RAWDAD : A Wireless Data Archive for Researchers
|
|
- Jacob Griffin
- 6 years ago
- Views:
Transcription
1 RAWDAD : A Wireless Data Archive for Researchers Jihwang Yeo November 2007
2 Outline The Challenges of Measuring Wireless Network Dartmouth campus measurement Measurement Challenges Modeling CRAWDAD: A Wireless Data Archive for Researchers
3 The Challenges of Measuring Wireless Network Slides courtesy of David Kotz
4 Why measure? For better management Large WLANs need scalable management To manage you must monitor To monitor you must measure Where is there trouble... or trouble-makers? Where are your users? How and when do they move? What do they use the network for? How is it abused? Where should your network grow?
5 Why measure? For research and innovation To improve our understanding of user and network behavior. This understanding leads to better models. Better models are critical to innovation: network protocols distributed algorithms and applications deployment strategy
6 Wireless is not Wired Many inherent differences Wired medium: clear points of connection Wireless medium: physically dispersed Not everything is visible for measurement Mobility inspires new usage patterns Novel devices inspire new usage patterns protocol inspires new attacks
7
8 Dartmouth s wireless network Over 1000 APs Aruba AP 52 or AP 70
9 Dartmouth Campus 20,000 square meter 188 buildings (as of 2004) 50% Residential 20% Academic 14% Administrative 4% Library 12% Social 5,500 students and 1,200 professors Complete Wi-Fi coverage
10 1: Syslog data collection AP reports interesting events Authenticate Associate Deauthenticate Disassociate Record date, time, MAC, AP name Sent by access point to syslog recorder
11 2: SNMP data collection Every 5 minutes, poll each AP Record: MAC of associated clients Counter: inbound bytes Counter: outbound bytes Outbound Inbound
12 3: tcpdump data collection Hub AP Tiny Linux box promiscuously sniffed all packet headers
13 4: VoIP collection Cisco VoIP system on campus since 2003 CDR (Call Detail Records) from Cisco Call Manager server Time and duration of calls IP address of caller and callee Reasons for call termination
14 [syslog] Active cards per week 1706 cards 7134 cards
15 GB [snmp] Average hourly traffic, by hour Fall 2003 Winter 2004
16 [cdr] VoIP devices in use Fall 2003 Winter 2004
17 [cdr, snmp] VoIP call duration Fall 2003 Winter 2004 All VoIP calls are significantly shorter than non-voip calls Median wired call duration: 42 seconds Median wireless call duration: 31 seconds
18 Sessions time Associated Reassociated Deauthenticated Session duration 30 mins
19 Session diameter by device Fall 2003 Winter 2004 VoIP and PDA devices tend to move farther during a single wireless session A B diameter = max inter-ap distance E C D
20 Measurement challenges
21 Measuring real networks: Practical challenges Lack of portable tools for collection, analysis Lack of information about network hardware Lack of common data formats Reluctance of network administrators Avoiding, identifying, and handling data holes
22 Capturing traffic: sniffing the wire One sniffer captures traffic from many APs But... Does not capture intra-ap traffic Does not capture control frames Does not capture collisions, drops to Internet Sniffer Ethernet Switch AP AP AP
23 Capturing traffic: switched wireless Can capture nearly all MAC-layer traffic But... Needs explicit support from switch to Internet Today s switches are underpowered Wireless Switch GRE tunnel Sniffer AP AP AP
24 to Internet sniffing the air Ethernet Switch client Sniffer Sniffer client Sniffer AP client client
25 sniffing the air Can capture full MAC-layer traffic But... Need multiple radios, multiple locations Still might not capture all traffic Frames may be encrypted
26 Understanding traffic Encryption limits what we can see WEP and WPA encrypt traffic in the air VPNs and other tunnels encrypt the wire Firewalls and NAT may block traffic Identifying P2P traffic is hard Identifying VoIP traffic is hard
27 Correlating sources Hard to match data across sources syslog: device movements SNMP: traffic counts (poor granularity) CDR: call detail records tcpdump or other packet traces RADIUS: authentication records
28 Network structure Must know network structure and history location of all APs subnet structure switched wireless AP structure channel assignments, power levels?
29 Devices Tracking device movements syslog, SNMP: lack of common formats no clean way to identify device departure no clean way to tie cards to users no standards for localization Device type: laptop, palmtop, phone, psp...?
30 Human subjects Laws governing research and privacy For research in US universities, need approval of Institutional Review Board In any case, we must protect privacy: secure the collection infrastructure encrypt the data storage anonymize data where possible
31 Real user behavior Ultimately, it is hard to map observed network activity to real user behavior.
32 Modeling wireless networks
33 Building models Models should be derived from real data What is modeled, and what is assumed? Carefully define assumptions Clearly identify usable range of the model Is the model portable? translates to other places, other times, other sizes
34 Mobility models The MANET world is full of fake models! We need new models from real users Mobility model: the path of users in geographic space Association model: sequence of APs associated by a device
35 Summary Large WLANs require scalable management Management requires monitoring Monitoring requires measurement Measurement is hard! We need better tools and data formats Researchers and providers must cooperate We need shared archives and testbeds Motivation of CRAWDAD!
36 RAWDAD : A Wireless Data Archive for Researchers
37 CRAWDAD Any of various freshwater crustaceans of the genera Cambarus and Astacus, resembling a lobster but considerably smaller.
38 What is CRAWDAD? Community Resource for Archiving Wireless Data At Dartmouth Co-led by David Kotz and Tristan Henderson Hosted by the Center for Mobile Computing at Funded by US National Science Foundation Archive Wireless-network traces Tools for trace collection HOWTO documents in wiki Support for the research community Event calendar Bibliography Specialist groups (MANET, Education) Annual Workshop (free!)
39 Why CRAWDAD? Wireless network researchers are seriously starved for real wireless data! Data is hard to collect leverage effort to benefit all Obtain better model for simulation Understand real network usage and identify the real problem Evaluate solutions better than simulation Make our field more scientific Reusing/sharing data is good practice More appreciation (citations!) if you share data Learn from others experience Learn in more ways than from a paper
40 Research Example: Model Inter-Contact Times Work by Karagiannis et al., MobiCom 07 Motivation: Inter-contact times between mobile devices Data forwarding in opportunistic communication Question: ICT distribution follows power law over all time range? If yes, expected packet delay is infinite for any packet for warding scheme Traditional models - distribution decays exponentially CCDF (log) * Slide courtesy of Thomas Karagiannis ICT(log)
41 Research Example: Model Inter-Contact Times Methodology: examine ICT distribution from 6 real mobility traces 4 CRAWDAD data sets used! * Slide courtesy of Thomas Karagiannis
42 Research Example: Model Inter-Contact Times Result: Empirically found a dichotomy in ICT distribution Power-law up to a point (order half a day), exponential decay beyond * Slide courtesy of Thomas Karagiannis
43 Research Example: Identify Privacy Problem Work by Pang et al., MobiCom 07 Motivation: Privacy threat in wireless network Adversary can easily track users identity. Question: Is the well-known solution (Pseudonyms - change addresses over time) sufficient to prevent tracking? MAC address now: 00:0E:35:CE:1F:59 tcpdump? MAC address later: 00:AA:BB:CC:DD:EE tcpdump time * Slide courtesy of Jeffrey Pang
44 Research Example: Identify Privacy Problem Methodology: From real trace (uw/sigcomm2004) find implicit identifiers (e.g., broadcast pkt size) Develop a tracking scheme and evaluate on three real traces (including uw/sigcomm2004) Broadcast pkt sizes: 239, 245, 257 MAC address now: 00:0E:35:CE:1F:59 tcpdump Broadcast pkt sizes: 239, 245, 257? MAC address later: 00:AA:BB:CC:DD:EE tcpdump time * Slide courtesy of Jeffrey Pang
45 Research Example: Identify Privacy Problem Result: Majority of users can be identified if active long enough. Good example of how CRAWDAD helps researchers identify problems and evaluate solutions! * Slide courtesy of Jeffrey Pang
46 CRAWDAD Data sets Wireless (internet) traffic data sets dartmouth/campus, stanford/gates, uw/sigcomm2004, ucsd/sigcomm2001, Mobility/DTN (Delay Tolerant Net) data sets cambridge/haggle, mit/reality, nus/contact, umass/diesel, Location/Localization data sets intel/placelab, dartmouth/wardriving, Vehicular Network data sets gatech/vehicular, umass/diesel, ucdavis/unitrans, PHY-layer data sets rutgers/capture (from ORBIT testbed),
47 CRAWDAD Tools Collection tools tools/collect/snmp/snmputil.exe, Sanitisation tools tools/sanitize/generic/anontool, Processing tools tools/process/pcap/wifi_parser, Analysis tools tools/process/802.11/wit,
48 Top 10 Datasets/Tools Dataset/tools dartmouth/campus cambridge/haggle mit/reality stanford/gates uw/sigcomm2004 tools/process/snmp/extract.pl tools/process/pcap/wifi_parser nus/contact ucsd/sigcomm2001 umass/diesel Download users
49 Building CRAWDAD Community Online Wiki, Special Interest Groups (MANET, Education) Custom mailing list for each data set Monthly download stats for contributors Offline - Annual workshop (free!) in MobiCom
50 CRAWDAD is growing! (as of November 2007) 800 users from 450 institutions around the world 35 data sets One data set (cnu/cdma) contributed from Korea! 12 tools 100 papers Staff: full-time researcher plus 2 undergrads contact: crawdad@cs.dartmouth.edu
51 World Map of CRAWDAD Users
52 Demo: How to Find the Data/Tools Browsing Browse all datasets Browse all tools Browse by keywords Searching
53 Any Site for Internet Data? Check out DatCat.org! Indexes Internet measurement data Developed and run by CAIDA Users can search, annotate, and cite Not store data but point to download location CRAWDAD-DatCat gateway Converting CRAWDAD metadata to DatCat index Currently 25 CRAWDAD datasets indexed on DatCat
54 Conclusion To help the community, we provide: Wireless network traces Tools for easy trace collection and sanitisation How-to documentaton, and many more! Looking for data? Register now! Have wireless data? Contact:
The Challenges of Measuring Wireless Networks. David Kotz Dartmouth College August 2005
The Challenges of Measuring Wireless Networks David Kotz Dartmouth College August 2005 Why measure? For better management Large WLANs need scalable management To manage you must monitor To monitor you
More informationThe Changing Usage of a Mature Campus-wide Wireless Network
The Changing Usage of a Mature Campus-wide Wireless Network Andrew Stone CS525m Mobile and Ubiquitous Computing Overview Project Goal Data Collection Methods Findings and Data Analysis Conclusions and
More informationMulti-Layered Security Framework for Metro-Scale Wi-Fi Networks
Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the
More informationWireless LAN Security (RM12/2002)
Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For
More informationOutline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.
Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/
More informationWLAN Security. Dr. Siwaruk Siwamogsatham. ThaiCERT, NECTEC
WLAN Security Dr. Siwaruk Siwamogsatham ThaiCERT, NECTEC Agenda Wireless Technology Overview IEEE 802.11 WLAN Technology WLAN Security Issues How to secure WLAN? WLAN Security Technologies Wireless Technologies
More informationDetecting Protected Layer-3 Rogue APs
Detecting Protected Layer-3 Rogue APs Authors: Hongda Yin, Guanling Chen, and Jie Wang Department of Computer Science, University of Massachusetts Lowell Presenter: Bo Yan Department of Computer Science
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g
More informationWi-Fi Activity in Open Environments: Tools, Measurements, and Analyses. Thomas Claveirole Ph.D. Defense February 26, 2010
Wi-Fi Activity in Open Environments: Tools, Measurements, and Analyses Thomas Claveirole Ph.D. Defense February 26, 2010 Ana Cavalli Reviewer Prof. TÉLÉCOM & Management SudParis Thierry Turletti Reviewer
More informationSecure Mobility Challenges. Fat APs, Decentralized Risk. Physical Access. Business Requirements
Unified Wireless Switching Enabling a Truly Converged Network White Paper Abstract As businesses scale, traditional wireless network deployments become more complex, more costly and less secure. Users
More informationSimple, full featured and budgetary deployment of single AP or distributed APs Hot-Spot for small scale projects.
Colubris Wireless Hot-Spot solution for small and medium scale deployments 1. Definitions, goals, and objectives Simple, full featured and budgetary deployment of single AP or distributed APs Hot-Spot
More informationWireless LANs. ITS 413 Internet Technologies and Applications
Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE
More informationAnalysis of wireless information locality and association patterns in a campus
1 Analysis of wireless information locality and association patterns in a campus Francisco Chinchilla, Maria Papadopouli Department of Computer Science, The University of North Carolina at Chapel Hill
More informationComputer Networks 52 (2008) Contents lists available at ScienceDirect. Computer Networks. journal homepage:
Computer Networks 52 (28) 269 272 Contents lists available at ScienceDirect Computer Networks journal homepage: www.elsevier.com/locate/comnet The changing usage of a mature campus-wide wireless network
More informationAnalysis of a Campus-Wide Wireless Network
Wireless Networks 11, 115 133, 2005 2005 Springer Science + Business Media, Inc. Manufactured in The Netherlands. Analysis of a Campus-Wide Wireless Network DAVID KOTZ Department of Computer Science, Dartmouth
More informationStandard For IIUM Wireless Networking
INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA (IIUM) Document No : IIUM/ITD/ICTPOL/4.3 Effective Date : 13/11/2008 1.0 OBJECTIVE Standard For IIUM Wireless Networking Chapter : Network Status : APPROVED Version
More informationWireless Network Security
Wireless Network Security Why wireless? Wifi, which is short for wireless fi something, allows your computer to connect to the Internet using magic. -Motel 6 commercial 2 but it comes at a price Wireless
More informationCSC 4900 Computer Networks: Security Protocols (2)
CSC 4900 Computer Networks: Security Protocols (2) Professor Henry Carter Fall 2017 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message Integrity 8.4 End point Authentication
More informationGuide to Wireless Communications, Third Edition. Objectives
Guide to Wireless Communications, Third Edition Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works
More informationWireless Network Policy and Procedures Version 1.5 Dated November 27, 2002
Wireless Network Policy and Procedures Version 1.5 Dated November 27, 2002 Pace University reserves the right to amend or otherwise revise this document as may be necessary to reflect future changes made
More informationWireless Network Security Fundamentals and Technologies
Wireless Network Security Fundamentals and Technologies Rakesh V S 1, Ganesh D R 2, Rajesh Kumar S 3, Puspanathan G 4 1,2,3,4 Department of Computer Science and Engineering, Cambridge Institute of Technology
More informationWireless Router at Home
Wireless Router at Home 192.168.1.2 192.168.1.1 Modem 192.168.1.3 120.6.46.15 telephone line to ISP 192.168.1.4 Internet connection with public IP internal LAN with private IPs 192.168.1.5 Wireless All-in-one
More informationCCNA Routing and Switching Scope and Sequence
Cisco Network Academy Network Engineering technology 1, 2, 3&4 CCNA 1 2 3 4 CCNA Routing and Switching Scope and Sequence Target Audience The Cisco CCNA Routing and Switching curriculum is designed for
More informationRelease Notes for Avaya WLAN 9100 AOS-Lite Operating System WAP9112 Release WAP9114 Release 8.1.0
WLAN 9100 Release Notes Release Notes for Avaya WLAN 9100 AOS-Lite Operating System WAP9112 Release 8.1.0 WAP9114 Release 8.1.0 Avaya Inc - External Distribution 1. Introduction This document provides
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 7 Low-Speed Wireless Local Area Networks Objectives Describe how WLANs are used List the components and modes of a WLAN Describe how an RF WLAN works
More informationHW/Lab 4: IPSec and Wireless Security. CS 336/536: Computer Network Security DUE 11 am on 12/01/2014 (Monday)
HW/Lab 4: IPSec and Wireless Security CS 336/536: Computer Network Security DUE 11 am on 12/01/2014 (Monday) This HW/Lab assignment covers Lectures 8 (IPSec) and 10 (Wireless Security). Please review these
More informationCS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis
CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE
More informationD-Link AirPlus G DWL-G700AP
TM D-Link AirPlus G DWL-G700AP 2.4GHz Wireless Access Point Manual Building Networks for People Contents Package Contents...3 Introduction...4 Wireless Basics...6 Getting Started...8 Using the Configuration
More informationThe All-in-one Guest Access Solution of
The All-in-one Guest Access Solution of Redefining Networking Integration Tomorrow, Delivered Today Application Guide Series Series Application Guide Providing access in hospitality venues is not the same
More informationExpected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy
CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design
More informationWednesday, May 16, 2018
Wednesday, May 16, 2018 8:00 AM - 5:00 PM Wi Fi/WLAN Fundamentals Training by Tessco; Day Two of a Two Day Training. (Attendees must bring laptop computers for this training. Attendees should bring available
More informationAnalysis of Wireless Information Locality and Association Patterns in a Campus
Analysis of Wireless Information Locality and Association Patterns in a Campus Francisco Chinchilla, Mark Lindsey, Maria Papadopouli Department of Computer Science The University of North Carolina at Chapel
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : GSLC Title : GIAC Security Leadership Certification (GSLC) Vendors : GIAC
More informationCSCD 433/533 Advanced Networking
CSCD 433/533 Advanced Networking Lecture 6 Wireless LAN Components and Characteristics Winter 2017 Some Material in these slides from J.F Kurose and K.W. Ross All material copyright 1996-2007 1 Introduction
More informationBuilding a Secure Wireless Network. Use i and WPA to Protect the Channel and Authenticate Users. May, 2007
Agenda: Securing Wireless Networks Building a Secure Wireless Network Joel M Snyder Senior Partner Opus One jms@opus1.com Using encryption and authentication Handling unauthenticated users Managing RF
More informationWireless Controller DWC-1000
Network Architecture Manage up to 6 wireless APs, upgradable to 24 APs 1 per controller Control up to 24 wireless APs, maximum 96 APs 1 per cluster Robust Network Security Wireless Instruction Detection
More informationThe following chart provides the breakdown of exam as to the weight of each section of the exam.
Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those
More informationPRODUCT GUIDE Wireless Intrusion Prevention Systems
PRODUCT GUIDE Wireless Intrusion Prevention Systems The Need for Wireless INTRUSION PREVENTION SYSTEMS A Wireless Intrusion Prevention System (WIPS) is designed to address two classes of challenges facing
More informationDartmouth Internet Security Testbed (DIST) building a campus-wide wireless testbed
DIST Architecture and Operation Data Protection and Sanitization Harsh Realities : building a campus-wide wireless testbed Sergey Bratus David Kotz Keren Tan William Taylor Anna Shubina Bennet Vance 1
More informationCOPYRIGHTED MATERIAL. Index
Index Symbols and Numbers $ (dollar sign), in folder share names, 117 802.11a standard definition, 22 speed, 26 802.11b standard 802.11g standard 802.11i standard, 23 A access points compatibility, 45
More informationMTA_98-366_Vindicator930
MTA_98-366_Vindicator930 Number: 98-366 Passing Score: 700 Time Limit: 45 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Technology Associate Networking Fundamentals MTA 98-366 Exam A QUESTION
More informationExam : PW Title : Certified wireless security professional(cwsp) Version : DEMO
Exam : PW0-200 Title : Certified wireless security professional(cwsp) Version : DEMO 1. Given: John Smith often telecommutes from a coffee shop near his home. The coffee shop has an 802.11g access point
More informationThis regulation outlines the policy and procedures for the implementation of wireless networking for the University Campus.
UAR NUMBER: 400.01 TITLE: Wireless Network Policy and Procedure INITIAL ADOPTION: 11/6/2003 REVISION DATES: PURPOSE: Set forth the policy for using wireless data technologies and assigns responsibilities
More informationConfiguring Repeater and Standby Access Points and Workgroup Bridge Mode
CHAPTER 19 Configuring Repeater and Standby Access Points and Workgroup Bridge Mode This chapter descibes how to configure your access point as a repeater, as a hot standby unit, or as a workgroup bridge.
More informationTestsDumps. Latest Test Dumps for IT Exam Certification
TestsDumps http://www.testsdumps.com Latest Test Dumps for IT Exam Certification Exam : PW0-200 Title : Certified wireless security professional(cwsp) Vendors : CWNP Version : DEMO Get Latest & Valid PW0-200
More informationThe Wi-Fi Boom. Dr. Malik Audeh Tropos Networks March 13, 2004
1 The Wi-Fi Boom Dr. Malik Audeh Tropos Networks March 13, 2004 Outline 2 Wi-Fi has gone mainstream Background of Wi-Fi/802.11 Technical Details of Wi-Fi Physical Layer(s) MAC Layer Security Wi-Fi in different
More informationCisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ]
s@lm@n Cisco Exam 642-737 Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ] Cisco 642-737 : Practice Test Question No : 1 RADIUS is set up with multiple servers
More informationTestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified
TestOut Network Pro - English 5.0.x COURSE OUTLINE Modified 2018-03-06 TestOut Network Pro Outline - English 5.0.x Videos: 130 (17:10:31) Demonstrations: 78 (8:46:15) Simulations: 88 Fact Sheets: 136 Exams:
More informationNDSU Wireless. Bruce Curtis David Dahl Valerie Nordsletten
NDSU Wireless Bruce Curtis David Dahl Valerie Nordsletten Wireless Security Acronyms WEP = Wired Equivalent Privacy WPA = Wi-Fi Protected Access WEP is broken WEP really means Won t Even Protect WPA is
More informationThis course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N
CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT
More informationDetecting & Eliminating Rogue Access Point in IEEE WLAN
Detecting & Eliminating Rogue Access Point in IEEE 802.11 WLAN S.B.Vanjale, Amol K. Kadam, Pramod A. Jadhav Department of Computer Engg Bharati Vidyapeeth Deemed University College of Engineering Pune.
More informationSecurity SSID Selection: Broadcast SSID:
69 Security SSID Selection: Broadcast SSID: WMM: Encryption: Select the SSID that the security settings will apply to. If Disabled, then the device will not be broadcasting the SSID. Therefore it will
More informationWL-5420AP. User s Guide
WL-5420AP User s Guide Table of contents INTRODUCTION... 1 About the Operation Modes...2 LED Indicators...5 Solid...5 Ports on the Rear Panel...7 GETTING CONNECTED... 8 WPA AP -CONFIGURATION VIA WEB...
More informationDeploying Mobility using Wireless VoIP
APPLICATION N0TE ST-0119 August 29, 2005 Product: ShoreTel system System version: ShoreTel 6 Deploying Mobility using Wireless VoIP Mobility brings organizations considerable improvements in employee productivity,
More informationUser Directories and Campus Network Authentication - A Wireless Case Study
User Directories and Campus Network Authentication - A Wireless Case Study Sean Convery Identity Engines Kevin Jones Metropolitan Community College Agenda Role-based Access Control About MCC Wireless project
More informationD. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.
Volume: 119 Questions Question No: 1 John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website.
More informationWireless technology Principles of Security
Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the
More informationIntroduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II
Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Lecture 4: Wireless LANs and IEEE 802.11 Part II This lecture continues the study of wireless LANs by looking at IEEE 802.11. I. 802.11
More informationChapter 24 Wireless Network Security
Chapter 24 Wireless Network Security Wireless Security Key factors contributing to higher security risk of wireless networks compared to wired networks include: o Channel Wireless networking typically
More informationNexGen Solutions Education Guide
NexGen s Education Guide Campus-wide mobile internet connectivity: enabling network connectivity to buildings, classrooms, and outdoor areas. Virtual Service Community (VSC) security ensures that student
More informationWireless Bridge User Manual. Version 1.0
Wireless Bridge 520645 User Manual Version 1.0 FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should
More informationWireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS
How to Set Up a Secure Home Wireless Network What you don t know about setting up a home wireless network can hurt you. 2008 APCUG Convention Session Tom Jones, P.E., RCDD-NTS CQS-CWLSS AGENDA Some Terms
More informationEthical Hacking and Prevention
Ethical Hacking and Prevention This course is mapped to the popular Ethical Hacking and Prevention Certification Exam from US-Council. This course is meant for those professionals who are looking for comprehensive
More informationConfiguring Repeater and Standby Access Points
CHAPTER 19 This chapter descibes how to configure your access point as a hot standby unit or as a repeater unit. This chapter contains these sections: Understanding Repeater Access Points, page 19-2 Configuring
More informationITM542 Spring 2004 Feasibility Study of a Wireless LAN network With-VoIP at IIT Rice campus Ninad Narkhede Masaaki Yana Saturday, 1 May 2004
ITM542 Spring 2004 Feasibility Study of a Wireless LAN network With-VoIP at IIT Rice campus Ninad Narkhede Masaaki Yana Saturday, 1 May 2004 ABSTRACT Wireless technology has gained popularity in enterprises
More informationEnGenius Networks Singapore Pte Ltd M-Series Products Launch Oct., 2009
EnGenius Networks Singapore Pte Ltd M-Series Products Launch Oct., 2009 What is Wireless Mesh Network? A collection of wireless devices maintaining RF connectivity to create a seamless path for data packets
More informationChapter 11: It s a Network. Introduction to Networking
Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting
More informationAdd a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP)
Add a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP) Objective A Wireless Access Point (WAP) is a networking device that allows wireless-capable devices to connect to
More informationPerformance Analysis for Channel Utilization in Wireless LAN
Performance Analysis for Channel Utilization in Wireless LAN Shweta Singh Naresh Chandra Arun Kumar Tripathi ABSTRACT Wireless network plays an important role in field of communication. Now a days people
More informationWireless Community Networks: Evolution and Technical Challenges
Wireless Community Networks: Evolution and Technical Challenges Luiz A. DaSilva Bradley Department of Electrical and Computer Engineering Workshop on Nationwide Internet Access and Online Applications
More informationCCNA Routing and Switching Courses. Scope and Sequence. Target Audience. Curriculum Overview. Last updated August 22, 2018
CCNA Routing and Switching Scope and Sequence Last updated August 22, 2018 Target Audience The Cisco CCNA Routing and Switching curriculum is designed for Cisco Networking Academy students who are seeking
More informationConfiguring Repeater and Standby Access Points and Workgroup Bridge Mode
20 CHAPTER Configuring Repeater and Standby Access Points and Workgroup Bridge Mode This chapter describes how to configure your access point as a repeater, as a hot standby unit, or as a workgroup bridge.
More informationA Configuration Protocol for Embedded Devices on Secure Wireless Networks
A Configuration Protocol for Embedded Devices on Secure Wireless Networks Larry Sanders lsanders@ittc.ku.edu 6 May 2003 Introduction Wi-Fi Alliance Formally Wireless Ethernet Compatibility Alliance (WECA)
More informationSecuring Wireless LANs with Certificate Services
1 Securing Wireless LANs with Certificate Services PHILIP HUYNH University of Colorado at Colorado Springs Abstract Wireless Local Access Network (WLAN) is used popularly in almost everywhere from the
More informationCYBER ATTACKS EXPLAINED: WIRELESS ATTACKS
CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these
More informationWireless Attacks and Countermeasures
Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections
More informationInformation and Network Technology Revised Date 07/26/2012 Implementation Date 08/01/2012
Information and Network Technology Ben Eckart Revised Date 07/26/2012 Implementation Date 08/01/2012 COURSE OUTLINE CRT 286 LAN/WAN Implementation and Support 3 Credit Hours Course Description The focus
More informationScope and Sequence: CCNA Exploration v4.0
Scope and Sequence: CCNA Exploration v4.0 Last Updated August 30, 2007 The course objectives and outline for the final two CCNA Exploration courses, LAN Switching and Wireless and Accessing the WAN, are
More information5 Tips to Fortify your Wireless Network
Article ID: 5035 5 Tips to Fortify your Wireless Network Objective Although Wi-Fi networks are convenient for you and your employees, there may be unwanted clients using up the bandwidth you pay for. In
More informationNetwork fundamentals IB Computer Science. Content developed by Dartford Grammar School Computer Science Department
Network fundamentals IB Computer Science Content developed by Dartford Grammar School Computer Science Department HL Topics 1-7, D1-4 1: System design 2: Computer Organisation 3: Networks 4: Computational
More informationWireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design
Protocol Analysis and Design 1 Networks 1. WIRELESS NETWORKS 2 Networks 1. WIRELESS NETWORKS 1.1 WiFi 802.11 3 Networks OSI Structure 4 Networks Infrastructure Networks BSS : Basic Set Service ESS : Extended
More informationCIT 380: Securing Computer Systems. Network Security Concepts
CIT 380: Securing Computer Systems Network Security Concepts Topics 1. Protocols and Layers 2. Layer 2 Network Concepts 3. MAC Spoofing 4. ARP 5. ARP Spoofing 6. Network Sniffing Protocols A protocol defines
More informationChapter 11: Networks
Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors
More informationWLAN a-z 2010/02/15. (C) Herbert Haas
WLAN 802.11a-z (C) Herbert Haas 2010/02/15 Wireless Products WLAN is integrated E. g. Intel Centrino chipsets Increasing data rates Towards Fast Ethernet speeds and more Today strong native security solutions
More informationC H A P T E R Reports Note Cisco Prime Network Control System Configuration Guide OL
CHAPTER 14 The Cisco NCS reporting is necessary to monitor the system and network health as well as troubleshoot problems. A number of reports can be generated to run on an immediate and scheduled basis.
More informationTuesday, May :00 AM - 5:00 PM
Tuesday, May 15 2018 8:00 AM - 5:00 PM Wi Fi/WLAN Fundamentals Training by Tessco; Day One of a Two Day Training. (Attendees must bring laptop computers for this training. Attendees should bring available
More informationCharacterizing Usage of a Campus-wide Wireless Network
Characterizing Usage of a Campus-wide Wireless Network David Kotz and Kobby Essien Department of Computer Science, Dartmouth College Hanover, NH, USA 3755 dfk@cs.dartmouth.edu Dartmouth Computer Science
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 1T6-222 Title : Wireless LAN Analysis and Troubleshooting Vendors : Network
More informationDynamic Source Routing in ad hoc wireless networks
Dynamic Source Routing in ad hoc wireless networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University In Mobile Computing, vol. 353, chapter 5, T. Imielinski and H.
More informationBasic processes in IEEE networks
Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters IEEE 802.11 Terminology Station (STA) Architecture: Device that contains IEEE
More informationWPA SECURITY (Wi-Fi Protected Access) Presentation. Douglas Cheathem (csc Spring 2007)
WPA SECURITY (Wi-Fi Protected Access) Presentation By Douglas Cheathem (csc 650.01 Spring 2007) OUTLINE Introduction Security Risk Vulnerabilities Prevention Conclusion Live Demo Q & A INTRODUCTION! WPA
More informationHubs, Bridges, and Switches (oh my) Hubs
Hubs, Bridges, and Switches (oh my) Used for extending LANs in terms of geographical coverage, number of nodes, administration capabilities, etc. Differ in regards to: collision domain isolation layer
More informationAssignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson
Project Whitepaper ITEC495-V1WW Instructor: Wayne Smith Jim Patterson Table of Contents 1. Abstract Page 3 2. Introduction Page 3 3. Analysis Page 4 4. Solution Discussion Page 7 5. Evaluation Criteria
More informationTropos Technology Overview
Tropos Technology Overview May 2005 Enzo Zerbi Business Development Manager enzo.zerbi@programatica.it Agenda Introduction Tropos MetroMesh Architecture Tropos MetroMesh OS Predictive Wireless Routing
More informationWiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018
WiFi Networks: IEEE 802.11b Wireless LANs Carey Williamson Department of Computer Science University of Calgary Winter 2018 Background (1 of 2) In many respects, the IEEE 802.11b wireless LAN (WLAN) standard
More informationPIE in the Sky : Online Passive Interference Estimation for Enterprise WLANs
WiNGS Labs PIE in the Sky : Online Passive Interference Estimation for Enterprise WLANs * Nokia Research Center, Palo Alto Shravan Rayanchu, Suman Banerjee University of Wisconsin-Madison Konstantina Papagiannaki
More informationNetworking Basics. Crystal Printer Network Installation Guidelines
Networking Basics & Crystal Printer Network Installation Guidelines 1. Overview This guide is intended to provide the necessary basic knowledge of wireless networking needed to enable the Crystal printer
More informationPeerApp Case Study. November University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs
PeerApp Case Study University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs November 2010 Copyright 2010-2011 PeerApp Ltd. All rights reserved 1 Executive Summary
More informationOct 2007 Version 1.01
Oct 2007 Version 1.01 Table of Contents Introduction...4 System Requirement...4 Getting Started...4 Installing the Smart WLAN Manager...5 Discovering the Switch and AP...9 Understanding the Screen Layout...12
More informationAlarms and Events. Using the Alarm Dashboard CHAPTER
CHAPTER 14 This chapter describes the type of events and alarms reported, how to view alarms and events by product or entity and severity, and how to view IDS signature attacks. It contains these sections:
More information