COMP327 Mobile Computing Session: Lecture Set 6 - Personal Area Networks and Wireless Connections - Part 2
|
|
- Andra Daniel
- 5 years ago
- Views:
Transcription
1 COMP327 Mobile Computing Session: Lecture Set 6 - Personal Area Networks and Wireless Connections - Part 2 35
2 Recap from Part 1 Wireless Connection Technologies Wireless Personal Area Networks (WPAN) InfraRed Bluetooth Zigbee Wireless Local Area Networks (WLAN) Sensors RFID NFC 36
3 Wireless Local Area Network (WLAN) Spread spectrum RF technology for data comms Range typically in tens of meters range of a network can be extended using several access points Fast data rate g provides 54Mbit/s n increases this to 155Mbits/s using multiple antennas (MIMO) ac is up to 433.3Mbit/s via Multi-user MIMO (MU-MIMO) Shared-key Encryption mechanisms include: Wired Equivalent Privacy (WEP) Wi-Fi Protected Access (WPA, WPA2) High adoption for home networks and HotSpots Utilises unlicensed (but not unregulated) wavelengths 37
4 Wi-Fi Architectures Three typical architectures Peer-to-peer Two clients can communicate without the need for an access point Bridge Clients connect with Access point, which acts as a bridge / router to a wired ethernet Wireless Distribution System Multiple access points provide wider coverage without the need for wired backbone Each access point is either a main, relay or remote base station All nodes share same radio channel, and WEP or WPA keys 38
5 Wi-Fi Security Three main standards have been produced: 1st: Wired Equivalent Privacy (WEP) part of the original standard ratified in 1997 intended to provide data confidentiality comparable to that of a traditional wired network recognizable by the key of 10 or 26 hexadecimal digits Standard 64-bit WEP uses a 40 bit key (aka WEP-40), which is concatenated with a 24-bit initialization vector (IV) to form an RC4 stream cipher key The 64-bit or 128-bit encryption key does not change. 39
6 Wi-Fi Security Three main standards have been produced: 2nd: Wi-Fi Protected Access (WPA) became available in Intended as an intermediate measure in anticipation of WPA2 Could be implemented through firmware upgrades on wireless network interface cards designed for WEP that began shipping as far back as 1999 (though not all AP) Implements the Temporal Key Integrity Protocol (TKIP). TKIP employs a per-packet key vs WEP consistent key new 128-bit key generated for each packet preventing the types of attacks that compromised WEP 40
7 Wi-Fi Security Three main standards have been produced: 3rd: Wi-Fi Protected Access II (WPA2) became available in implements the mandatory elements of IEEE i. In particular, it includes mandatory support for CCMP, an AES-based encryption mode with strong security. (Counter Mode Cipher Block Chaining Message Authentication Code Protocol) WPA2 certification is mandatory for all new devices to bear the Wi-Fi trademark. 41
8 WPA Terminology Different WPA versions and protection mechanisms can be distinguished based on the target end-user: WPA-Personal aka WPA-PSK (pre-shared key) designed for home and small office networks and doesn't require an authentication server. Each wireless network device encrypts the network traffic using a 256 bit key. This key may be entered either as a string of 64 hexadecimal digits, or as a passphrase of 8 to 63 printable ASCII characters. WPA-Personal mode is available with both WPA and WPA2. 42
9 WPA2 - Security: KRACK KRACK - Announced in October 2017 Key Reinitialisation attack Affects all variants of the WPA protocol Attack is against the 4-way handshake of the WPA2 protocol. Executed when a client wants to join a protected Wi-Fi network - confirms that both client and AP possess the correct credentials Concurrent with negotiation of a fresh encryption key that will be used to encrypt all subsequent traffic. Victim tricked into using already in-use key. 43
10 Wi-Fi Benefits Convenience Provides network access from any location within range Good as the number of home wi-fi gadgets increases Mobility Users can browse outside home/work environment Coffee Shops, Airports, Hotels Productivity Employee can work from several locations without impediment Deployment Initial setup requires single access point Expandability Easy to add new clients without the need for additional infrastructure WDS can be used to extend range Cost Increase over a wired equivalent is modest 44
11 Wi-Fi Disadvantages Security Poor antennas mean that signal propagate further than stated range Can be intercepted by good antenna, and hence hacked Encryption helps, but wellknown weaknesses exist in WEP Range Suitable only for small areas Metropolitan coverage can be costly Reliability Signal quality affected by interference from devices on similar wavelengths Speed Can be slow compared to wired connections Faster than most wireless counterparts Radio Emission Can affect nearby devices Questionable affect on human health?? 45
12 My old house Friend, 9 doors away. 46
13 WiFi vs UMTS WiFi is often perceived as better than UMTS... Wifi is not always faster WiFi hotspots offer up to 54Mbit/s but early UMTS R99 offers only 3Mbit/s Wifi often limited by backhaul link to the Internet DSL typically limits downlink speed to 1-16Mbit/s; uplink to < 1Mbit/s UMTS has large coverage, with GPRS fallback WiFi covers small area, limiting roaming ability UMTS has a well-established billing solution Payment for commercial Wifi access is ad-hoc Scratch cards, online Credit-card payment, or billing through subscription 47
14 WiFi vs UMTS Technical realisation of lawful interception Well established for Telecommunications Still evolving for Wifi access Wifi designed for small coverage Handover problematic when roaming to a new area WDS can extend coverage, but with limitations UMTS designed for national coverage Seamless roaming over long periods even at high speed (<500km/h) Security UMTS through SIM encryption & key management Wifi exposes IP subnet, and key handling can be cumbersome 48
15 Aside: Interception of Mobile Comms The StingRay StingRay is an IMSI-catcher Used by many police forces in USA and almost certainly the Metropolitan Police in the UK (plus others) StingRay device used by law enforcement masquerades as a Cell Tower Nearby phones see much stronger signal and connect to it Can be used to monitor who s in an area by collecting the IMEI and ESN 49
16 Aside: Interception of Mobile Comms The StingRay GSM encrypts comms using A5/1 stream cypher, but supports a weakened variant A5/2, that can now be cracked in real time Both cyphers use the same encryption key from the SIM card StingRay requests device to use A5/2 and collects data traffic. Since key can be decrypted in real time with sufficient processing power, it decrypts key. Can now eavesdrop on comms Example of a Man in the Middle attack. 50
17 WiFi vs UMTS Telephony and VoIP UMTS provides circuit switched links for voice IMS architecture supports VoIP VoIP clients exist over WLAN Quality of Service can be poor; uplink speeds problematic Mobile Phones are increasingly appearing with both WiFi and UMTS calling capability WiFi used when available, but fallback to UMTS (and GSM) when roaming 51
18 Sensors: RFID Radio-frequency Identification (RFID) uses a tag with a unique ID for tagging things Three tag types Passive: no battery - coiled antenna induces current which powers the tag and encoded information is transmitted Active: battery operated - can transmit signals autonomously Battery Assisted Passive: requires external power to wake, but has greater range Used mainly in inventory and supply-chain management Increasing used in: Contactless Mobile Payment (e.g. Nokia s RFID shells) Location-based services (e.g. in museums) Bar code replacement Can be used as external cues by mobile devices 52
19 Sensors: NFC Near Field Communication (NFC) Consist of a set of communication protocols that enable two devices to establish communication when brought within 4cm of each other. Used in contactless payment systems Used in social networking for sharing files/ images/video between users NFC devices can act as electronic identity documents and keycards Offer a low-speed connection with a simple setup that can be used to bootstrap higher bandwidth wireless connections. 53
20 To Recap... In this lecture set, we covered: The notion of Personal Area Networks Discussed why these should be wireless How such technologies are used by Mobile Phones Wireless Local Area Networks How Wifi compares to 3G technology Sensing using RFID & NFC 54
21 Further Reading Ubiquitous Computing: Smart Devices, Environments and Interactions Stefan Poslad (Wiley, 2009) Chapter 11 Communication Systems: for the Mobile Information Society Martin Sauter (Wiley, 2006) Chapters 4, 5 and 6 Wikipedia!!! 55
Wireless Networking WiFi Standards 802.11a 5GHz 54MB 802.11b 2.4 GHz 11MB 802.11g 2.4GHz 52MB 802.11n 2.4/5GHz 108MB 802.11b The 802.11b standard has a maximum raw data rate of 11 Mbit/s, and uses
More informationAppendix E Wireless Networking Basics
Appendix E Wireless Networking Basics This chapter provides an overview of Wireless networking. Wireless Networking Overview The FWG114P v2 Wireless Firewall/Print Server conforms to the Institute of Electrical
More informationWireless technology Principles of Security
Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the
More informationWireless Attacks and Countermeasures
Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections
More informationWireless LAN Security. Gabriel Clothier
Wireless LAN Security Gabriel Clothier Timeline 1997: 802.11 standard released 1999: 802.11b released, WEP proposed [1] 2003: WiFi alliance certifies for WPA 2004: 802.11i released 2005: 802.11w task group
More informationExam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ]
s@lm@n HP Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ] HP HP2-Z32 : Practice Test Question No : 1 What is a proper use for an ingress VLAN in an HP MSM VSC?
More informationUnit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1
1 Outcome 1 A description of mobile device internet connectivity using two current Wi-Fi methods. A description of mobile device internet connectivity using two current GSM mobile telephony methods. A
More informationOutline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.
Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/
More informationConfiguring a VAP on the WAP351, WAP131, and WAP371
Article ID: 5072 Configuring a VAP on the WAP351, WAP131, and WAP371 Objective Virtual Access Points (VAPs) segment the wireless LAN into multiple broadcast domains that are the wireless equivalent of
More informationNWD2705. User s Guide. Quick Start Guide. Dual-Band Wireless N450 USB Adapter. Version 1.00 Edition 1, 09/2012
NWD2705 Dual-Band Wireless N450 USB Adapter Version 1.00 Edition 1, 09/2012 Quick Start Guide User s Guide www.zyxel.com Copyright 2012 ZyXEL Communications Corporation IMPORTANT! READ CAREFULLY BEFORE
More informationWhat is Eavedropping?
WLAN Security What is Eavedropping? War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit. War Walking Someone walks
More informationLecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday
Lecture 20: Future trends in mobile computing Mythili Vutukuru CS 653 Spring 2014 April 7, Monday Future topics Improving capacity Dynamic spectrum access Massive MIMO Heterogeneous networks Pervasive
More informationWireless (Select Models Only) User Guide
Wireless (Select Models Only) User Guide Copyright 2007 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its
More informationCOMP327 Mobile Computing Session: Lecture Set 6 - The Internet of Things
COMP327 Mobile Computing Session: 2015-2016 Lecture Set 6 - The Internet of Things Internet of Things An invasion of devices for the home and the environment Internet of Things In 2008, the number of things
More informationProcedure: You can find the problem sheet on the Desktop of the lab PCs.
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Advance Networks Laboratory 907529 Lab.3 WLAN Security Objectives 1. Configure administrator accounts.
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g
More informationFAQ on Cisco Aironet Wireless Security
FAQ on Cisco Aironet Wireless Security Document ID: 68583 Contents Introduction General FAQ Troubleshooting and Design FAQ Related Information Introduction This document provides information on the most
More informationWireless Network Security
Wireless Network Security Why wireless? Wifi, which is short for wireless fi something, allows your computer to connect to the Internet using magic. -Motel 6 commercial 2 but it comes at a price Wireless
More informationWireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.
Wireless Networks Authors: Marius Popovici Daniel Crişan Zagham Abbas Technical University of Cluj-Napoca Group 3250 Cluj-Napoca, 24 Nov. 2003 Presentation Outline Wireless Technology overview The IEEE
More informationWireless (Select Models Only) User Guide
Wireless (Select Models Only) User Guide Copyright 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its
More informationWireless (NFC, RFID, Bluetooth LE, ZigBee IP, RF) protocols for the Physical- Data Link layer communication technologies
Wireless (NFC, RFID, Bluetooth LE, ZigBee IP, RF) protocols for the Physical- Data Link layer communication technologies 1 Connected devices communication to the Local Network and Gateway 1 st to i th
More informationWireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS
How to Set Up a Secure Home Wireless Network What you don t know about setting up a home wireless network can hurt you. 2008 APCUG Convention Session Tom Jones, P.E., RCDD-NTS CQS-CWLSS AGENDA Some Terms
More informationD. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.
Volume: 119 Questions Question No: 1 John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website.
More informationCommunication Systems for the Mobile Information Society
Communication Systems for the Mobile Information Society Martin Sauter Nortel Networks, Germany John Wiley Si Sons, Ltd Contents Preface List of Figures List of Tables List of Abbreviations xi xiii xix
More informationEverybody s connecting.
Everybody s connecting. The ABGs of Wireless LAN Technology Overview February 2003 Introduction Wireless LANs (WLANs) using the 802.11 standard offer compelling value in office, public, and home LAN environments.
More informationFrequently Asked Questions WPA2 Vulnerability (KRACK)
Frequently Asked Questions WPA2 Vulnerability (KRACK) Release Date: October 20, 2017 Document version: 1.0 What is the issue? A research paper disclosed serious vulnerabilities in the WPA and WPA2 key
More informationDatasheet. Enterprise WiFi System. Models: UAP, UAP-LR, UAP-Pro, UAP-Outdoor, UAP-Outdoor5. Unlimited Indoor/Outdoor AP Scalability in a
Enterprise WiFi System Models: UAP, UAP-LR, UAP-Pro, UAP-Outdoor, UAP-Outdoor5 Unlimited Indoor/Outdoor AP Scalability in a 1 The UniFi Enterprise WiFi System is a scalable enterprise access point solution
More informationLTE : The Future of Mobile Broadband Technology
LTE : The Future of Mobile Broadband Technology Erick Setiawan tukangbajaksawah@gmail.com 1 Become a necessity today, where the wireless broadband technology needed to meet increasing expectations in terms
More informationCS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis
CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE
More informationCSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1
CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18
More informationChapter 1. Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization. Revised: August 2011
Introduction ti Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
More informationCOMP327 Mobile Computing Session: Lecture Set 5 - Wireless Communication Part 2
COMP327 Mobile Computing Session: 2016-2017 Lecture Set 5 - Wireless Communication Part 2 51 SIM (Subscriber Identity Modules) Smart cards that are inserted into the GSM phone to identify the user Stores
More informationCSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology
CSNT 180 Wireless Networking Chapter 7 WLAN Terminology and Technology Norman McEntire norman.mcentire@servin.com Founder, Servin Corporation, http://servin.com Technology Training for Technology Professionals
More informationMobile Computing Introduction
Mobile Computing Introduction UNIT - 1 Prepared By:- NITIN PANDYA Assistant Professor, SVBIT. What is Mobile Computing 2 NTIIN PANDYA 3 NTIIN PANDYA Definitions Mobile Computing What is mobile computing?
More informationWireless (Select Models Only) User Guide
Wireless (Select Models Only) User Guide Copyright 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its
More informationVendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo
Vendor: HP Exam Code: HP2-Z32 Exam Name: Implementing HP MSM Wireless Networks Version: Demo QUESTION 1 A network administrator deploys several HP MSM APs and an HP MSM Controller. The APs discover the
More informationA Configuration Protocol for Embedded Devices on Secure Wireless Networks
A Configuration Protocol for Embedded Devices on Secure Wireless Networks Larry Sanders lsanders@ittc.ku.edu 6 May 2003 Introduction Wi-Fi Alliance Formally Wireless Ethernet Compatibility Alliance (WECA)
More informationIP network that supports DHCP or manual assignment of IP address, gateway, and subnet mask
Network Requirements, page 1 Wireless LAN, page 2 Wi-Fi Network Components, page 3 802.11 Standards for WLAN Communications, page 6 Security for Communications in WLANs, page 9 WLANs and Roaming, page
More informationLESSON 12: WI FI NETWORKS SECURITY
LESSON 12: WI FI NETWORKS SECURITY Raúl Siles raul@taddong.com Founder and Security Analyst at Taddong Introduction to Wi Fi Network Security Wireless networks or Wi Fi networks IEEE 802.11 Standards Information
More informationCYBER ATTACKS EXPLAINED: WIRELESS ATTACKS
CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these
More informationWireless MAXg Technology
Wireless MAXg Technology MAXimizing range, performance, security and simplicity for 802.11g networks Technology Note Wireless technology has undoubtedly become a ubiquitous presence in our computing environment,
More informationWireless Security. Comp Sci 3600 Security. Attacks WEP WPA/WPA2. Authentication Encryption Vulnerabilities
Wireless Security Comp Sci 3600 Security Outline 1 2 3 Wired versus wireless Endpoint Access point Figure 24.1 Wireless Networking Components Locations and types of attack Outline 1 2 3 Wired Equivalent
More informationWLAN Security. Dr. Siwaruk Siwamogsatham. ThaiCERT, NECTEC
WLAN Security Dr. Siwaruk Siwamogsatham ThaiCERT, NECTEC Agenda Wireless Technology Overview IEEE 802.11 WLAN Technology WLAN Security Issues How to secure WLAN? WLAN Security Technologies Wireless Technologies
More informationWireless-N Business Notebook Adapter
Wireless-N Business Notebook Adapter USER GUIDE BUSINESS SERIES Model No. WPC4400N Model Model No. No. Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered
More information1. INTRODUCTION. Wi-Fi 1
Wi-Fi 1 1. INTRODUCTION Wi-Fi, or Wireless Fidelity, is freedom: it allows you to connect to the Internet from your home, a bed in a hotel room or at a conference room at work without wires. How? Wi-Fi
More informationConfiguring a WLAN for Static WEP
Restrictions for Configuring Static WEP, page 1 Information About WLAN for Static WEP, page 1 Configuring WPA1+WPA2, page 3 Restrictions for Configuring Static WEP The OEAP 600 series does not support
More informationConfiguring Wireless Security Settings on the RV130W
Article ID: 5021 Configuring Wireless Security Settings on the RV130W Objective Wireless networking operates by sending information over radio waves, which can be more vulnerable to intruders than a traditional
More informationWireless# Guide to Wireless Communications. Objectives
Wireless# Guide to Wireless Communications Chapter 1 Introduction to Wireless Communications Jorge Olenewa jolenewa@georgebrown.ca Office: E425 ext. 6809 Objectives Explain how the major wireless technologies
More informationWIRELESS LOCAL AREA NETWORK SECURITY USING WPA2-PSK
WIRELESS LOCAL AREA NETWORK SECURITY USING WPA2-PSK S.DEEPTHI 1 G.MARY SWARNALATHA 2 PAPARAO NALAJALA 3 Assoc. Professor, Dept. of Electronics &Communication Engineering at Institute of Aeronautical Engineering,
More informationWireless Networking Basics. Ed Crowley
Wireless Networking Basics Ed Crowley 2014 Today s Topics Wireless Networking Economic drivers and Vulnerabilities IEEE 802.11 Family WLAN Operational Modes Wired Equivalent Privacy (WEP) WPA and WPA2
More informationWireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design
Protocol Analysis and Design 1 Networks 1. WIRELESS NETWORKS 2 Networks 1. WIRELESS NETWORKS 1.1 WiFi 802.11 3 Networks OSI Structure 4 Networks Infrastructure Networks BSS : Basic Set Service ESS : Extended
More informationAssignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson
Project Whitepaper ITEC495-V1WW Instructor: Wayne Smith Jim Patterson Table of Contents 1. Abstract Page 3 2. Introduction Page 3 3. Analysis Page 4 4. Solution Discussion Page 7 5. Evaluation Criteria
More information802.11b+g Wireless LAN USB Adapter. User Manual
802.11b+g Wireless LAN USB Adapter User Manual REGULATORY STATEMENTS FCC Certification The United States Federal Communication Commission (FCC) and the Canadian Department of Communications have established
More informationConfiguring the Client Adapter
CHAPTER 5 This chapter explains how to configure profile parameters. The following topics are covered in this chapter: Overview, page 5-2 Setting General Parameters, page 5-3 Setting Advanced Parameters,
More informationWireless Technologies
Wireless Technologies Networking for Home and Small Businesses Chapter 7 Manju. V. Sankar 1 Objectives Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless
More informationWireless Local Area Networks (WLAN)
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Wireless Local Area Networks (WLAN) Mobile Communication and Mobile Computing Prof. Dr. Alexander Schill http://www.rn.inf.tu-dresden.de
More informationOverview of Wi-Fi. Dr. Srikanth Subramanian CKO, Nanocell Networks Wi-Fi A Wireless Success Story
Overview of Wi-Fi Dr. Srikanth Subramanian CKO, Nanocell Networks www.nanocellnetworks.com Wi-Fi A Wireless Success Story Wi-Fi present in all laptops/aps Wi-Fi Traffic trends Source: Cisco percentage
More informationArchitectures of Next Generation Wireless Networks. Pascal LORENZ.
Architectures of Next Generation Wireless Networks lorenz@ieee.org Internet is increasing exponentially: 2001: 180 million users today: more than 2 billions users Internet traffic and the bandwidth double
More informationCOPYRIGHTED MATERIAL. Contents
Contents Foreword Introduction xxv xxvii Assessment Test xxxviii Chapter 1 WLAN Security Overview 1 Standards Organizations 3 International Organization for Standardization (ISO) 3 Institute of Electrical
More informationExam : PW Title : Certified wireless security professional(cwsp) Version : DEMO
Exam : PW0-200 Title : Certified wireless security professional(cwsp) Version : DEMO 1. Given: John Smith often telecommutes from a coffee shop near his home. The coffee shop has an 802.11g access point
More informationTable of Contents. Chapter 1 Product Overview Features Package Contents LED Indicator and Panel Description...
Copyright Statement is the registered trademark of Monoprice. All the products and product names mentioned herein are the trademarks or registered trademarks of their respective holders. Copyright of the
More informationProduct Description. HUAWEI E5251 Mobile WiFi V100R001 HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date
HUAWEI E5251 Mobile WiFi V100R001 Issue 01 Date 2013-02-21 HUAWEI TECHNOLOGIES CO., LTD. Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. Please feel free
More informationEnterprise WiFi System. Datasheet. 4Gon Tel: +44 (0) Fax: +44 (0)
Enterprise WiFi System Models: UniFi AP-Mini (UAP-Mini), UniFi AP (UAP), UniFi AP-Long Range (UAP-LR), UniFi AP-Outdoor (UAP-Outdoor) Unlimited Indoor/Outdoor AP Scalability in a Unified Management System
More informationDatasheet ac Wave 2 Enterprise Wi-Fi Access Point. Model: UAP-AC-HD. Simultaneous Dual-Band 4x4 Multi-User MIMO
802.11ac Wave 2 Enterprise Wi-Fi Access Point Model: UAP-AC-HD Simultaneous Dual-Band 4x4 Multi-User MIMO Four-Stream 802.11ac Wave 2 Technology 802.3at PoE+ Compatibility Scalable Enterprise Wi-Fi Management
More informationThe WiMAX Technology
Page 2 Oeconomics of Knowledge, Volume 2, Issue 2, 2Q 2010 The WiMAX Technology Felician ALECU, PhD, University Lecturer Department of Economic Informatics Academy of Economic Studies, Bucharest, Romania
More informationAccess Connections 5.1 for Windows Vista: User Guide
Access Connections 5.1 for Windows Vista: User Guide Access Connections 5.1 for Windows Vista: User Guide Note Before using this information and the product it supports, read the general information in
More informationEnterprise WiFi System. Datasheet. Models: UAP, UAP-LR, UAP-PRO, UAP-AC, UAP-Outdoor+, UAP-Outdoor5, UAP-AC Outdoor
Enterprise WiFi System Models: UAP, UAP-LR, UAP-PRO, UAP-AC, UAP-Outdoor+, UAP-Outdoor5, UAP-AC Outdoor Unlimited Indoor/Outdoor AP Scalability in a Unified Management System Breakthrough Speeds up to
More informationTemporal Key Integrity Protocol: TKIP. Tim Fielder University of Tulsa Tulsa, Oklahoma
Temporal Key Integrity Protocol: TKIP Tim Fielder University of Tulsa Tulsa, Oklahoma History IEEE released the first 802.11 specification back in 1997 The Wired Equivalent Privacy (WEP) authentication/encryption
More informationDigiworld Future Networks. Wednesday, November 19 th, Bernard Celli Strategy Director Agence nationale des fréquences (ANFR)
Digiworld 2014 Future Networks Wednesday, November 19 th, 2014 Bernard Celli Strategy Director Agence nationale des fréquences (ANFR) Spectrum and Society/Economy Many sectors rely on access to spectrum
More informationWireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved
Wireless Networking Chapter 23 Overview In this chapter, you will learn how to Discuss wireless networking components Analyze and explain wireless networking standards Install and configure wireless networks
More informationCEN 538 Wireless LAN & MAN Networks
King Saud University College of Computer and Information Sciences Department of Computer Engineering CEN 538 Wireless LAN & MAN Networks Dr. Ridha OUNI rouni@ksu.edu.sa LMS web site References Text book
More informationWorldwide Release. Your world, Secured ND-IM005. Wi-Fi Interception System
Your world, Secured 2016 Worldwide Release System Overview Wi-Fi interception system is developed for police operations and searching of information leaks in the office premises, government agencies and
More informationTestsDumps. Latest Test Dumps for IT Exam Certification
TestsDumps http://www.testsdumps.com Latest Test Dumps for IT Exam Certification Exam : PW0-200 Title : Certified wireless security professional(cwsp) Vendors : CWNP Version : DEMO Get Latest & Valid PW0-200
More informationEnterprise WiFi System. Datasheet. Models: UAP, UAP-LR, UAP-Pro, UAP-Outdoor, UAP-Outdoor5
Enterprise WiFi System Models: UAP, UAP-LR, UAP-Pro, UAP-Outdoor, UAP-Outdoor5 Unlimited Indoor/Outdoor AP Scalability in a Unified Management System Breakthrough Capacity up to 750 Mbps Intuitive UniFi
More informationWireless LAN, WLAN Security, and VPN
Wireless LAN, WLAN Security, and VPN 麟瑞科技台南辦事處技術經理張晃崚 WLAN & VPN FAQ What is WLAN?802.11a?802.11b?802.11g? Which standard (product) should we use? How to deploy WLAN? How to block intruders? How to authenticate
More informationWireless Communication
Wireless Communication Hwajung Lee Key Reference: Prof. Jong-Moon Chung s Lecture Notes at Yonsei University Wireless Communications Bluetooth Wi-Fi Mobile Communications LTE LTE-Advanced Mobile Communications
More informationHow Does it Work. Presented by StarSight Team
How Does it Work Presented by StarSight Team Agenda Why StarSight Overview of Wireless Technologies WLAN Components Throughput and Coverage Interference Access Point Placement Equipment considerations
More informationEnterprise WiFi System. Datasheet. Tel: +44 (0) Fax: +44 (0)
Enterprise WiFi System Models: UAP, UAP-LR, UAP-PRO, UAP-AC, UAP-Outdoor+, UAP-Outdoor5, UAP-AC Outdoor Unlimited Indoor/Outdoor AP Scalability in a Unified Management System Breakthrough Speeds up to
More informationRegulation and the Internet of Things
Regulation and the Internet of Things 15 th Global Symposium for Regulators (GSR15) Prof. Ian Brown The views expressed in this presentation are those of the author and do not necessarily reflect the opinions
More informationA POLYCOM WHITEPAPER Deploying Enterprise-Grade Wi-Fi Telephony : Coverage, Capacity, Quality of Service, and Security Considerations for Delivering
Deploying Enterprise-Grade Wi-Fi Telephony : Coverage, Capacity, Quality of Service, and Security Considerations for Delivering Excellent Voice Quality on Enterprise Wi-Fi Networks November 2010 Coverage,
More informationNetworks and Telecommunication
Networks and Telecommunication Assignment R. C. A. Wijeratne 07/AS/CI/032 EP594 WI-Fi Technology Introduction Wi-Fi is a mechanism for wirelessly connecting electronic devices. A device enabled with Wi-Fi,
More informationManagement Information Systems
Telecommunications, the Internet, and Wireless Technology Lecturer: Richard Boateng, PhD. Lecturer in Information Systems, University of Ghana Business School Executive Director, PearlRichards Foundation,
More informationNaveen Kumar. 1 Wi-Fi Technology
Naveen Kumar 1 Contents 2 Introduction Need of Purpose History How a Wi-Fi Network Works Topologies & Configurations Applications Wi-Fi Security Advantages & Limitations Innovations Introduction 3 Wireless
More informationCWNA Exam PW0-250 Certified Wireless Design Professional (CWDP) Version: 6.0 [ Total Questions: 60 ]
s@lm@n CWNA Exam PW0-250 Certified Wireless Design Professional (CWDP) Version: 6.0 [ Total Questions: 60 ] Question No : 1 After surveying for the ideal mounting locations for APs, you have been asked
More informationPowerStation2 LiteStation2 LiteStation5 User s Guide
PowerStation2 LiteStation2 LiteStation5 User s Guide Copyright 2007 Ubiquiti Networks Inc. All rights reserved. Contents INTRODUCTION...2 QUICK SETUP GUIDE...3 CONFIGURATION GUIDE...7 Main Settings...8
More informationGLOSSARY OF CELLUAR TERMS
GLOSSARY OF CELLUAR TERMS Air Interface: It is the operating system of a wireless network.. Airtime: The amount of time a person spends talking on their cellular device. AMPS: Advanced mobile phone service
More informationWireless LAN Access Point
Wireless LAN Access Point IEEE 802.11b/g 54Mbps 501903 User s Manual Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents... 2 1.2 Features... 2 1.3 Specifications... 2 1.4 Physical Description...
More informationPhysical and Link Layer Attacks
Physical and Link Layer Attacks CMSC 414 November 1, 2017 Attenuation Physical links are subject to attenuation Copper cables have internal resistance, which degrades signal over large distances Fiber
More informationSecuring a Wireless LAN
Securing a Wireless LAN This module describes how to apply strong wireless security mechanisms on a Cisco 800, 1800, 2800, or 3800 series integrated services router, hereafter referred to as an access
More informationLast Lecture: Data Link Layer
Last Lecture: Data Link Layer 1. Design goals and issues 2. (More on) Error Control and Detection 3. Multiple Access Control (MAC) 4. Ethernet, LAN Addresses and ARP 5. Hubs, Bridges, Switches 6. Wireless
More informationBasic Wireless Settings on the CVR100W VPN Router
Basic Wireless Settings on the CVR100W VPN Router Objective A Wireless Local Area Network (WLAN) utilizes radio communication to connect wireless devices to a LAN. An example is a Wi-Fi hotspot at a cafe.
More informationProduct Description. HUAWEI E5180s-610 LTE cube V200R001 HUAWEI TECHNOLOGIES CO., LTD. Issue. Date
HUAWEI E5180s-610 LTE cube V200R001 Issue 01 Date 2014-11-10 HUAWEI TECHNOLOGIES CO., LTD. Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. Please feel
More informationMobile MOUSe WIRELESS TECHNOLOGY SPECIALIST ONLINE COURSE OUTLINE
Mobile MOUSe WIRELESS TECHNOLOGY SPECIALIST ONLINE COURSE OUTLINE COURSE TITLE WIRELESS TECHNOLOGY SPECIALIST COURSE DURATION 13 Hours of Interactive Training COURSE OVERVIEW This course will teach you
More informationChapter 5 Local Area Networks. Computer Concepts 2013
Chapter 5 Local Area Networks Computer Concepts 2013 5 Chapter Contents Section A: Network Building Blocks Section B: Wired and Wireless Technologies Section C: Network Setup Section D: Sharing Files Section
More informationCSCD 433/533 Advanced Networking
CSCD 433/533 Advanced Networking Lecture 6 Wireless LAN Components and Characteristics Winter 2017 Some Material in these slides from J.F Kurose and K.W. Ross All material copyright 1996-2007 1 Introduction
More informationIEEE n Wireless PCI Adapter. User s Manual
IEEE 802.11n Wireless PCI Adapter User s Manual October, 2008 FCC Warning This equipment has been tested and found to comply with the limits for a Class C digital device, pursuant to part 15 of the FCC
More informationProduct Description. HUAWEI E5186s-22a LTE CPE V200R001 HUAWEI TECHNOLOGIES CO., LTD. Issue. Date
HUAWEI E5186s-22a LTE CPE V200R001 Issue 05 Date 2015-07-09 HUAWEI TECHNOLOGIES CO., LTD. Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. Please feel
More informationTable of Contents. Chapter 1Introduction Package Contents Features Specifications Physical Description...
Table of Contents Chapter 1Introduction... 3 1.1 Package Contents... 3 1.2 Features... 3 1.3 Specifications... 3 1.4 Physical Description... 4 Chapter 2Wireless LAN Access Point Connection... 5 Chapter
More informationThe following chart provides the breakdown of exam as to the weight of each section of the exam.
Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those
More informationEnterprise WiFi System. Datasheet. 4Gon Tel: +44 (0) Fax: +44 (0)
Enterprise WiFi System Models: UAP, UAP-LR, UAP-Pro, UAP-Outdoor, UAP-Outdoor5 Unlimited Indoor/Outdoor AP Scalability in a Unified Management System Breakthrough Capacity up to 750 Mbps Intuitive UniFi
More information