Doc.: IEEE 802.11-03/172r0 Submission March 2003 Byoung-Jo Kim, AT&TSlide 1 NDIS 5.1 802.11 Objects Byoung-Jo “J “ Kim AT&T Labs-Research Mar. ’03, Dallas.

Slides:



Advertisements
Similar presentations
MultiNet: Connecting to Multiple IEEE Networks Using a Single Radio Ranveer Chandra, Cornell University joint work with: Victor Bahl (MSR) and Pradeep.
Advertisements

Doc.: IEEE /080r0A Submission January 2003 Black/Kasslin/Sinivaara, NokiaSlide 1 A Framework for RRM Simon Black, Mika Kasslin, Hasse Sinivaara.
Wireless LAN Security Understanding and Preventing Network Attacks.
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
Video Presentation System
Doc.: IEEE /0604r1 Submission May 2014 Slide 1 Modeling and Evaluating Variable Bit rate Video Steaming for ax Date: Authors:
“All your layer are belong to us” Rogue APs, DHCP/DNS Servers, and Fake Service Traps.
Address Configuration in Adhoc Networks in IPv4. By Meenakshi Sundaram V.
Doc.: IEEE /173r1 Submission Byoung-Jo Kim, AT&T March 2003 Slide 1 Coexistence of Legacy & RSN STAs in Public WLAN Byoung-Jo “J” Kim AT&T Labs-Research.
Wireless Packet Loss Rate Xiangzhou Chen Zhihan Xia.
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
Handoff Delay for b Wireless LANs Masters Project defense Anshul Jain Committee: Dr. Henning Schulzrinne, Columbia University Dr. Zongming Fei, University.
7/14/2015 Center for Wireless COMMUNICATIONS COMPUTER SCIENCE and ENGINEERING Real-Time Performance Monitoring and Evaluation of an Wireless LAN.
 Any unauthorized device that provides wireless access  Implemented using software, hardware, or a combination of both  It can be intentional or unintentionally.
1 Configuring Linksys Wireless Router Prof. Valencia Community College.
Troubleshooting methods. Module contents  Avaya Wireless tools  Avaya Wireless Client Manager  Avaya Wireless AP Manager  Hardware indicators  Non.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
Doc.: IEEE /492r02 Submission Orange Labs Date: Collaboration between 2.4/5 and 60 GHz May 2010 Authors:
Wireless Networking 102.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to 802: Managing and Troubleshooting PCs Fourth Edition (Exam.
Ch. 5 – Access Points. Overview Access Point Connection.
David Harding Software Design Engineer Network Devices Platform Microsoft Corporation SoftAP-Based Test Infrastructure For Obtaining The Logo For WLAN.
Doc.: IEEE /124r0 Submission January 2003 Byoung-Jo “J” KimSlide 1 RRM Requirements for Public WLAN Service Provider Byoung-Jo “J” Kim AT&T Labs-Research.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
Wave Relay System and General Project Details. Wave Relay System Provides seamless multi-hop connectivity Operates at layer 2 of networking stack Seamless.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
KIS – Cvičenie #5 IP konfigurácia v prostredí OS Windows Marián Beszédeš, B506
Doc.: IEEE /273r0 Submission March 2003 Byoung-Jo “J” Kim, AT&T Labs-ResearchSlide 1 MIB Discussions for TGk Byoung-Jo “J” Kim
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
Wireless LANs Configuring Cisco WLAN Clients. Cisco a/b/g WLAN Client Adapters a/b/g dual-band client adapters Supports all three current.
The University of Bolton School of Business & Creative Technologies Wireless Networks Introduction 1.
Wi-Fi Standards Lucy Nguyen Corey Trouard Zack Wepasnick.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
1. Insert the Resource CD into your CD-ROM drive, click Start and choose Run. In the field that appears, enter F:\XXX\Setup.exe (if “F” is the letter of.
Doc.: IEEE /172r1 Submission NDIS Objects Byoung-Jo “J “ Kim AT&T Labs-Research Mar. ’03, Dallas.
Block1 Wrapping Your Nugget Around Distributed Processing.
IEEE i WPA2. IEEE i (WPA2) IEEE i, is an amendment to the standard specifying security mechanisms for wireless networks. The.
Wireless Hacking. Wireless LANs and footprinting Wireless LANs l see basic conceptsbasic concepts Linux versus Windows footprinting l you need a card.
Hands-On Ethical Hacking and Network Defense Lecture 14 Cracking WEP Last modified
Doc.: IEEE /97 Submission March 1998 Pat Kinney, IntermecSlide 1 Wireless Solutions Continuum of needs for wireless products No one product which.
Doc.: IEEE /0394r0 Submission March 2012 HuaweiSlide 1 ISD Use Cases and Requirements Date: Authors:
Module 2: Allocating IP Addressing by Using Dynamic Host Configuration Protocol (DHCP)
Submission Page 1 November 2002 doc.: IEEE /677r0 Daryl Kaiser, Cisco Systems Radio Measurement Actions Daryl Kaiser (Cisco Systems) 12 November.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Solving the Security Risks of WLAN Tuukka Karvonen
KSU 2015-Summer Cyber Security | Group 1 | Seul Alice Bang Get a Wifi Password.
August 27, 2003 Evaluation of WiNc Manager A Wireless Network Management Software from Cirond Technologies Inc. by Kassim Olawale Radio Science Laboratory.
Doc.: IEEE /171r2A Submission March 2003 Byoung-Jo “J” Kim, AT&T Labs-Research RRM MIB Enhancement Paired with 03/171r0 Word doc Byoung-Jo “J”
Summary: Unlike WindowsXP, Windows2000 wireless client utilities are different from vendor to vendor and even within versions of a vendor’s client utility.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
CSI WG / IETF741/12 Implementation of SeND/CGA and Extensions Beijing University of Posts and Telecommunications HUAWEI.
Doc.: IEEE k Submission July 2003 Byoung-Jo "J" Kim, AT&T Labs-ResearchSlide 1 RRM Feature to Function Match Byoung-Jo “J” Kim AT&T.
Ch. 31 Q and A IS 333 Spring 2016 Victor Norman. SNMP, MIBs, and ASN.1 SNMP defines the protocol used to send requests and get responses. MIBs are like.
Doc.: IEEE m Submission ETRI July 2012 Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Doc.: IEEE /171ar0 Submission March 2003 Byoung-Jo “J” Kim, AT&T Labs-Research RRM MIB Enhancement Paired with 03/171r0 Word doc Byoung-Jo “J”
Last updated: 20 April 2006 Alberto Escudero Pascaul ItrainOnline MMTK Access Point Configuration Developed by IT +46 Based on the.
Instructor Materials Chapter 6 Building a Home Network
Maintaining a Secure and Usable Wireless Network
Wireless Technology.
Wireless Hacking.
Coexistence of Legacy & RSN STAs in Public WLAN
Radio Resource Measurements MIB – Seattle Ad Hoc and After
WLAN Security Antti Miettinen.
AP Power Down Notification
Antti Miettinen (modified by JJ)
Chapter-5 Traffic Engineering.
CR for CID 1115 Date: Authors: May 2019
Modeling and Evaluating Variable Bit rate Video Steaming for ax
RRM MIB Enhancement Paired with 03/171r0 Word doc
Load balancing of a wireless network
Presentation transcript:

doc.: IEEE /172r0 Submission March 2003 Byoung-Jo Kim, AT&TSlide 1 NDIS Objects Byoung-Jo “J “ Kim AT&T Labs-Research Mar. ’03, Dallas

doc.: IEEE /172r0 Submission March 2003 Byoung-Jo Kim, AT&TSlide 2 NDIS 5.1 NDIS: Device Driver to OS Interface specification for Windows (including PPC) NDIS 5.1 adds specific calls to support Win XP WLAN “auto” config – and search “802.11” –XP implements some of functions that used to be handled by vendor client software Initiate Scan and receive results Command to associate with a particular SSID Basic Configurations and Statistics

doc.: IEEE /172r0 Submission March 2003 Byoung-Jo Kim, AT&TSlide 3

doc.: IEEE /172r0 Submission March 2003 Byoung-Jo Kim, AT&TSlide 4 FYI: Some Interesting Behaviors If WLAN auto config profiles exist, always prefer visible SSID over invisible SSID regardless of profile order: Does not seem by design Response to Beacon WEP bit is inconsistently handled depending on card models Same for Broadcast encryption/decryption and handling of unencrypted broadcast under 1x –Hopefully will get fixed with the implementation of WPA and 11i Rumors of SSID hopping when many SSID visible –Personally encountered, but never verified in lab –Maybe fixed with SP1 or other patches

doc.: IEEE /172r0 Submission March 2003 Byoung-Jo Kim, AT&TSlide 5 Additions for RRM Host to NIC interaction: Beyond our scope, but something to keep in mind Objects that set and retrieve TGk actions and results –Not all actions make sense to host –Hopefully, MS will to pick a subset of what we decide as standards Extend the statistics Object and Fix definitions –Hopefully, it will share our definitions and parameters Can be used for SNMP if an agent is present

doc.: IEEE /172r0 Submission March 2003 Byoung-Jo Kim, AT&TSlide 6 Linux Wireless Tools Linux/Tools.htmlhttp:// Linux/Tools.html Adds WLAN specific APIs for drivers and some tools –Available in most Linux distributions now –Open source, voluntary effort still progressing Drivers implementing the API available for several major chipsets and NIC models Relaxed approach like many open source projects

doc.: IEEE /172r0 Submission March 2003 Byoung-Jo Kim, AT&TSlide 7 Some interesting Parmeters #define SIOCSIWSENS 0x8B08 /* set sensitivity (dBm) */ #define SIOCSIWTXPOW 0x8B26 /* set transmit power (dBm) */ #define IWEVQUAL 0x8C01 /* Quality part of statistics (scan) */ #define IWEVREGISTERED 0x8C03 /* Discovered a new node (AP mode) */ #define IWEVEXPIRED 0x8C04 /* Expired a node (AP mode) */ #define IW_SCAN_ALL_ESSID 0x0001 /* Scan all ESSIDs */ #define IW_SCAN_ALL_FREQ 0x0004 /* Scan all Frequencies */ #define IW_SCAN_ALL_MODE 0x0010 /* Scan all Modes */ #define IW_SCAN_ALL_RATE 0x0040 /* Scan all Bit-Rates */ struct iw_quality qual; /* Quality of the link * (instant/mean/max) */ struct iw_discarded discard; /* Packet discarded counts */ struct iw_missed miss; /* Packet missed counts */

doc.: IEEE /172r0 Submission March 2003 Byoung-Jo Kim, AT&TSlide 8 Continued struct iw_range { /* Informative stuff (to choose between different interface) */ __u32 throughput; /* To give an idea... */ /* In theory this value should be the maximum benchmarked * TCP/IP throughput, because with most of these devices the * bit rate is meaningless (overhead an co) to estimate how * fast the connection will go and pick the fastest one. * I suggest people to play with Netperf or any benchmark... */ struct iw_quality max_qual; /* Quality of the link */

doc.: IEEE /172r0 Submission March 2003 Byoung-Jo Kim, AT&TSlide 9 Continued /* Average quality of link & SNR */ struct iw_quality avg_qual; /* Quality of the link */ /* This should contain the average/typical values of the quality * indicator. This should be the threshold between a "good" and * a "bad" link (example : monitor going from green to orange). * Currently, user space apps like quality monitors don't have any * way to calibrate the measurement. With this, they can split * the range between 0 and max_qual in different quality level * (using a geometric subdivision centered on the average). * I expect that people doing the user space apps will feedback * us on which value we need to put in each driver... */

doc.: IEEE /172r0 Submission March 2003 Byoung-Jo Kim, AT&TSlide 10 Recommendations Though beyond our scope, we can interact informally for feedback and feedforward Jointly develop optional recommendation for accessing TGk features within host