Doc.: IEEE 802.11-03/172r1 Submission NDIS 5.1 802.11 Objects Byoung-Jo “J “ Kim AT&T Labs-Research Mar. ’03, Dallas.

Slides:



Advertisements
Similar presentations
MultiNet: Connecting to Multiple IEEE Networks Using a Single Radio Ranveer Chandra, Cornell University joint work with: Victor Bahl (MSR) and Pradeep.
Advertisements

Doc.: IEEE /080r0A Submission January 2003 Black/Kasslin/Sinivaara, NokiaSlide 1 A Framework for RRM Simon Black, Mika Kasslin, Hasse Sinivaara.
Wireless LAN Security Understanding and Preventing Network Attacks.
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
Video Presentation System
Information Networking Security and Assurance Lab National Chung Cheng University Kai, 2004 INSA1 Using Kismet to enhance the security level in enterprise.
Doc.: IEEE /0604r1 Submission May 2014 Slide 1 Modeling and Evaluating Variable Bit rate Video Steaming for ax Date: Authors:
“All your layer are belong to us” Rogue APs, DHCP/DNS Servers, and Fake Service Traps.
Address Configuration in Adhoc Networks in IPv4. By Meenakshi Sundaram V.
Doc.: IEEE /173r1 Submission Byoung-Jo Kim, AT&T March 2003 Slide 1 Coexistence of Legacy & RSN STAs in Public WLAN Byoung-Jo “J” Kim AT&T Labs-Research.
Wireless Packet Loss Rate Xiangzhou Chen Zhihan Xia.
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
Handoff Delay for b Wireless LANs Masters Project defense Anshul Jain Committee: Dr. Henning Schulzrinne, Columbia University Dr. Zongming Fei, University.
7/14/2015 Center for Wireless COMMUNICATIONS COMPUTER SCIENCE and ENGINEERING Real-Time Performance Monitoring and Evaluation of an Wireless LAN.
Energy Models David Holmer Energy Model  Captures the effect of the limited energy reserves of mobile devices (i.e. batteries)  Models.
1 Configuring Linksys Wireless Router Prof. Valencia Community College.
Troubleshooting methods. Module contents  Avaya Wireless tools  Avaya Wireless Client Manager  Avaya Wireless AP Manager  Hardware indicators  Non.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
Wireless scheduling analysis (With ns3) By Pradeep Prathik Saisundatr.
Dainis Krakops’ Wireless Network MOTOROLA SURFboard SB5101 CABLE MODEM Enables cable operators to provide broadband Internet connection for my LAN devices.
Wireless Networking 102.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to 802: Managing and Troubleshooting PCs Fourth Edition (Exam.
Ch. 5 – Access Points. Overview Access Point Connection.
Module 4 - Networking MIS5122: Enterprise Architecture for the IT Auditor.
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
David Harding Software Design Engineer Network Devices Platform Microsoft Corporation SoftAP-Based Test Infrastructure For Obtaining The Logo For WLAN.
Doc.: IEEE /124r0 Submission January 2003 Byoung-Jo “J” KimSlide 1 RRM Requirements for Public WLAN Service Provider Byoung-Jo “J” Kim AT&T Labs-Research.
1 Chapter Overview Wireless Technologies Wireless Security.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
Wave Relay System and General Project Details. Wave Relay System Provides seamless multi-hop connectivity Operates at layer 2 of networking stack Seamless.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
KIS – Cvičenie #5 IP konfigurácia v prostredí OS Windows Marián Beszédeš, B506
Doc.: IEEE /273r0 Submission March 2003 Byoung-Jo “J” Kim, AT&T Labs-ResearchSlide 1 MIB Discussions for TGk Byoung-Jo “J” Kim
Wireless LANs Configuring Cisco WLAN Clients. Cisco a/b/g WLAN Client Adapters a/b/g dual-band client adapters Supports all three current.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
1. Insert the Resource CD into your CD-ROM drive, click Start and choose Run. In the field that appears, enter F:\XXX\Setup.exe (if “F” is the letter of.
Doc.: IEEE /172r0 Submission March 2003 Byoung-Jo Kim, AT&TSlide 1 NDIS Objects Byoung-Jo “J “ Kim AT&T Labs-Research Mar. ’03, Dallas.
Block1 Wrapping Your Nugget Around Distributed Processing.
IEEE i WPA2. IEEE i (WPA2) IEEE i, is an amendment to the standard specifying security mechanisms for wireless networks. The.
Wireless Hacking. Wireless LANs and footprinting Wireless LANs l see basic conceptsbasic concepts Linux versus Windows footprinting l you need a card.
Hands-On Ethical Hacking and Network Defense Lecture 14 Cracking WEP Last modified
Doc.: IEEE /0394r0 Submission March 2012 HuaweiSlide 1 ISD Use Cases and Requirements Date: Authors:
Module 2: Allocating IP Addressing by Using Dynamic Host Configuration Protocol (DHCP)
Submission Page 1 November 2002 doc.: IEEE /677r0 Daryl Kaiser, Cisco Systems Radio Measurement Actions Daryl Kaiser (Cisco Systems) 12 November.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Solving the Security Risks of WLAN Tuukka Karvonen
KSU 2015-Summer Cyber Security | Group 1 | Seul Alice Bang Get a Wifi Password.
August 27, 2003 Evaluation of WiNc Manager A Wireless Network Management Software from Cirond Technologies Inc. by Kassim Olawale Radio Science Laboratory.
Doc.: IEEE /171r2A Submission March 2003 Byoung-Jo “J” Kim, AT&T Labs-Research RRM MIB Enhancement Paired with 03/171r0 Word doc Byoung-Jo “J”
Summary: Unlike WindowsXP, Windows2000 wireless client utilities are different from vendor to vendor and even within versions of a vendor’s client utility.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
CSI WG / IETF741/12 Implementation of SeND/CGA and Extensions Beijing University of Posts and Telecommunications HUAWEI.
Doc.: IEEE k Submission July 2003 Byoung-Jo "J" Kim, AT&T Labs-ResearchSlide 1 RRM Feature to Function Match Byoung-Jo “J” Kim AT&T.
Doc.: IEEE m Submission ETRI July 2012 Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Doc.: IEEE /171ar0 Submission March 2003 Byoung-Jo “J” Kim, AT&T Labs-Research RRM MIB Enhancement Paired with 03/171r0 Word doc Byoung-Jo “J”
Last updated: 20 April 2006 Alberto Escudero Pascaul ItrainOnline MMTK Access Point Configuration Developed by IT +46 Based on the.
Instructor Materials Chapter 6 Building a Home Network
Wireless Technology.
Wireless Hacking.
Coexistence of Legacy & RSN STAs in Public WLAN
Radio Resource Measurements MIB – Seattle Ad Hoc and After
WLAN Security Antti Miettinen.
AP Power Down Notification
Antti Miettinen (modified by JJ)
Chapter-5 Traffic Engineering.
CR for CID 1115 Date: Authors: May 2019
Modeling and Evaluating Variable Bit rate Video Steaming for ax
RRM MIB Enhancement Paired with 03/171r0 Word doc
Presentation transcript:

doc.: IEEE /172r1 Submission NDIS Objects Byoung-Jo “J “ Kim AT&T Labs-Research Mar. ’03, Dallas

doc.: IEEE /172r1 Submission NDIS 5.1 NDIS: Device Driver to OS Interface specification for Windows (including PPC) NDIS 5.1 adds specific calls to support Win XP WLAN “auto” config – and search “802.11” –XP implements some of functions that used to be handled by vendor client software Initiate Scan and receive results Command to associate with a particular SSID Basic Configurations and Statistics

doc.: IEEE /172r1 Submission

doc.: IEEE /172r1 Submission FYI: Some Interesting Behaviors If WLAN auto config profiles exist, always prefer visible SSID over invisible SSID regardless of profile order: Does not seem by design Response to Beacon WEP bit is inconsistently handled depending on card models Same for Broadcast encryption/decryption and handling of unencrypted broadcast under 1x –Hopefully will get fixed with the implementation of WPA and 11i Rumors of SSID hopping when many SSID visible –Personally encountered, but never verified in lab –Maybe fixed with SP1 or other patches

doc.: IEEE /172r1 Submission RRM Additions to NDIS Host to NIC interaction: Beyond our scope, but something to keep in mind and work with others Objects that set and retrieve TGk actions and results –A Subset of TGk actions Extend the statistics Object and Fix definitions –Preferably, it will share our definitions and parameters Can be used for SNMP if an agent is present

doc.: IEEE /172r1 Submission Linux Wireless Tools Linux/Tools.htmlhttp:// Linux/Tools.html Adds WLAN specific APIs for drivers and some tools –Available in most Linux distributions now –Open source, voluntary effort still progressing Drivers implementing the API available for several major chipsets and NIC models Relaxed approach like many open source projects

doc.: IEEE /172r1 Submission Some interesting Parmeters #define SIOCSIWSENS 0x8B08 /* set sensitivity (dBm) */ #define SIOCSIWTXPOW 0x8B26 /* set transmit power (dBm) */ #define IWEVQUAL 0x8C01 /* Quality part of statistics (scan) */ #define IWEVREGISTERED 0x8C03 /* Discovered a new node (AP mode) */ #define IWEVEXPIRED 0x8C04 /* Expired a node (AP mode) */ #define IW_SCAN_ALL_ESSID 0x0001 /* Scan all ESSIDs */ #define IW_SCAN_ALL_FREQ 0x0004 /* Scan all Frequencies */ #define IW_SCAN_ALL_MODE 0x0010 /* Scan all Modes */ #define IW_SCAN_ALL_RATE 0x0040 /* Scan all Bit-Rates */ struct iw_quality qual; /* Quality of the link * (instant/mean/max) */ struct iw_discarded discard; /* Packet discarded counts */ struct iw_missed miss; /* Packet missed counts */

doc.: IEEE /172r1 Submission Continued struct iw_range { /* Informative stuff (to choose between different interface) */ __u32 throughput; /* To give an idea... */ /* In theory this value should be the maximum benchmarked * TCP/IP throughput, because with most of these devices the * bit rate is meaningless (overhead an co) to estimate how * fast the connection will go and pick the fastest one. * I suggest people to play with Netperf or any benchmark... */ struct iw_quality max_qual; /* Quality of the link */

doc.: IEEE /172r1 Submission Continued /* Average quality of link & SNR */ struct iw_quality avg_qual; /* Quality of the link */ /* This should contain the average/typical values of the quality * indicator. This should be the threshold between a "good" and * a "bad" link (example : monitor going from green to orange). * Currently, user space apps like quality monitors don't have any * way to calibrate the measurement. With this, they can split * the range between 0 and max_qual in different quality level * (using a geometric subdivision centered on the average). * I expect that people doing the user space apps will feedback * us on which value we need to put in each driver... */

doc.: IEEE /172r1 Submission Recommendations Though beyond our scope, we can interact informally for feedback and feedforward Jointly develop optional recommendation for accessing TGk features within host