseconds before repeating the process on the next channel. This works because Bluetooth devices are required to respond to Inquiry packets. Bluetooth radios in typical mobile devices are Class 2, meaning a theoretical range of 30 meters but a realistic range of about 10 meters. Class 1 radios work at up to 100 meters with realistic ranges of 30 meters Measurability Bluetooth radios can identify the RSSI of each signal and report this upstream. Some radios swallow the RSSI information in the firmware, while some pass the data up to the drivers. The behavior is vendor specific Identification Bluetooth Inquiries expose the MAC address of each radio. The MAC address is unique to each radio, so it can serve as a unique consumer identifier. October 2013 Page 5

6 3.2.4 Viability An active Bluetooth sniffer is inexpensive and simple to implement. In fact, Linux includes built-in sniffing support. Getting the RSSI might prove more challenging, but it is doable. Furthermore, Bluetooth operates in public spectrum, so active sniffers violate no FCC rules or laws. The primary drawback of Bluetooth as a tracking mechanism is the limited range. The common Class 2 Bluetooth radio is only reasonably detectable within 10 to 20 meters of the sniffer. A dense configuration of sniffers would be needed to track consumers throughout a retail area. 3.3 Wi-Fi Discoverability Wi-Fi access points can be discovered simply by listening for beacons. However, because Access Points broadcast beacons approximately every 100 milliseconds, scanning all channels (as many as 60) may take multiple seconds. To make matters worse, client devices (non-access Points) do not beacon. Fortunately, Wi-Fi allows a mobile device to issue a Probe Request on a channel. Every Access Point and mobile device must respond to the Probe Request with identity information. As such, an active sniffer that sends Probe Requests on every channel can determine the presence of every other Wi-Fi device in range, and relatively quickly. In addition, the sniffer can infer the presence of hidden nodes and cloaked devices by intercepting other Wi-Fi packets. Most mobile devices issue Probe Requests instead of waiting for beacons to save power, making them even more visible to a sniffer. The range of Wi-Fi, typically 50 to several hundred meters even in enclosed spaces, allows a sniffer to detect devices in a large area. The primary drawback of Wi-Fi as a tracker is that it only works if the Wi-Fi radio is enabled on the mobile device. To save battery life, many users turn Wi-Fi off when not using it. However, the recent 4.3 Android release leaves the radio on in a reduced activity state even when the user has turned it off. The behavior can be overridden, but the typical user is unlikely to do so. In short, any Apple, Windows, or pre-4.3 Android phone with Wi-Fi turned off will not be detectable. Any other device will respond to Probe Requests or issue periodic Probe Requests or beacons Measurability Wi-Fi radios can identify the RSSI of each signal and report this upstream. Wi-Fi supports monitoring mode, which is implemented by a majority of vendor solutions. Monitoring mode allows the upstream drivers to obtain every received packet, while still supporting the ability to send Probe Requests Identification Wi-Fi Probe Responses expose the MAC address of each radio. The MAC address is unique to each radio, so it can serve as a unique consumer identifier. Other packets also expose MAC or related information, allowing the sniffer to also use other types of packets for identification Viability Given the existence of well-supported sniffer programs, inexpensive Wi-Fi hardware, and a protocol that allows the sniffer to quickly and comprehensively find mobile devices, Wi-Fi is an ideal method to locate subscribers. The long range of the signal allows for good coverage in a retail environment. Furthermore, Wi-Fi operates in public spectrum, so active sniffers violate no FCC rules or laws. 4. Conclusions In practice, 3G/4G tracking is not viable without the assistance of service providers. Such assistance is highly unlikely given service provider protectiveness of network equipment. Bluetooth tracking is limited due to the short range of the radios. Wi-Fi is the best of the available wireless interfaces when considering range, cost, and coverage of users. October 2013 Page 6

7 The coverage of Wi-Fi as a detection method is a function of the number of consumers with Wi-Fi enabled devices and the behavior of the consumer in terms of turning Wi-Fi on or off and carrying their Wi-Fi devices with them. As mentioned earlier, approximately 60% of consumers own a Wi-Fi capable device, and that number is growing. No study was found that measured consumer behavior regarding enabling/disabling Wi-Fi. However, over half of the smartphones are Android based and that segment is growing. New Android releases allow Wi-Fi to continue scanning and probing by default even when the consumer turns Wi-Fi off. Assuming Android continues this practice, the percentage of smartphones that are always detectable should increase over time. A possible improvement on Wi-Fi is Wi-Fi and Bluetooth working together. The primary drawback of using both simultaneously is that each radio reports a unique MAC address. Correlating a Wi-Fi signal and a Bluetooth signal as belonging to the same phone could be difficult. However, after multiple visits of the same consumer and through some logic of elimination, the sniffer system might be able to correlate the MAC addresses such that the presence of either radio is enough to recognize a consumer. In that case, the Bluetooth RSSI might be helpful in calculating locations that are nearby, while Wi-Fi RSSI is more suited to the wider area location. Also, Bluetooth would help discover consumers whose mobiles either did not support Wi-Fi or had Wi-Fi turned off. 5. References Brenner, Joanna. Pew Internet Commentary: Mobile. 18 September Taken from Patterson, Sean. U.S. Smartphone Penetration Hits 64%, Young Lead the Way. 19 September Taken from October 2013 Page 7

Wireless LANs vs. Wireless WANs

Wireless LANs vs. Wireless WANs White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

Chapter 2 Wireless Settings and Security

Chapter 2 Wireless Settings and Security Chapter 2 Wireless Settings and Security This chapter describes how to set up the wireless features of your WGT624 v4 wireless router. In planning your wireless network, select a location for the wireless

More information

communication over wireless link handling mobile user who changes point of attachment to network

communication over wireless link handling mobile user who changes point of attachment to network Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet

More information

Chapter 2 Configuring Your Wireless Network and Security Settings

Chapter 2 Configuring Your Wireless Network and Security Settings Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless

More information

Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ

Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION Ingenico is often asked: what are the differences between Bluetooth and Wi-Fi technologies, which is the best one,

More information

Basic Network Design

Basic Network Design Frequency Reuse and Planning Cellular Technology enables mobile communication because they use of a complex two-way radio system between the mobile unit and the wireless network. It uses radio frequencies

More information

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006 WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able

More information

Introductory Concepts

Introductory Concepts Chapter 1 Introductory Concepts 1.1 Introduction Communication is one of the integral parts of science that has always been a focus point for exchanging information among parties at locations physically

More information

How To Know If You Are Safe To Use An Antenna (Wired) Or Wireless (Wireless)

How To Know If You Are Safe To Use An Antenna (Wired) Or Wireless (Wireless) 1 2 The range of RF spans 3 KHz (3000 Hz) to 300 GHz (300 million Hz) Frequencies of RF devices range from the low frequency AM broadcasts (80 MHz) to higher frequency mobile phones (1900 MHz) smart meters

More information

SmartDiagnostics Application Note Wireless Interference

SmartDiagnostics Application Note Wireless Interference SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine

More information

GSM Risks and Countermeasures

GSM Risks and Countermeasures GSM Risks and Countermeasures STI Group Discussion and Written Project Authors: Advisor: Johannes Ullrich Accepted: February 1, 2010 Abstract Recent research has shown that GSM encryption can be cracked

More information

10. Wireless Networks

10. Wireless Networks Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

Guide for wireless environments

Guide for wireless environments Sanako Study Guide for wireless environments 1 Contents Sanako Study... 1 Guide for wireless environments... 1 What will you find in this guide?... 3 General... 3 Disclaimer... 3 Requirements in brief...

More information

Testing a Wireless LAN

Testing a Wireless LAN Chapter 17 Testing a Wireless LAN This chapter will introduce you to: Wireless LAN Testing Considerations Signal Coverage Testing Performance Testing In-Motion Testing Security Vulnerability Testing Acceptance/Verification

More information

Chapter 3 Safeguarding Your Network

Chapter 3 Safeguarding Your Network Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate

More information

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0 LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does

More information

ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK

ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK The Rogue Access Point Problem One of the most challenging security concerns for IT managers today is the

More information

LTE Test: EE 4G Network Performance

LTE Test: EE 4G Network Performance LTE Test: EE 4G Network Performance An Analysis of Coverage, Speed, Latency and related key performance indicators, from October 31 st to December 20 th, 2012. Disclaimer Epitiro has used its best endeavours

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,

More information

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area

More information

High-Density Wi-Fi. Application Note

High-Density Wi-Fi. Application Note High-Density Wi-Fi Application Note Table of Contents Background... 3 Description... 3 Theory of Operation... 3 Application Examples... Tips and Recommendations... 7 2 Background One of the biggest challenges

More information

Virtual Access Points

Virtual Access Points Virtual Access Points Performance Impacts in an 802.11 environment and Alternative Solutions to overcome the problems By Thenu Kittappa Engineer Author: Thenu Kittappa Page 1 Virtual Access Points... 1

More information

Wireless Phone GSM tracking. Denis Foo Kune, John Koelndorfer, Nick Hopper, Yongdae Kim

Wireless Phone GSM tracking. Denis Foo Kune, John Koelndorfer, Nick Hopper, Yongdae Kim Wireless Phone GSM tracking Denis Foo Kune, John Koelndorfer, Nick Hopper, Yongdae Kim Can someone track your phone? GPS Need access to phone Cell network trilateration/triangulation Multiple base stations

More information

Legacy 802.11 Security

Legacy 802.11 Security Legacy 802.11 Security Contents Authentication Open System Authentication Shared Key Authentication Wired Equivalent Privacy (WEP) Encryption Virtual Private Networks (VPNs) Point-to-Point Tunneling Protocol

More information

THE SUNSET OF. A KORE White Paper Better Coverage, Choice & Reliability

THE SUNSET OF. A KORE White Paper Better Coverage, Choice & Reliability THE SUNSET OF 2G A KORE White Paper Better Coverage, Choice & Reliability The dawn of 4G LTE connectivity brings with it new possibilities for connectivity and mobile devices. But as the introduction of

More information

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1

Computer Networks. Wireless and Mobile Networks. László Böszörményi Computer Networks Mobile - 1 Computer Networks Wireless and Mobile Networks László Böszörményi Computer Networks Mobile - 1 Background Number of wireless (mobile) phone subscribers now exceeds number of wired phone subscribers! Computer

More information

Wireless Broadband Access

Wireless Broadband Access Wireless Broadband Access (Brought to you by RMRoberts.com) Mobile wireless broadband is a term used to describe wireless connections based on mobile phone technology. Broadband is an electronics term

More information

Cellular Analysis for Legal Professionals Larry E. Daniel Digital Forensic Examiner and Cellular Analyst EnCE, DFCP, BCE, ACE, CTNS, AME

Cellular Analysis for Legal Professionals Larry E. Daniel Digital Forensic Examiner and Cellular Analyst EnCE, DFCP, BCE, ACE, CTNS, AME Cellular Analysis for Legal Professionals Larry E. Daniel Digital Forensic Examiner and Cellular Analyst EnCE, DFCP, BCE, ACE, CTNS, AME Copyright 2015, Guardian Digital Forensics Cellular Telephone Easy

More information

CHAPTER 1 1 INTRODUCTION

CHAPTER 1 1 INTRODUCTION CHAPTER 1 1 INTRODUCTION 1.1 Wireless Networks Background 1.1.1 Evolution of Wireless Networks Figure 1.1 shows a general view of the evolution of wireless networks. It is well known that the first successful

More information

Version Date Author Changes - 6/24/2005 D. Liff Initial draft and release 1.0 11/18/2005 K. Adkins Minor spelling and format changes 1.

Version Date Author Changes - 6/24/2005 D. Liff Initial draft and release 1.0 11/18/2005 K. Adkins Minor spelling and format changes 1. 1 Version Date Author Changes - 6/24/2005 D. Liff Initial draft and release 1.0 11/18/2005 K. Adkins Minor spelling and format changes 1.1 08/19/2008 D. Liff Added 802.11.n information 1.2 11/09/2010 J.

More information

Wireless Local Area Network Deployment and Security Practices

Wireless Local Area Network Deployment and Security Practices HIGHLIGHTS AUDIT REPORT Wireless Local Area Network Deployment and April 24, 2014 Report Number HIGHLIGHTS BACKGROUND: The U.S. Postal Service is committed to providing a high quality, secure, and cost-effective

More information

How To Make A Multi-User Communication Efficient

How To Make A Multi-User Communication Efficient Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the

More information

Top 10 Security Checklist for SOHO Wireless LANs

Top 10 Security Checklist for SOHO Wireless LANs Expert Reference Series of White Papers Top 10 Security Checklist for SOHO Wireless LANs 1-800-COURSES www.globalknowledge.com Top 10 Security Checklist for SOHO Wireless LANs David Coleman, AirSpy Networks

More information

Chapter 3 Cellular Networks. Wireless Network and Mobile Computing Professor: Dr. Patrick D. Cerna

Chapter 3 Cellular Networks. Wireless Network and Mobile Computing Professor: Dr. Patrick D. Cerna Chapter 3 Cellular Networks Wireless Network and Mobile Computing Professor: Dr. Patrick D. Cerna Objectives! Understand Cellular Phone Technology! Know the evolution of evolution network! Distinguish

More information

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman 1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers

More information

Connecting your Aiki phone to a network

Connecting your Aiki phone to a network Connecting your Aiki phone to a network Connect to mobile networks Depending on your carrier and service plan, your phone may connect automatically to your carrier s fastest available data network. Or

More information

Department of Public Safety and Correctional Services. Non-Jamming Cell Phone Pilot Summary

Department of Public Safety and Correctional Services. Non-Jamming Cell Phone Pilot Summary Department of Public Safety and Correctional Services Non-Jamming Cell Phone Pilot Summary January 20, 2010 INTRODUCTION The Department s Cell Phone Pilot is a follow-up to the September 2009 Cell Phone

More information

Site Survey and RF Design Validation

Site Survey and RF Design Validation CHAPTER 8 Site Survey Introduction In the realm of wireless networking, careful planning is essential to ensure that your wireless network performs in a manner that is consistent with Cisco s design and

More information

WLAN Positioning Technology White Paper

WLAN Positioning Technology White Paper WLAN Positioning Technology White Paper Issue 1.0 Date 2014-04-24 HUAWEI TECHNOLOGIES CO., LTD. 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Canopy Wireless Internet Platform Frequently Asked Questions. August, 9 2002

Canopy Wireless Internet Platform Frequently Asked Questions. August, 9 2002 Canopy Wireless Internet Platform Frequently Asked Questions August, 9 2002 Frequently Asked Questions Technology Q: What is a Canopy system? A: A Canopy system is based on wireless broadband technology

More information

SPYTEC 3000 The system for GSM communication monitoring

SPYTEC 3000 The system for GSM communication monitoring SPYTEC 3000 The system for GSM communication monitoring The SPYTEC 3000 system is intended for passive (if system encryption is absent of if A5.2 encryption is used) or semi-active (if A5.1 encryption

More information

Quick Start Guide v1.0. This Quick Start Guide is relevant to Laird s BT800, BT810 and BT820 Bluetooth modules.

Quick Start Guide v1.0. This Quick Start Guide is relevant to Laird s BT800, BT810 and BT820 Bluetooth modules. v1.0 This is relevant to Laird s BT800, BT810 and BT820 Bluetooth modules. INTRODUCTION The Linux operating system, and Android by extension, has excellent USB support for a variety of devices. This makes

More information

Enterprise A Closer Look at Wireless Intrusion Detection:

Enterprise A Closer Look at Wireless Intrusion Detection: White Paper Enterprise A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Josh Wright Senior Security Researcher Introduction As wireless enterprise networks become

More information

The Wireless Network Road Trip

The Wireless Network Road Trip The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in

More information

Subtitle. VoIP Trends. What to Expect in 2016. VoIP 2016 Compare Business Products 2015 1

Subtitle. VoIP Trends. What to Expect in 2016. VoIP 2016 Compare Business Products 2015 1 Subtitle VoIP Trends What to Expect in 2016 VoIP 2016 Compare Business Products 2015 1 Contents The VoIP Market Is Set to Grow... 3 Nomadic VoIP Stakes a Claim... 4 Some Key Technologies for 2016... 5

More information

Environmental Monitoring: Guide to Selecting Wireless Communication Solutions

Environmental Monitoring: Guide to Selecting Wireless Communication Solutions Environmental Monitoring: Guide to Selecting Wireless Communication Solutions By: Scott South Published in WaterWorld, January 2005 (Page 48) Rapidly growing demands for information and increased productivity

More information

Demystifying Wi-Fi Roaming

Demystifying Wi-Fi Roaming EDUCATIONAL BRIEF Demystifying Wi-Fi Roaming What You Need to Know to Avoid Costly Mistakes A wide variety of modern conveniences are made possible through Wi-Fi Networking. Home automation, real-time

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular

More information

EPS and Network Engineering

EPS and Network Engineering Introduction This application note explains the functions and applications of a powerful unique feature of the SeeGull EX and MX Scanning Receivers: the Enhanced Power Scan (EPS). Unlike standard tools,

More information

Node A. Universal Multi-Band, Multi-Service, Software-Based Repeater Platform. So Flexible You Can Accommodate Just About Any Application Requirement

Node A. Universal Multi-Band, Multi-Service, Software-Based Repeater Platform. So Flexible You Can Accommodate Just About Any Application Requirement Node A Universal Multi-Band, Multi-Service, Software-Based Repeater Platform So Flexible You Can Accommodate Just About Any Application Requirement Node A Universal Multi-Band, Multi-Serv The Standard

More information

Crestron Best Practices for Installation and Setup of Crestron RF Products Reference Guide

Crestron Best Practices for Installation and Setup of Crestron RF Products Reference Guide Crestron Best Practices for Installation and Setup of Crestron RF Products Reference Guide The specific patents that cover Crestron products are listed at patents.crestron.com. Crestron, the Crestron logo,

More information

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 TECHNICAL NOTE GoFree WIFI-1 web interface settings Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 1/14 Web interface settings under admin mode Figure 1: web interface admin log

More information

WiLink 8 Solutions. Coexistence Solution Highlights. Oct 2013

WiLink 8 Solutions. Coexistence Solution Highlights. Oct 2013 WiLink 8 Solutions Coexistence Solution Highlights Oct 2013 1 Products on market with TI connectivity 2004 2007 2009-11 2013 Use cases: BT voice, WLAN data Features: TDM based operation Strict protection

More information

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Table of Contents Introduction 3 Deployment approaches 3 Overlay monitoring 3 Integrated monitoring 4 Hybrid

More information

Wireless Network Standard

Wireless Network Standard Last Modified: 10/20/15 Wireless Network Standard Purpose The standard and guidelines described in this document will ensure the uniformity of wireless network access points at the University of Georgia.

More information

Top 10 Security Checklist for SOHO Wireless LANs

Top 10 Security Checklist for SOHO Wireless LANs Introduction Corporations, government agencies, the military, and enterprises in fact all medium to large scale wireless LANs have a different set of security requirements compared to the wireless LAN

More information

Wireless (Select Models Only) User Guide

Wireless (Select Models Only) User Guide Wireless (Select Models Only) User Guide Copyright 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its

More information

VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203.

VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203. VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year & Semester : VII/ IV Section : CSE-1 & 2 Subject Code : CS2402 Subject Name : MOBILE

More information

Optimizing Wireless Networks.

Optimizing Wireless Networks. from the makers of inssider Optimizing Wireless Networks. Over the past few years, MetaGeek has created tools to help users optimize their wireless networks. MetaGeek s tools help visualize the physical

More information

How To Improve Data Speeds On A Mobile Phone In Australia

How To Improve Data Speeds On A Mobile Phone In Australia IMPROVING MOBILE INTERNET SPEEDS Introduction The purpose of this guide is to educate consumers on ways to improve their mobile internet speeds and offer an insight into how the mobile networks operate

More information

PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure

PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure PwC Outline Wireless LAN Security: Attacks and Countermeasures 1. Introduction 2. Problems with 802.11 security 3. Attacks on and risks to Wireless Networks 4. Defending wireless networks ISACA Hong Kong

More information

Logitech Advanced 2.4 GHz Technology

Logitech Advanced 2.4 GHz Technology Logitech Advanced 2.4 GHz Technology Revision 1.1H March 2, 2009 TABLE OF CONTENTS 1 INTRODUCTION... 3 2 SYSTEM OVERVIEW... 4 2.1 NETWORK TOPOLOGY...4 2.2 MAIN FEATURES...4 3 ASSOCIATION MODEL... 5 4 ENCRYPTION...

More information

LTE-Advanced Carrier Aggregation Optimization

LTE-Advanced Carrier Aggregation Optimization Nokia Networks LTE-Advanced Carrier Aggregation Optimization Nokia Networks white paper LTE-Advanced Carrier Aggregation Optimization Contents Introduction 3 Carrier Aggregation in live networks 4 Multi-band

More information

White Paper. Wireless Network Considerations for Mobile Collaboration

White Paper. Wireless Network Considerations for Mobile Collaboration White Paper Wireless Network Considerations for Mobile Collaboration Table of Contents I. Introduction... 3 II. Wireless Considerations... 4 Channel Selection... 4 Interference... 4 Coverage... 5 Covering

More information

US Postal Service - Effective Security Policies and Controls For Wireless Networks

US Postal Service - Effective Security Policies and Controls For Wireless Networks Wireless Local Area Network Deployment and Security Practices Audit Report Report Number IT-AR-14-005-DR April 24, 2014 Highlights Our objectives were to determine whether the Postal Service has effective

More information

DOCUMENT REFERENCE: SQ312-003-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. May 2015

DOCUMENT REFERENCE: SQ312-003-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. May 2015 DOCUMENT REFERENCE: SQ312-003-EN SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper May 2015 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG STATUS OWNER DATED 312 003 EN FINAL JP

More information

Testing Wi-Fi Functionality in Medical Devices

Testing Wi-Fi Functionality in Medical Devices Testing Wi-Fi Functionality in Medical Devices Originally Published: October 2013 A from Laird Technologies Applications on many medical devices require secure and persistent network connections. Hospitals

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information

Broadband Technology Clinic. Burlington Telecom Advisory Board

Broadband Technology Clinic. Burlington Telecom Advisory Board Broadband Technology Clinic Burlington Telecom Advisory Board 1 What are the Defining Characteristics of a Broadband Service? Speed - Throughput capability both down and upstream Performance - Latency

More information

Alcatel-Lucent In-building Wireless Continuity Solution for Healthcare

Alcatel-Lucent In-building Wireless Continuity Solution for Healthcare S T R A T E G I C W H I T E P A P E R Alcatel-Lucent In-building Wireless Continuity Solution for Healthcare Healthcare facilities are under pressure to provide high-quality wireless coverage using a range

More information

Improving SCADA Operations Using Wireless Instrumentation

Improving SCADA Operations Using Wireless Instrumentation Improving SCADA Operations Using Wireless Instrumentation April 2010 / White paper by Hany Fouda Make the most of your energy Summary Executive Summary... p 2 Introduction... p 3 The Evolution of Wireless...

More information

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008 INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee

More information

Copyright 2014 Luxul. All rights reserved. All trademarks and registered trademarks are property of respective holders.

Copyright 2014 Luxul. All rights reserved. All trademarks and registered trademarks are property of respective holders. Copyright 2014 Luxul. All rights reserved. All trademarks and registered trademarks are property of respective holders. Things you need to know about Wi-Fi Roaming to avoid Costly Mistakes Martin Boulter,

More information

How to Make Your Wireless LAN Work:

How to Make Your Wireless LAN Work: WHITE PAPER How to Make Your Wireless LAN Work: Design for Context, Coverage & Capacity February 2006 How to Make Your Wireless LAN Work: Design for Context, Coverage & Capacity 1 WLAN Design Challenges

More information

HOW W I R E L E S S T E C H N O L O G Y WORKS

HOW W I R E L E S S T E C H N O L O G Y WORKS HOW WORKS OW ORKS WHAT S INSIDE Inside your wireless phone, there is a compact speaker, a microphone, a keyboard, a display screen, and a powerful circuit board with microprocessors that make each phone

More information

COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION

COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION Answers to End-of-Chapter Questions Matching g 1. whiteboard i 2. sending device o 3. streaming j 4. WiFi m 5. Webcam d 6. data transfer

More information

The data can be transmitted through a variety of different communications platforms such as:

The data can be transmitted through a variety of different communications platforms such as: COMMUNICATION NETWORK General Overview of SCADA Communications Without a properly designed communication network system, a SCADA system cannot exist. All supervisory control and data acquisition aspects

More information

Scanning Delays in 802.11 Networks

Scanning Delays in 802.11 Networks Scanning Delays in 802.11 Networks David Murray Murdoch University D.Murray@murdoch.edu.au Michael Dixon Murdoch University M.Dixon@murdoch.edu.au Terry Koziniec Murdoch University T.Koziniec@murdoch.edu.au

More information

C Spire Indoor Cell Zone FAQs

C Spire Indoor Cell Zone FAQs C Spire Indoor Cell Zone FAQs General What is the C Spire Indoor Cell Zone? The Indoor Cell Zone enhances indoor coverage in your home or small office. It works like a miniature cell tower in your home

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

IMPROVING MOBILE SIGNAL

IMPROVING MOBILE SIGNAL IMPROVING MOBILE SIGNAL Introduction The purpose of this guide is to educate consumers on ways to improve their mobile signal and also find the causes of their poor signal. One of the biggest complaints

More information

Wireless (Select Models Only) User Guide

Wireless (Select Models Only) User Guide Wireless (Select Models Only) User Guide Copyright 2007, 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by

More information

Bluetooth wireless technology basics

Bluetooth wireless technology basics Bluetooth wireless technology basics Abstract... 2 Introduction... 2 How Bluetooth wireless technology works... 3 BWT network topologies... 4 BWT security... 5 Establishing BWT connections... 6 Activating

More information

Chapter 7 Low-Speed Wireless Local Area Networks

Chapter 7 Low-Speed Wireless Local Area Networks Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics

More information

GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010

GSM Research. Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010 Chair in Communication Systems Department of Applied Sciences University of Freiburg 2010 Dennis Wehrle, Konrad Meier, Dirk von Suchodoletz, Klaus Rechert, Gerhard Schneider Overview 1. GSM Infrastructure

More information

dect provides high protection against unauthorized access

dect provides high protection against unauthorized access dect provides high protection against unauthorized access BACKGROUND 2 Wireless communication for voice and data is growing worldwide. The amount of DECT (Digital Enhanced Cordless Telecommunications)

More information

Wireless Network Policy

Wireless Network Policy Wireless Network Policy Purpose Guide the deployment and integrity of wireless networking on the Kettering University campus to ensure reliable, compatible, and secure operation Protect the security of

More information

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN: WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce

More information

Municipal Mesh Network Design

Municipal Mesh Network Design White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves

More information

Air Marshal. White Paper

Air Marshal. White Paper White Paper Air Marshal SEPTEMBER 2013 This document discusses potential security threats in a WiFi environment, and outlines how enterprises can use a best-in-class Wireless Intrusion Prevention System

More information

DOCUMENT REFERENCE: SQ312-002-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. March 2014

DOCUMENT REFERENCE: SQ312-002-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. March 2014 DOCUMENT REFERENCE: SQ312-002-EN SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper March 2014 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG STATUS OWNER DATED 312 002 EN FINAL

More information

What is DECT? DECT stands for Digital Enhanced Cordless Telecommunications.

What is DECT? DECT stands for Digital Enhanced Cordless Telecommunications. DECT 6.0 vs 900 MHz vs 2.4GHz vs 5.8 GHz DECT 6.0 (1.9 GHz) 900 MHz 2.4 GHz 5.8 GHz FCC approved frequency for cordless telecommunication Baby monitors, microwave oven Wi-Fi electronics (routers), wireless

More information

Bluetooth: Understanding the Technology, Its Vulnerabilities, and Security Recommendations

Bluetooth: Understanding the Technology, Its Vulnerabilities, and Security Recommendations Bluetooth: Understanding the Technology, Its Vulnerabilities, and Security Recommendations 19 March 2015 Key Points Continuous development of Bluetooth technology is rapidly increasing the use of Bluetoothenabled

More information

Ch 2.3.3 GSM PENN. Magda El Zarki - Tcom 510 - Spring 98

Ch 2.3.3 GSM PENN. Magda El Zarki - Tcom 510 - Spring 98 Ch 2.3.3 GSM In the early 80 s the European community decided to work together to define a cellular system that would permit full roaming in all countries and give the network providers freedom to provide

More information