To help your signal for both voice and data use BlueTooth or even better an ear bud as it will reduce attenuation of the device while reducing your brain’s exposure to LTE, WiFi, and BlueTooth (if you choose the ear bud option)
I hope between the info in this blog and in Ankit’s article your mobile experience will be a little better each day!
How could WiFi Superman use his knowledge of 802.11 technologies to help apprehend the escapees of the Clinton Correctional Facility? Well first we will need to suspend reality a bit as inmates get very limited access to the Internet and cell phones are strictly forbidden. But in our little story let’s suppose that the accomplice of this love triangle, “Tillie” Mitchell, gave the escaped convicts her smart phone.
So at the Clinton Correctional Facility there is a BYOD network that Tillie uses for her smart phone. Let’s say that law enforcement finds out that she gave her phone to the escapees. There are a couple avenues a crime fighter could take, although a little far-fetched it would be possible. The first thing that could be investigated is what the MAC address of the wireless card was.
This could be determined in several different ways. Most of the WiFi manufacturers have client information that will remain in memory for some time, if we knew the hostname of the device we could correlate this. ClearPass and ISE will have data regarding clients and may allow us to narrow down to a handful of MAC addresses if we only know the make and model of the device. Once we have a MAC or a few MACs then we can proceed to search for these on the airwaves.
Let say Richard Matt has relatives in Albany and police have a strong suspicion that he is on the lam and hunkered down in Albany. WiFi Superman could war-fly (akin to war-driving) until he finds the MAC address and try to pinpoint the building where they are hiding. If Optimum Online was willing to help they could look for the MAC and if they saw it on 3 or more access points we could locate them by triangulation.
Now let’s say we have no idea what the MAC address is. Another plan of attack could theoretically work. Clients discover networks in one of two ways: passive or active. The prison has a specific SSID for its BYOD and we know what it is. When scanning the client is looking for info on available wireless networks. In the passive scan the wireless NIC listens for beacons or probe responses. Beacons will not help us. They could hurt our effort if an access point happened to be broadcasting the same SSID.
In active scanning the wireless client SSID portion of the probe request is NULL or empty. This is also of no use to us. However in an active scan the probe request will request info in one of two manners. The client will either ask “Is anyone there?” (FF:FF:FF:FF:FF:FF). The client’s other option is to ask “Are you there Bill?” this request contain specific SSIDs stored in the clients wireless profiles of the clients software (e.g. Wireless Zero Config). Since we know the SSID from the prison we can snoop for the SSID. By putting a laptop in promiscuous mode and collecting all packets in an area we suspect the duo to be hiding we can later filter packets to show only probe requests and further filter on the SSID.
And there you have it, if we see the SSID in question we could ascertain is the inmates are in the area. It is a little far-fetched, but super hero work always is.
WiFi for Dummies sounded too cliche and I suspect is a registered trademark, so I am going with WIFI for CHICKS & JOCKS. This topic reminds me of when my old friend and former governor of California called WiFi Superman asking for help understanding WiFi. He explained that although he had played superheroes, he was not actually a superhero nor was he extremely technical. So I will try to recreate the primer I shared with him, this will teach you the basics.
WiFi is a technology that uses radio-frequency waves (electro-magnetic energy) that allows devices to communicate. The standards that WiFi adheres to were developed by the IEEE under 802.11 (there are numerous amendments). Two other bodies exist to regulate and provide interoperability for you and your WiFi devices.
The FCC regulates which frequencies you can “talk” on and how many watts are allowed. The WiFi Alliance certifies devices by testing the functionality of devices to make sure that they comply with 802.11 standards and the amendments that add features and functionality. The FCC is responsible for fining Marriott Hotels for jamming non-hotel signals as WiFi operates in an unlicensed frequency band and therefore anyone can transmit or receive on those bands. The WiFi Alliance is responsible for making sure that your Dell laptop’s WiFi card can secure and communicate with your Linksys wireless router.
WiFi exists in the 2.4 GHz (ISM band) and 5.0 GHz (U-NII) bands. Not all cards support both. 802.11 started with data rates of 1 and 2 Mbps. After amendments a,b,g,n,and ac we are looking at data rates in the Gbps range. 802.11n and 802.11ac have included many enhancement such asMIMO (multiple-input and multiple-output) and beamforming that make these high-throughput (HT) data rates possible. Now might be a good time to get a cup of coffee if your brain is exploding or if you have had enough.
Okay apparently you want to know more. So what is an Ad-Hoc network? Essentially an Ad-Hoc network is a wireless network that does not use an Access Point as the central point of communication. In an Ad-Hoc WLAN one device acts as the central coordinator (like a cell-phone Mi-Fi). Having your device set to deny ad-hoc connections is a good security practice otherwise it is easy to be compromised by someone. Other good practices are to avoid Open SSIDs as they do not use encryption and leave you vulnerable to eavesdropping.
So when setting up your home WiFi always use the strongest encryption. Choose WPA2 over WPA, AES over TKIP, and never use WEP: an easy WEP passphrase can be broken in seconds. If you have advanced hardware and some time and patience you may be able to set up 802.1x/EAP as opposed to just PSK. This also increases your security, using 802.1x/EAP will prompt a mobile device for username and password. The keys used by the AP when you use this method are more complex and change more often, they are therefore superior.
I remember Arnold had a specific question for me. He asked, why is it that my wireless is always set to CHANNEL 6?” I explained to the Governator that there are 14 channels in the ISM band, however one can only use 1 through 11 in North America. Out of these 11 channels there are 3 that do not overlap. They are 1, 6, and 11. For some reason manufacturers almost always default to channel 6.
I think that is enough for the first WIFI for CHICKS & JOCKS. If you have specific questions you can leave me a message and I will reply on this blog.
It is a wireless client that determines when it will roam and to which access point it will roam. All we can do as designers is design and implement WLANs that make the clients’ decisions better. There are also two amendments to 802.11 that aid in this effort.
802.11k and 802.11r (which have been rolled up into 802.11-2012) were both spearheaded to aid clients in making wise roaming choices. If a client can roam faster and roam to the access point that will provide the best performance, all clients in the ESSID (a group of APs that share the same SSIDs and corresponding security) benefit.
802.11r or Fast BSS Transition (FT) is an amendment that provides for continuous connectivity via faster secure roaming. This is achieved in the following manner. Essentially a client completes a portion of the key exchange and that key is cached and waiting for the client should it roam to that particular AP. This reduces the time it takes to complete a secure roam between APs. There is another less-robust method that exists called OKC (Opportunistic Key Caching).
802.11k or Radio Resource Management (sometimes referred to as RRM). The purpose of 802.11k is to help a mobile unit roam to the best possible access point. Wikipedia list 4 steps how RRM achieves this…
Access point determines that client is moving away from it.
Informs client to prepare to switch to a new access point.
Client requests list of nearby access points
Access point gives site report
Client moves to best access point based on report
So no Mr. Mobile Client we cannot make you roam, but we can use the recommendations that the IEEE made to give you a strong incentive. There is yet one more amendment which I know little about (802.11v) and it seems not many others know much about. Furthermore it has not received much traction by vendors. There is some interesting info posted on Ben Miller’s blog…
If I need a new WiFi access point, should I get an 802.11n access point, one that follows 802.11 Clause 20 access point, or an HT access point.? Why not get them all? That’s easy enough you see because they are all the same!
Let’s look at how this whole mess began. The IEEE created the 802 family of standards in 1980. You probably recognize 802.3 as Ethernet and maybe even 802.5 for Token Ring if you’ve been around like me. The IEEE specifications that I deal with on a daily basis are 802.11 (WLAN) and 802.15 (WPAN). Way back in 1997 the original 802.11 standard was born and soon followed by 802.11a and b in 1999. 802.11g was born in 2003 which used the same modulation as 802.11a and ported it to 5.0GHz.
By the time 2007 came around the IEEE decided to reboot the standard to 802.11-2007 by rolling up all the amendments (a,b,d,e,g,h,i,j) into this one. The clauses are a little confusing and to make matters worse they changed in 2012 after a subsequent roll up.
Here are all the amendments (from Wikipedia) up until 2012…
IEEE 802.11-1997: The WLAN standard was originally 1 Mbit/s and 2 Mbit/s, 2.4 GHz RF and infrared (IR) standard (1997), all the others listed below are Amendments to this standard, except for Recommended Practices 802.11F and 802.11T.
IEEE 802.11a: 54 Mbit/s, 5 GHz standard (1999, shipping products in 2001)
IEEE 802.11b: Enhancements to 802.11 to support 5.5 Mbit/s and 11 Mbit/s (1999)
IEEE 802.11z: Extensions to Direct Link Setup (DLS) (September 2010)
IEEE 802.11-2012: A new release of the standard that includes amendments k, n, p, r, s, u, v, w, y, and z (March 2012)
Here is a handy little translator that explains further changes in the clauses from 2007 to 2012:
So that explains some things that are usually a little cloudy. IEEE specs are not the only area in the wireless arena that can be confusing. People’s definitions of Guest and BYOD often vary. My understanding is that Guest is usually a specific type of BYOD, whereas BYOD implies that the user is an employee but owns their own mobile device.
Remember that networking is very technical stuff and knowing terms and what acronyms stand for can be half the battle. I will spare you all the discussion on MPDU versus PSDU, I guess that will be a future blog.
Posted originally on July 7, 2014 By: John Busso, CISSP, ACMP, ITIL
Aruba AP270 Highlights
802.11ac in 5.0 GHz band with up to 1.3 Gbps data rate
802.11n in 2.4 GHz band with up to 600 Mbps data rate
AP275 has an integrated MIMO Omnidirectional antennas
AP274 allows for external MIMO N-type antennas
Aesthetic design mimics common fixture for lighting/cameras
NEMA and IP-rated (IP66/67) for harsh environments
ClientMatch enabled to leverage 802.11k,r,and v standards
Flexibility for use as campus, remote or independent AP
48VDC 802.3at-compliant or 100-240-Volt AC Power
I have been designing and implementing wireless networks since the ratification of 802.11 (yes prior to 802.11a or b). I have seen many technologies come and go, such as WiFi using 900 MHz and Free Space Optics (FSO), which was essentially wireless using lasers as opposed to microwaves. Aruba gets it right again improving on their existing outdoor wireless access point (see full product line here). The AP270 series outdoor access point is a purpose-built, state-of-the-art device that will survive extreme conditions and anticipated wireless standards, making it “future-proof” for years to come.
To understand what makes the AP270 such a great WiFi access point we need to look at a few key factors: being future-proof, easy install and manage, flexible, and high-performing.
AP270 access points are future-proof because they are fortified against extreme weather and environmental contaminants. The AP270 can operate between -40° F and 150° F. It withstands humidity in a range of 5%-95%. The access point can withstand up to 165 mph winds. The Aruba 270 series AP is also future-proof because it uses the latest IEEE specification 802.11ac .
This outdoor access point is easy to install with only two mounting template one for wall-mounting and one for pole-mounting. The mounting kits come in long and short depending on your specific application. Ethernet and serial console access makes configuring the AP270 easy and flexible. The AP275 comes with integrated internal 3×3 MIMO antennas. The AP274 can utilize any N-type antennas needed for your application .
Managing Aruba APs is easy and flexible because one can use the virtual controller resident on iAPs, controllers for campus and remote APs, or AirWave network management system for all of the above.
Aruba’s AP274/275 Access Points are high performing 802.11ac Access points that leverage several technologies. Transmit Beam Forming is used for increased reliability in signal delivery. Low Density Parity Check allows for high-efficiency error correction and increased throughput. Maximal Rate Combining improves receiver performance. Advanced Cellular Coexistence is employed to minimize interference from cellular systems. To improve downlink RF performance the AP270 uses Cyclic Delay Diversity.
So to sum it up, Aruba’s AP274’s and AP275’s are good looking, easy to install, flexible, and high-performing. Remember that they can be used as APs, iAPs or RAPs. You can use the turnkey AP275 with its integrated antennas or select the AP274 when antenna tuning is desired. Aruba offers all this at a list price of$1595 USD for the AP274. For more information Click Here
Real Time Locating Systems are no longer a secret. For many years now companies like Ekahau, Pango and AeroScout have been selling tags to help track devices that do not have a wireless card to communicate via WiFi (802.11).
Sure tagging an item is great to track it along the supply chain, it is great to tag a heart monitor and retrieve it before it leaves the hospital for the laundry wrapped up in the bed sheets. But when your company asks you to wear a badge that tracks you that is when you become very interested.
First off do not worry. You can already be tracked by your smartphone, tablet and laptop.
The reality is that this can provide much value in the areas of supply chain, workflow, and shrinkage. Aruba believes so strongly in RTLS and its ,many uses that it bought the company Meridian:
Industry experts believe that the proliferation of Bluetooth Low Energy (BLE) exciters will accelerate the accuracy and adoption of RTLS technology. Click here to learn more about how Aruba and RTLS can work together for you.
Everything wireless: cut the cord and hack your life!