RF Management in SonicOS 4.0 Enhanced

Size: px
Start display at page:

Download "RF Management in SonicOS 4.0 Enhanced"

Transcription

1 RF Management in SonicOS 4.0 Enhanced Document Scope This document describes how to plan, design, implement, and maintain the RF Management feature in SonicWALL SonicOS 4.0 Enhanced. This document contains the following sections: RF Management Overview section on page 2 Why RF Management? section on page 2 Benefits section on page 2 Deployment Prerequisites section on page 3 Enabling RF Management on SonicPoint(s) section on page 3 Using The RF Management Interface section on page 4 Selecting RF Signature Types section on page 5 Viewing Discovered RF Threat Stations section on page 5 Adding a Threat Station to the Watch List section on page 6 Types of RF Threat Detection section on page 7 Practical RF Management Field Applications section on page 8 Before Reading this Section section on page 8 Using Sensor ID to Determine RF Threat Location section on page 9 Using RSSI to Determine RF Threat Proximity section on page 10 SonicWALL SonicOS 4.0 Enhanced RF Management 1

2 RF Management Overview RF Management Overview The following section provides a brief overview of the RF Management feature found on SonicWALL security appliances running SonicOS 4.0 or higher. This section contains the following subsections: Why RF Management? section on page 2 Benefits section on page 2 Deployment Prerequisites section on page 3 Why RF Management? Radio Frequency (RF) technology used in today s based wireless networking devices poses an attractive target for intruders. If left un-managed, RF devices can leave your wireless (and wired) network open to a variety of outside threats, from Denial of Service (DoS) to network security breaches. In order to help secure your SonicPoint Wireless Access Point (AP) stations, SonicWALL takes a closer look at these threats. By using direct RF management, SonicWALL helps detect threats without interrupting the current operation of your wireless or wired network. Benefits SonicWALL RF Management provides real-time threat monitoring and management of SonicPoint radio frequency traffic. In addition to its real-time threat management capabilities, SonicWALL RF Management provides network administrators a system for centralized collection of RF threats and traffic statistics; offering a way to easily manage RF capabilities directly from the SonicWALL security appliance gateway SonicWALL RF Management is: Real-Time - View logged information as it happens Transparent - No need to halt legitimate network traffic when managing threats Comprehensive - Provides detection of many types of RF threats, including: Long Duration Attacks Management Frame Flood Null Probe Response Broadcasting Deauthentication Valid Station with Invalid (B)SSID Wellenreiter/NetStumbler Detection Ad-Hoc Station Detection Unassociated Station EAPOL Packet Flood Weak WEP IV For complete descriptions of the above types of RF Threat Detection, turn to the Types of RF Threat Detection section on page 7. 2 SonicWALL SonicOS 4.0 Enhanced RF Management

3 Enabling RF Management on SonicPoint(s) Deployment Prerequisites The following prerequisites must be met in order to deploy SonicWALL RF Management on your network: A SonicWALL PRO 2040, 3060, 4060, 4100 or 5060 appliance SonicOS 4.0 or above installed on one of the above SonicWALL PRO series appliances One or more SonicWALL SonicPoint(s), provisioned by your SonicWALL PRO series appliance Enabling RF Management on SonicPoint(s) In order for RF Management to be enforced, you must enable the RF Management option on all available SonicPoint devices. The following section provides instructions to re-provision all available SonicPoints with RF Management enabled. Step 1 Step 2 Navigate to SonicPoint > SonicPoints in the SonicWALL security appliance management interface. Click the Configure button corresponding to the desired SonicPoint Provisioning Profile. Step 3 In the General tab, click the Enable RF Management checkbox. Next, to ensure all SonicPoints are updated with the RF Management feature enabled, it is necessary to delete all current SonicPoints from the SonicPoint table and re-synchronize these SonicPoints using the profile you just created. Step 4 Click the button at the bottom right corner of the SonicPoints table. Step 5 Click the button at the top of the page. Your SonicPoints will now reboot with the RF Management feature enabled. Be patient as the rebot process may take several minutes. SonicWALL SonicOS 4.0 Enhanced RF Management 3

4 Using The RF Management Interface Using The RF Management Interface The RF Management interface (SonicPoint > RF Management) provides a central location for selecting RF signature types, viewing discovered RF threat stations, and adding discovered threat stations to a watch list. This section provides an overview of usage and features for the following RF Management operations: RF Management Interface Overview section on page 4 Selecting RF Signature Types section on page 5 Viewing Discovered RF Threat Stations section on page 5 Adding a Threat Station to the Watch List section on page 6 RF Management Interface Overview The top portion of the RF Management interface allows you to: View the number of threats logged for each group/signature Select which RF signature types your SonicWALL looks for The bottom (Discovered RF Threat Stations) portion of the interface allows you to: View a detailed log of the most current threats Configure a watch list for discovered stations 4 SonicWALL SonicOS 4.0 Enhanced RF Management

5 Using The RF Management Interface Selecting RF Signature Types The RF Management interface allows you to select which types of RF threats your SonicWALL monitors and logs. Step 1 Step 2 Navigate to SonicPoint > RF Management in the SonicWALL security appliance management interface. RF threat types are displayed, with a checkbox next to each. Click the checkbox next to the RF threat to enable/disable management of that threat. By default, all RF threats are checked as managed. Tip For a complete list of RF Threat types and their descriptions, see the Types of RF Threat Detection section on page 7 of this document. Viewing Discovered RF Threat Stations The RF Management Discovered Threat Stations list allows you to view, sort and manage a list of the most recent threats to your wireless network. Each logged threat contains (and can be sorted by) the following information: Log Data MAC Address Type Vendor Rssi Rate Encrypt RF Threat Update Time Sensor Description Physical address of the RF threat station. Type of wireless signal received from the threat station. Manufacturer of the threat station (determined by MAC address). Received signal strength as reported by the SonicPoint. This entry, along with the sensor entry, can be helpful in triangulating the actual physical position of the RF threat device. Transfer rate (Mbps) of the threat station. Wireless signal encryption on the threat station, None or Encrypted. RF Threat type. For a complete list with descriptions, see the Types of RF Threat Detection section on page 7. Time this log record was created/updated. ID of the SonicPoint which recorded this threat. This entry, along with the Rssi entry, can be helpful in triangulating the actual physical position of the RF threat device. Tip Did you know? It is possible to find approximate locations of RF Threat devices by using logged threat statistics. For more practical tips and information on using the RF Management threat statistics, see the Practical RF Management Field Applications section on page 8 SonicWALL SonicOS 4.0 Enhanced RF Management 5

6 Using The RF Management Interface Adding a Threat Station to the Watch List The RF Management Discovered Threat Stations Watch List feature allows you to create a watch list of threats to your wireless network. The watch list is used to filter results in the Discovered RF Threat Stations list. To add a station to the watch list: Step 1 In the SonicPoint > RF Management page, navigate to the Discovered RF threat stations section. Step 2 Click the icon that corresponds to the threat station you wish to add to the watch list. Step 3 Step 4 A confirmation screen will appear. Click OK to add the station to the watch list. If you have accidentally added a station to the watch list, or would otherwise like a station removed from the list, click the icon that corresponds to the threat station you wish to remove. Tip Once you have added one or more stations to the watch list, you can filter results to see only these stations in the real-time log by choosing Only Stations in Watch List Group from the View Type drop-down list. 6 SonicWALL SonicOS 4.0 Enhanced RF Management

7 Types of RF Threat Detection Types of RF Threat Detection The following is a partial list containing descriptions for the most prominent types of RF signatures detected by SonicWALL RF Management: Long Duration Attacks Wireless devices share airwaves by dividing the RF spectrum into 14 staggered channels. Each device reserves a channel for a specified (short) duration and during the time that any one device has a channel reserved, other devices know not to broadcast on this channel. Long Duration attacks exploit this process by reserving many RF channels for very long durations, effectively stopping legitimate wireless traffic from finding an open broadcast channel. Management Frame Flood This variation on the DoS attack attempts to flood wireless access points with management frames (such as association or authentication requests) filling the management table with bogus requests. Null Probe Response When a wireless client sends out a probe request, the attacker sends back a response with a Null SSID. This response causes many popular wireless cards and devices to stop responding. Broadcasting Deauthentication This DoS variation sends a flood of spoofed deauthentication frames to wireless clients, forcing them to constantly de-authenticate and subsequently re-authenticate with an access point. Valid Station with Invalid (B)SSID In this attack, a rouge access point attempts to broadcast a trusted station ID (ESSID). Although the BSSID is often invalid, the station can still appear to clients as though it is a trusted access point. The goal of this attack is often to gain authentication information from a trusted client. Wellenreiter/NetStumbler Detection Wellenreiter and NetStumbler are two popular software applications used by attackers to retrieve information from surrounding wireless networks. Ad-Hoc Station Detection Ad-Hoc stations are nodes which provide access to wireless clients by acting as a bridge between the actual access point and the user. Wireless users are often tricked into connecting to an Ad-Hoc station instead of the actual access point, as they may have the same SSID. This allows the Ad-Hoc station to intercept any wireless traffic that connected clients send to or receive from the access point. Unassociated Station Because a wireless station attempts to authenticate prior to associating with an access point, the unassociated station can create a DoS by sending a flood of authentication requests to the access point while still unassociated. EAPOL Packet Flood Extensible Authentication Protocol over LAN (EAPOL) packets are used in WPA and WPA2 authentication mechanisms. Since these packets, like other authentication request packets, are received openly by wireless access points, a flood of these packets can result in DoS to your wireless network. Weak WEP IV WEP security mechanism uses your WEP key along with a randomly chosen 24-bit number known as an Initilization Vector (IV) to encrypt data. Network attackers often target this type of encryption because some of the random IV numbers are weaker than others, making it easier to decrypt your WEP key. SonicWALL SonicOS 4.0 Enhanced RF Management 7

8 Practical RF Management Field Applications Practical RF Management Field Applications This section provides an overview of practical uses for collected RF Management data in detecting Wi-Fi threat sources. Practical RF Management Field Applications are provided as general common-sense suggestions for using RF Management data. This section contains the following sub-sections: Before Reading this Section section on page 8 Using Sensor ID to Determine RF Threat Location section on page 9 Using RSSI to Determine RF Threat Proximity section on page 10 Before Reading this Section When using RF data to locate threats, keep in mind that wireless signals are affected by many factors. Before continuing, take note of the following: Signal strength is not always a good indicator of distance - Obstructions such as walls, wireless interference, device power output, and even ambient humidity and temperature can affect the signal strength of a wireless device. A MAC Address is not always permanent - While a MAC address is generally a good indicator of device type and manufacturer, this address is succeptable to change and can be spoofed. Likewise, originators of RF threats may have more than one hardware device at their disposal. 8 SonicWALL SonicOS 4.0 Enhanced RF Management

9 SonicPoint Using Sensor ID to Determine RF Threat Location Practical RF Management Field Applications In the Discovered RF Threat Stations list, the Sensor field indicates which Sonic Point is detecting the particular threat. Using the sensor ID and MAC address of the SonicPoint allows you to easily determine the location of the SonicPoint that is detecting the threat. Timesaver For this section in particular (and as a good habit in general), you may find it helpful to keep a record of the locations and MAC addresses of your SonicPoint devices. Step 1 Step 2 Navigate to SonicPoint>RF Management in the SoncWALL Management Interface. In the Discovered RF Threat Stations table, locate the Sensor for the SonicPoint that is detecting the targeted RF threat and record the number. Step 3 Navigate to SonicPoint>SonicPoints. Step 4 In the SonicPoints table, locate the SoincPoint that matches the Sensor number you recorded in Step 2. Step 5 Record the MAC address for this SoincPoint and use it to find the physical location of the SonicPoint. The RF threat is likely to be in the location that is served by this SonicPoint. PRO 3060 Sensor - Identifies which individual SonicPoint(s) are detecting the RF threat. SonicWALL SonicOS 4.0 Enhanced RF Management 9

10 SonicPoint PRO 3060 Practical RF Management Field Applications Using RSSI to Determine RF Threat Proximity This section builds on what was learned in the Using Sensor ID to Determine RF Threat Location section on page 9. In the Discovered RF Threat Stations list, the Rssi field indicates the signal strength at which a particular Sonic Point is detecting an RF threat. The Rssi field allows you to easily determine the proximity of an RF threat to the SonicPoint that is detecting that threat. A higher Rssi number generally means the threat is closer to the SonicPoint. Tip It is important to remember that walls serve as barriers for wireless signals. While a very weak Rssi signal may mean the RF threat is located very far from the SoincPoint, it may also indicate a threat located near, but outside the room or building. Step 1 Step 2 Navigate to SonicPoint>RF Management in the SoncWALL Management Interface. In the Discovered RF Threat Stations table, locate the Sensor and Rssi for the SonicPoint that is detecting the targeted RF threat and record these numbers. Step 3 Navigate to SonicPoint>SonicPoints. Step 4 In the SonicPoints table, locate the SoincPoint that matches the Sensor number you recorded in Step 2. Step 5 Record the MAC address for this SoincPoint and use it to find the physical location of the SonicPoint. A high Rssi usually indicates an RF threat that is closer to the SonicPoint. A low Rssi can indicate obstructions or a more distant RF threat. SonicWALL PRO 5060 with RF Management enabled rssi - Identifies signal strength of the RF threat, allowing for approximate distance gauging. Strong signal rssi: 33 Weak signal rssi: SonicWALL SonicOS 4.0 Enhanced RF Management

11 Practical RF Management Field Applications Solution Document Version History Version Number Date Notes 1 3/27/07 This document was created by Patrick Lydon. SonicWALL SonicOS 4.0 Enhanced RF Management 11

12 Practical RF Management Field Applications 12 SonicWALL SonicOS 4.0 Enhanced RF Management

UCP-Config Program Version: 3.28 HG A

UCP-Config Program Version: 3.28 HG A Program Description HG 76342-A UCP-Config Program Version: 3.28 HG 76342-A English, Revision 01 Dev. by: C.M. Date: 28.01.2014 Author(s): RAD Götting KG, Celler Str. 5, D-31275 Lehrte - Röddensen (Germany),

More information

Location Planning and Verification

Location Planning and Verification 7 CHAPTER This chapter describes addresses a number of tools and configurations that can be used to enhance location accuracy of elements (clients, tags, rogue clients, and rogue access points) within

More information

Context-Aware Planning and Verification

Context-Aware Planning and Verification 7 CHAPTER This chapter describes a number of tools and configurations that can be used to enhance the location accuracy of elements (clients, tags, rogue clients, and rogue access points) within an indoor

More information

Chanalyzer 4. Chanalyzer 4 by MetaGeek USER GUIDE page 1

Chanalyzer 4. Chanalyzer 4 by MetaGeek USER GUIDE page 1 Chanalyzer 4 Chanalyzer 4 by MetaGeek USER GUIDE page 1 Chanalyzer 4 spectrum analysis software Table of Contents Introduction What is a Wi-Spy? What is Chanalyzer? Installation Choose a Wireless Network

More information

Chanalyzer by MetaGeek USER GUIDE page 1

Chanalyzer by MetaGeek USER GUIDE page 1 Chanalyzer 5 Chanalyzer by MetaGeek USER GUIDE page 1 Chanalyzer 5 spectrum analysis software Table of Contents Introduction What is Wi-Spy? What is Chanalyzer? Installation Choose a Wireless Network Interface

More information

DVDO Air3C-PRO TM Quick-Reference Guide. Version 1.0

DVDO Air3C-PRO TM Quick-Reference Guide. Version 1.0 DVDO Air3C-PRO TM Quick-Reference Guide Version 1.0 The DVDO Air3C-PRO configuration tool is designed to allow full access to the RF link and provide information to help make the installation solid. The

More information

Date: 01/01/17 10:26:10AM

Date: 01/01/17 10:26:10AM Sample Report Date: 01/01/17 10:26:10AM Example: How to Read the Overview Pane The Overview Pane shows you what is currently happening in the spectrum around you. With Color by Utilization enabled, the

More information

Spectralink VIEW Certified Configuration Guide. Extreme Networks. ExtremeWireless C25, C35, V2110, C5210 with AP 3935

Spectralink VIEW Certified Configuration Guide. Extreme Networks. ExtremeWireless C25, C35, V2110, C5210 with AP 3935 Spectralink VIEW Certified Configuration Guide Extreme Networks ExtremeWireless C25, C35, V2110, C5210 with AP 3935 721-1012-000 Rev: D June 2017 Copyright Notice 2005-2017 Spectralink Corporation All

More information

TT-208. User s Manual. 300Mps 5.8 GHz. IP Camera Wireless Transmission Kit

TT-208. User s Manual. 300Mps 5.8 GHz. IP Camera Wireless Transmission Kit TT-208 300Mps 5.8 GHz IP Camera Wireless Transmission Kit User s Manual V1.0 02 / 2014 Welcome Thank you for purchasing the TT-208 Wireless Transmission Kit for IP Cameras. This user s manual is designed

More information

AW2400iTR USER S MANUAL 2.4 GHz Indoor Wireless Ethernet Radio

AW2400iTR USER S MANUAL 2.4 GHz Indoor Wireless Ethernet Radio USER S MANUAL 2.4 GHz Indoor Wireless Ethernet Radio Industrial-grade, long-range wireless Ethernet systems AvaLAN W I R E L E S S Thank you for your purchase of the AW2400iTR Indoor Wireless Ethernet

More information

Basic Radio Settings on the WAP371

Basic Radio Settings on the WAP371 Article ID: 5084 Basic Radio Settings on the WAP371 Objective The radio is the physical component of the WAP that creates a wireless network. The radio settings on the WAP control the behavior of the radio

More information

Chanalyzer by MetaGeek USER GUIDE page 1

Chanalyzer by MetaGeek USER GUIDE page 1 Chanalyzer 5 Chanalyzer by MetaGeek USER GUIDE page 1 Chanalyzer 5 spectrum analysis software Table of Contents Installation Connect to a Cisco Access Point (Requires Cisco CleanAir Accessory) Wi-Spy Mode:

More information

CSRmesh Beacon management and Asset Tracking Muhammad Ulislam Field Applications Engineer, Staff, Qualcomm Atheros, Inc.

CSRmesh Beacon management and Asset Tracking Muhammad Ulislam Field Applications Engineer, Staff, Qualcomm Atheros, Inc. CSRmesh Beacon management and Asset Tracking Muhammad Ulislam Field Applications Engineer, Staff, Qualcomm Atheros, Inc. CSRmesh Recap Bluetooth Mesh Introduction What is CSRmesh? A protocol that runs

More information

EOS 80D (W) Wireless Function Instruction Manual ENGLISH INSTRUCTION MANUAL

EOS 80D (W) Wireless Function Instruction Manual ENGLISH INSTRUCTION MANUAL EOS 80D (W) Wireless Function Instruction Manual ENGLISH INSTRUCTION MANUAL Introduction What You Can Do Using the Wireless Functions This camera s wireless functions let you perform a range of tasks wirelessly,

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #5 Jamming, Physical Layer Security 2015 Patrick Tague 1 Class #5 Jamming attacks and defenses Secrecy using physical layer properties Authentication

More information

High Density Experience (HDX) Deployment Guide

High Density Experience (HDX) Deployment Guide Last Modified: May 07, 2015 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 2015

More information

AW900xTR USER S MANUAL 900 MHz Outdoor Wireless Ethernet Radio

AW900xTR USER S MANUAL 900 MHz Outdoor Wireless Ethernet Radio USER S MANUAL 900 MHz Outdoor Wireless Ethernet Radio Industrial-grade, long-range wireless Ethernet systems Thank you for your purchase of the AW900xTR Outdoor Wireless Ethernet Radio. The AW900xTR includes:

More information

COALESCE V2 CENTRAL COALESCE CENTRAL USER GUIDE WC-COA 24/7 TECHNICAL SUPPORT AT OR VISIT BLACKBOX.COM. Display Name.

COALESCE V2 CENTRAL COALESCE CENTRAL USER GUIDE WC-COA 24/7 TECHNICAL SUPPORT AT OR VISIT BLACKBOX.COM. Display Name. COALESCE CENTRAL USER GUIDE WC-COA COALESCE V2 CENTRAL 24/7 AT OR VISIT BLACKBOX.COM BY Import Displays Discover CSV File Manual Your Coalesce Instances Appearance and Usage Display Name Network Security

More information

AcuMesh Wireless RS485 Network. User's Manual SOLUTION

AcuMesh Wireless RS485 Network. User's Manual SOLUTION AcuMesh Wireless RS485 Network User's Manual AN SOLUTION ACUMESH - WIRELESS METERING SYSTEM COPYRIGHT 2015 V1.2 This manual may not be altered or reproduced in whole or in part by any means without the

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #5 Jamming (cont'd); Physical Layer Security 2016 Patrick Tague 1 Class #5 Anti-jamming Physical layer security Secrecy using physical layer properties

More information

How to Configure ibeacons in Jamf Pro

How to Configure ibeacons in Jamf Pro What is an ibeacon? ibeacon is a communication protocol developed by Apple on top of Bluetooth Smart technology. It allows developers to create mobile apps aware of location context provided by beacons.

More information

In the continuously changing

In the continuously changing PAGE 48 NOVEMBER 2003 FEATURE ARTICLE 802.11a Measurement Techniques and Network Issues by Herb Petrat, Senior Software Engineer, Berkeley Varitronics Systems, Inc. MICROWAVE PRODUCT DIGEST In the continuously

More information

CWNA-106 (Certified Wireless Network Administrator)

CWNA-106 (Certified Wireless Network Administrator) CWNA-106 (Certified Wireless Network Administrator) Chapter-1 Introduction to Wireless LANs 1.1 History of WLANs 1.2 Today s WLAN Standards 1.3 Applications of WLAN Chapter-2 Radio Frequency (RF) Fundamentals

More information

USER S MANUAL ADDENDUM Matched Pair Bridges

USER S MANUAL ADDENDUM Matched Pair Bridges USER S MANUAL ADDENDUM Matched Pair Bridges Certain AvaLAN radios are sold as matched pairs, pre-configured as a wireless Ethernet bridge. The manual supplied with the pair does not include information

More information

Endurance R/C Wi-Fi Servo Controller 2 Instructions

Endurance R/C Wi-Fi Servo Controller 2 Instructions Endurance R/C Wi-Fi Servo Controller 2 Instructions The Endurance R/C Wi-Fi Servo Controller 2 allows you to control up to eight hobby servos, R/C relays, light controllers and more, across the internet

More information

Kodiak Corporate Administration Tool

Kodiak Corporate Administration Tool AT&T Business Mobility Kodiak Corporate Administration Tool User Guide Release 8.3 Table of Contents Introduction and Key Features 2 Getting Started 2 Navigate the Corporate Administration Tool 2 Manage

More information

Wireless LAN Planning Report. Indoor Demo 1

Wireless LAN Planning Report. Indoor Demo 1 Wireless LAN Planning Report An AirTight Service For Indoor Demo 1 The Global Leader in Wireless Security Solutions AirTight Networks 339 N. Bernardo Avenue #200 Mountain View, CA 94043 www.airtightnetworks.com

More information

9/2/2013 Excellent ID. Operational Manual eskan SADL handheld scanner

9/2/2013 Excellent ID. Operational Manual eskan SADL handheld scanner 9/2/2013 Excellent ID Operational Manual eskan SADL handheld scanner Thank You! We are grateful you chose Excellent ID for your SADL scanner needs. We believe this easy-to-use scanner will provide dependable

More information

907,10 PLN brutto 737,40 PLN netto

907,10 PLN brutto 737,40 PLN netto UBIQUITI RP-5AC-GEN2 ROCKET 5AC, 2X2 MIMO, 28DBM 907,10 PLN brutto 737,40 PLN netto Producent: UBIQUITI Overview Ubiquiti Networks has designed airmax ac radios with high performance and ease of installation

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like

More information

Media Independent MAC Enhancements for RF Management of Wireless 802 Networks

Media Independent MAC Enhancements for RF Management of Wireless 802 Networks Media Independent MAC Enhancements for RF Management of Wireless 802 Networks An Introduction Slide 1 Overview Into to 802 Wireless Networks What is RF Management Why a standard is needed Why a common

More information

ExtremeWireless 3935 i/e Indoor Access Point

ExtremeWireless 3935 i/e Indoor Access Point Data Sheet Benefits Business Alignment Support for demanding voice/video/ data applications to enhance mobile worker productivity and convenience Role-based grouping of users, devices, and applications

More information

User Manual. Internet Radio Adaptor with DAB and Bluetooth DBA-03R. (Additional powered speaker / active speaker is required to use this product)

User Manual. Internet Radio Adaptor with DAB and Bluetooth DBA-03R. (Additional powered speaker / active speaker is required to use this product) User Manual Internet Radio Adaptor with DAB and Bluetooth DBA-03R (Additional powered speaker / active speaker is required to use this product) Please read this user manual carefully before using receiver

More information

Why (Special Agent) Johnny (Still) Can t Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System

Why (Special Agent) Johnny (Still) Can t Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System Why (Special Agent) Johnny (Still) Can t Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System Sandy Clark Travis Goodspeed Perry Metzger Zachary Wasserman Kevin Xu Matt Blaze Usenix

More information

Connecting the Radio:

Connecting the Radio: Connecting the Radio: Step 1: Connect the Cat5 cable from the radio into the RJ-45 jack marked CPE on the POE injector. The POE injector is not weather proof and should be installed indoors. Step 2: Connect

More information

Pervasive Systems SD & Infrastructure.unit=3 WS2008

Pervasive Systems SD & Infrastructure.unit=3 WS2008 Pervasive Systems SD & Infrastructure.unit=3 WS2008 Position Tracking Institut for Pervasive Computing Johannes Kepler University Simon Vogl Simon.vogl@researchstudios.at Infrastructure-based WLAN Tracking

More information

Cisco CleanAir Accessory for Chanalyzer

Cisco CleanAir Accessory for Chanalyzer Cisco CleanAir Accessory for Chanalyzer System Requirements SOFTWARE: Chanalyzer 5 OPERATING SYSTEM: Microsoft Windows 8, 7, Vista * * support for XP (SP3) to be announced Mac OS X VIRTUALIZATION: VMware

More information

Wireless Internet Routing. IEEE s

Wireless Internet Routing. IEEE s Wireless Internet Routing IEEE 802.11s 1 Acknowledgments Cigdem Sengul, Deutsche Telekom Laboratories 2 Outline Introduction Interworking Topology discovery Routing 3 IEEE 802.11a/b/g /n /s IEEE 802.11s:

More information

AirMax DUO Lite a/b/g Dual Radio Base Station. Hi-Power Dual Band. Dual. Mode. WISP Network. 5GHz IP-65. Radio2

AirMax DUO Lite a/b/g Dual Radio Base Station. Hi-Power Dual Band. Dual. Mode. WISP Network. 5GHz IP-65. Radio2 802.11a/b/g Dual Radio Base Station 802.11a/b/g Dual Radio Base Station 1 x 11a Radio + 1 x 11a/b/g Radio 2 x N-TYPE Connectors 5GHz + 2.4GHz IP-65 ABS Housing 802.3af PoE for Easy Installation 14 Wireless

More information

Sandboxing Wireless/RF Vulnerability Research of Connected Systems

Sandboxing Wireless/RF Vulnerability Research of Connected Systems 1 Sandboxing Wireless/RF Vulnerability Research of Connected Systems Michael Calabro 5 October 2016 33rd Annual International Test and Evaluation Symposium Outline What is Wireless Motivating Wireless

More information

RingMaster Software. Planning Guide. Release June 2011 (Release Date) Part Number: , Revision D

RingMaster Software. Planning Guide. Release June 2011 (Release Date) Part Number: , Revision D RingMaster Software Planning Guide Release 7.5 30 June 2011 (Release Date) Part Number: 730-9502-0230, Revision D Juniper Network, Inc. 1194 N. Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net

More information

Layerone / 2006 RFID Technology, Security & Privacy. Luiz Eduardo Dos Santos, CISSP luiz AT arubanetworks.com

Layerone / 2006 RFID Technology, Security & Privacy. Luiz Eduardo Dos Santos, CISSP luiz AT arubanetworks.com Layerone / 2006 RFID Technology, Security & Privacy Luiz Eduardo Dos Santos, CISSP luiz AT arubanetworks.com What are we talking about today? RFID history Technologies WiFi tags Privacy/ Security Who am

More information

MICHIGAN DEPARTMENT OF TRANSPORTATION SPECIAL PROVISION FOR TRAFFIC SIGNAL WIRELESS COMMUNICATIONS LINK

MICHIGAN DEPARTMENT OF TRANSPORTATION SPECIAL PROVISION FOR TRAFFIC SIGNAL WIRELESS COMMUNICATIONS LINK MICHIGAN DEPARTMENT OF TRANSPORTATION SPECIAL PROVISION FOR TRAFFIC SIGNAL WIRELESS COMMUNICATIONS LINK SIG:CJS 1 of 6 APPR:EMS:DBP:06-29-17 FHWA:APPR:08-14-17 a. Description. This work consists of completing

More information

Chanalyzer Pro. Chanalyzer Pro by MetaGeek USER GUIDE page 1

Chanalyzer Pro. Chanalyzer Pro by MetaGeek USER GUIDE page 1 Chanalyzer Pro Chanalyzer Pro by MetaGeek USER GUIDE page 1 Chanalyzer Pro spectrum analysis software Table of Contents Introduction What is a Wi-Spy? What is Chanalyzer? Installation Choose a Wireless

More information

3710i/e Indoor Access Point High Performance, Enterprise-Grade for High-Density Deployments

3710i/e Indoor Access Point High Performance, Enterprise-Grade for High-Density Deployments DATASHEET 3710i/e Indoor Access Point High Performance, Enterprise-Grade for High-Density Deployments Product Overview The AP3710 is a high-performance 802.11abgn indoor access point purposed built for

More information

TACOT Project. Trusted multi Application receiver for Trucks. Bordeaux, 4 June 2014

TACOT Project. Trusted multi Application receiver for Trucks. Bordeaux, 4 June 2014 TACOT Project Trusted multi Application receiver for Trucks Bordeaux, 4 June 2014 Agenda TACOT Context & Solution Technical developments Test & Validation results Conclusions GNSS ease our lives GNSS is

More information

RSSI LED IP-67. Virtual. HTTPS WISP Bridge

RSSI LED IP-67. Virtual. HTTPS WISP Bridge AirMax DUO 802.11a/b/g Dual Radio Base Station T he AirMax DUO is the latest generation of AirLive Outdoor Base Station that incorporates everything we know about wirelessa feat from the company that starts

More information

Locali ation z For For Wireless S ensor Sensor Networks Univ of Alabama F, all Fall

Locali ation z For For Wireless S ensor Sensor Networks Univ of Alabama F, all Fall Localization ation For Wireless Sensor Networks Univ of Alabama, Fall 2011 1 Introduction - Wireless Sensor Network Power Management WSN Challenges Positioning of Sensors and Events (Localization) Coverage

More information

An IoT Based Real-Time Environmental Monitoring System Using Arduino and Cloud Service

An IoT Based Real-Time Environmental Monitoring System Using Arduino and Cloud Service Engineering, Technology & Applied Science Research Vol. 8, No. 4, 2018, 3238-3242 3238 An IoT Based Real-Time Environmental Monitoring System Using Arduino and Cloud Service Saima Zafar Emerging Sciences,

More information

SCOUT Mobile User Guide 3.0

SCOUT Mobile User Guide 3.0 SCOUT Mobile User Guide 3.0 Android Guide 3864 - SCOUT February 2017 SCOUT Mobile Table of Contents Supported Devices...1 Multiple Manufacturers...1 The Three Tabs of SCOUT TM Mobile 3.0...1 SCOUT...1

More information

The Speaker. 20 years in Networking. First Half doing Integration Second Half on Products. 5 years building Wi-Fi

The Speaker. 20 years in Networking. First Half doing Integration Second Half on Products. 5 years building Wi-Fi The Speaker 20 years in Networking First Half doing Integration Second Half on Products 5 years building Wi-Fi The Audience WISPs Systems Integrators You want to build a Muni network, or you have an RFP

More information

2.4GHz/5GHz 300Mbps Outdoor CPE

2.4GHz/5GHz 300Mbps Outdoor CPE .4GHz/ 3Mbps Pharos CPE Series Datasheet Highlights -Wireless N speed up to 3Mbps -Selectable bandwidth of 5///4MHz -Adjustable transmission power by dbm -Broad operating frequency channels ensure less

More information

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Security in Sensor Networks Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Mobile Ad-hoc Networks (MANET) Mobile Random and perhaps constantly changing

More information

Cambium PMP 450 Series PMP 430 / PTP 230 Series PMP/PTP 100 Series Release Notes

Cambium PMP 450 Series PMP 430 / PTP 230 Series PMP/PTP 100 Series Release Notes POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium PMP 450 Series PMP 430 / PTP 230 Series PMP/PTP 100 Series Release Notes System Release 13.1.3 1 INTRODUCTION This document provides information for the

More information

RLX-IH b. User Guide. Industrial Hotspot

RLX-IH b. User Guide. Industrial Hotspot RLX-IH 802.11b User Guide Please Read This Notice Successful application of this module requires a reasonable working knowledge of the RLX-IH Module and the application in which it is to be used. For this

More information

IEEE ax / OFDMA

IEEE ax / OFDMA #WLPC 2018 PRAGUE CZECH REPUBLIC IEEE 802.11ax / OFDMA WFA CERTIFIED Wi-Fi 6 PERRY CORRELL DIR. PRODUCT MANAGEMENT 1 2018 Aerohive Networks. All Rights Reserved. IEEE 802.11ax Timeline IEEE 802.11ax Passed

More information

Kaltura CaptureSpace Lite Desktop Recorder: Editing, Saving, and Uploading a Recording

Kaltura CaptureSpace Lite Desktop Recorder: Editing, Saving, and Uploading a Recording Kaltura CaptureSpace Lite Desktop Recorder: Editing, Saving, and Uploading a Recording For this handout, we will be editing the Screen Recording we created in the Kaltura CaptureSpace Lite Desktop Recorder

More information

Quick Start Guide Hardware

Quick Start Guide Hardware Quick Start Guide Hardware The BroadWeigh shackle can be used almost exactly as a normal shackle with a few additional considerations. It is worth noting that the strain gauge is located within the shackle

More information

IEEE C802.16h-06/090

IEEE C802.16h-06/090 Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group REP_RSP and REP_REQ MAC message modifications for Co-Channel Interference Detection and Resolution

More information

MICHIGAN DEPARTMENT OF TRANSPORTATION SPECIAL PROVISION FOR TRAFFIC SIGNAL WIRELESS COMMUNICATIONS LINK

MICHIGAN DEPARTMENT OF TRANSPORTATION SPECIAL PROVISION FOR TRAFFIC SIGNAL WIRELESS COMMUNICATIONS LINK MICHIGAN DEPARTMENT OF TRANSPORTATION SPECIAL PROVISION FOR TRAFFIC SIGNAL WIRELESS COMMUNICATIONS LINK SIG:EMS 1 of 6 APPR:LWB:DBP:07-14-15 FHWA:APPR:07-28-15 a. Description. This work consists of site

More information

RADIO FREQUENCIES, WI-FI & JARGON. Chris Dawe & Tom Bridge

RADIO FREQUENCIES, WI-FI & JARGON. Chris Dawe & Tom Bridge RADIO FREQUENCIES, WI-FI & JARGON Chris Dawe & Tom Bridge CHRIS DAWE CWNA Consulting Wireless Engineer Partner, Wheelwrights LLC, Seattle WA Fancy @ctdawe - Slack, Twitter TOM BRIDGE CWNA Consulting Wireless

More information

EC312 Security Exercise 15

EC312 Security Exercise 15 EC312 Security Exercise 15 Introduction to Wireless Signals and dbm In this wireless section of our course, we understand that there is a different way to send data from a transmitter to a receiver. The

More information

QAM Snare Navigator Quick Set-up Guide- Wi-Fi version

QAM Snare Navigator Quick Set-up Guide- Wi-Fi version QAM Snare Navigator Quick Set-up Guide- Wi-Fi version v1.0 3/19/12 This document provides an overview of what a technician needs to do to set up and configure a QAM Snare Navigator Wi-Fi version for leakage

More information

Jeffrey M. Gilbert, Ph.D. Manager of Advanced Technology Atheros Communications

Jeffrey M. Gilbert, Ph.D. Manager of Advanced Technology Atheros Communications 802.11a Wireless Networks: Principles and Performance Jeffrey M. Gilbert, Ph.D. Manager of Advanced Technology Atheros Communications May 8, 2002 IEEE Santa Clara Valley Comm Soc Atheros Communications,

More information

Rob Havelt Black Hat Europe, 2009

Rob Havelt Black Hat Europe, 2009 Rob Havelt Black Hat Europe, 2009 Greetings Black Hat Rob Havelt rhavelt@trustwave.com I m from Trustwave s SpiderLabs I manage the Pen Test Practice in the US. I like to take things apart. Also, Scotch

More information

Future radio access implementation & demonstration Scandinavian workshop on testbed-based wireless research November 27 th 2013

Future radio access implementation & demonstration Scandinavian workshop on testbed-based wireless research November 27 th 2013 Future radio access implementation & demonstration Scandinavian workshop on testbed-based wireless research November 27 th 2013 vicknesan.ayadurai@ericsson.com mikael.prytz@ericsson.com Wireless Access

More information

AW5802xTP. User s Manual. 5.8 GHz Outdoor Wireless Ethernet Panel. AvaLAN. Industrial-grade, long-range wireless Ethernet systems

AW5802xTP. User s Manual. 5.8 GHz Outdoor Wireless Ethernet Panel. AvaLAN. Industrial-grade, long-range wireless Ethernet systems 5.8 GHz Outdoor Wireless Ethernet Panel Industrial-grade, long-range wireless Ethernet systems AvaLAN W I R E L E S S Thank you for your purchase of the AW5802xTP 5.8 GHz Outdoor Wireless Ethernet Panel.

More information

IEEE C802.16h-06/042

IEEE C802.16h-06/042 Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group 2006-05-03 Co-Channel Interference MAC messages (BS_CCID_IND and BS_CCID_RSP) for Synchronized WirelessMAN-CX

More information

ORCA-50 Handheld Data Terminal UHF Demo Manual V1.0

ORCA-50 Handheld Data Terminal UHF Demo Manual V1.0 ORCA-50 UHF Demo Manual V1.0 ORCA-50 Handheld Data Terminal UHF Demo Manual V1.0 Eximia Srl. www.eximia.it - www.rfidstore.it mario.difloriano@eximia.it 1 Eximia Srl www.eximia.it - www.rfidstore.it Catelogue

More information

Laird Software Version for the MSD30AG and SSD30AG Radios

Laird Software Version for the MSD30AG and SSD30AG Radios Release Notes Laird Software Version 3.5.0.9 for the MSD30AG and SSD30AG Radios September 2015 This document provides release notes for Laird software operating on a device with the MSD30AG or the SSD30AG

More information

WEB I/O. Wireless On/Off Control USER MANUAL

WEB I/O. Wireless On/Off Control USER MANUAL Wireless On/Off Control Technical Support: Email: support@encomwireless.com Toll Free: 1 800 617 3487 Worldwide: (403) 230 1122 Fax: (403) 276 9575 Web: www.encomwireless.com Warnings and Precautions Warnings

More information

ZigBee Propagation Testing

ZigBee Propagation Testing ZigBee Propagation Testing EDF Energy Ember December 3 rd 2010 Contents 1. Introduction... 3 1.1 Purpose... 3 2. Test Plan... 4 2.1 Location... 4 2.2 Test Point Selection... 4 2.3 Equipment... 5 3 Results...

More information

best practice guide Ruckus SPoT Best Practices SOLUTION OVERVIEW AND BEST PRACTICES FOR DEPLOYMENT

best practice guide Ruckus SPoT Best Practices SOLUTION OVERVIEW AND BEST PRACTICES FOR DEPLOYMENT best practice guide Ruckus SPoT Best Practices SOLUTION OVERVIEW AND BEST PRACTICES FOR DEPLOYMENT Overview Since the mobile device industry is alive and well, every corner of the ever-opportunistic tech

More information

Lifetime Power Energy Harvesting Development Kit for Wireless Sensors User s Manual - featuring PIC MCU with extreme Low Power (XLP) Technology

Lifetime Power Energy Harvesting Development Kit for Wireless Sensors User s Manual - featuring PIC MCU with extreme Low Power (XLP) Technology P2110-EVAL-01 Lifetime Power User s Manual - featuring PIC MCU with extreme Low Power (XLP) Technology Overview The Lifetime Power is a complete demonstration and development platform for creating battery-free

More information

RSSI LED IP-67. Virtual. HTTPS WISP Bridge

RSSI LED IP-67. Virtual. HTTPS WISP Bridge AirMax DUO 802.11a/b/g Dual Radio Base Station T he AirMax DUO is the latest generation of AirLive Outdoor Base Station that incorporates everything we know about wirelessa feat from the company that starts

More information

AW5802xTR. User s Manual. 5.8 GHz Outdoor Wireless Ethernet Radio. AvaLAN. Industrial-grade, long-range wireless Ethernet systems

AW5802xTR. User s Manual. 5.8 GHz Outdoor Wireless Ethernet Radio. AvaLAN. Industrial-grade, long-range wireless Ethernet systems AW5802xTR 5.8 GHz Outdoor Wireless Ethernet Radio Industrial-grade, long-range wireless Ethernet systems AvaLAN W I R E L E S S Thank you for your purchase of the AW5802xTR 5.8 GHz Outdoor Wireless Ethernet

More information

GD&T Administrator Manual v 1.0

GD&T Administrator Manual v 1.0 The GD&T Professional Edition GD&T Administrator Manual v 1.0 800-886-0909 Effective Training Inc. www.etinews.com Introduction to the GD&T Administrator s Manual There are two Administration programs

More information

Managing Radios and Radio Descriptors

Managing Radios and Radio Descriptors CHAPTER9 The Cisco IPICS administrator is responsible for configuring the radios and radio descriptors that are used with Cisco IPICS. This chapter provides detailed information about managing these items.

More information

Program and System Information Protocol Configuration for System Releases 2.5, 2.7, 3.5, 3.7, 4.0, 4.2, and CV 3.4

Program and System Information Protocol Configuration for System Releases 2.5, 2.7, 3.5, 3.7, 4.0, 4.2, and CV 3.4 Program and System Information Protocol Configuration for System Releases 2.5, 2.7, 3.5, 3.7, 4.0, 4.2, and CV 3.4 Overview Introduction Program and System Information Protocol (PSIP) is a type of system

More information

GSM Interceptor Fast and reliable interception of GSM traffic

GSM Interceptor Fast and reliable interception of GSM traffic GSM Interceptor Fast and reliable interception of GSM traffic Maximum accuracy, sensitivity and flexibility Total indefectibility Support for all frequency bands User-friendly operation Wide range of antennas

More information

Location Discovery in Sensor Network

Location Discovery in Sensor Network Location Discovery in Sensor Network Pin Nie Telecommunications Software and Multimedia Laboratory Helsinki University of Technology niepin@cc.hut.fi Abstract One established trend in electronics is micromation.

More information

Datasheet. Shielded airmax ac Radio with Isolation Antenna. Model: IS-5AC. Interchangeable Isolation Antenna Horn. All-Metal, Shielded Radio Base

Datasheet. Shielded airmax ac Radio with Isolation Antenna. Model: IS-5AC. Interchangeable Isolation Antenna Horn. All-Metal, Shielded Radio Base Shielded airmax ac Radio with Isolation Antenna Model: IS-5AC Interchangeable Isolation Antenna Horn All-Metal, Shielded Radio Base airmax ac Processor for Superior Performance Overview Ubiquiti Networks

More information

Chanalyzer Pro Sample Report

Chanalyzer Pro Sample Report Chanalyzer Pro Sample Report Site Info: MetaGeek Secret Headquarters Prepared By: Trent Cutler Prepared For: Our Friends Date: Friday, July 6, 2 Report Introduction This report was generated by MetaGeek's

More information

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN Wireless LANs Mobility Flexibility Hard to wire areas Reduced cost of wireless systems Improved performance of wireless systems Wireless LAN Applications LAN Extension Cross building interconnection Nomadic

More information

Wireless LAN Fundamental. Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Public

Wireless LAN Fundamental. Presentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Wireless LAN Fundamental 1 IEEE 802.11 Radio Summary Properties 802.11 802.11b 802.11g 802.11a Ratified 1999 1999 2003 1999 Data Rates (Mbps) Number of Non- Overlapping Channels Frequency Range (GHz) 1,2

More information

Datasheet. Tag Piccolino for RTLS-TDoA. A tiny Tag powered by coin battery V1.1

Datasheet. Tag Piccolino for RTLS-TDoA. A tiny Tag powered by coin battery V1.1 Tag Piccolino for RTLS-TDoA A tiny Tag powered by coin battery Features Real-Time Location with UWB and TDoA Technique Movement Detection / Sensor Data Identification, unique MAC address Decawave UWB Radio,

More information

Enhanced Push-to-Talk Application for iphone

Enhanced Push-to-Talk Application for iphone AT&T Business Mobility Enhanced Push-to-Talk Application for iphone Standard Version Release 8.3 Table of Contents Introduction and Key Features 2 Application Installation & Getting Started 2 Navigating

More information

Mobile Security Fall 2015

Mobile Security Fall 2015 Mobile Security Fall 2015 Patrick Tague #8: Location Services 1 Class #8 Location services for mobile phones Cellular localization WiFi localization GPS / GNSS 2 Mobile Location Mobile location has become

More information

RAZER CENTRAL ONLINE MASTER GUIDE

RAZER CENTRAL ONLINE MASTER GUIDE RAZER CENTRAL ONLINE MASTER GUIDE CONTENTS 1. RAZER CENTRAL... 2 2. SIGNING IN... 3 3. RETRIEVING FORGOTTEN PASSWORDS... 4 4. CREATING A RAZER ID ACCOUNT... 7 5. USING RAZER CENTRAL... 11 6. SIGNING OUT...

More information

AW900F AW900F-PAIR USER S MANUAL

AW900F AW900F-PAIR USER S MANUAL AW900F AW900F-PAIR USER S MANUAL 900 MHz Industrial Wireless Ethernet Radios Industrial-grade, long-range wireless Ethernet systems AvaLAN W I R E L E S S Thank you for your purchase of the AW900F Indoor

More information

PRODUCT MODULE: GWF-5M01 VERSION: V1.0 DATE:

PRODUCT MODULE: GWF-5M01 VERSION: V1.0 DATE: IEEE 802.11 a/b/g/n/ac 5.8G/2.4GHz 433Mbps/150Mbps PRODUCT DATASHEET PRODUCT MODULE: GWF-5M01 VERSION: V1.0 DATE: 2015-08-28 SIGNITURE DATE WRITTEN BY VERIFIED BY RATIFIED BY All rights reserved All information

More information

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University Detecting Jamming Attacks in Ubiquitous Sensor Networks Networking Lab Kyung Hee University Date: February 11 th, 2008 Syed Obaid Amin obaid@networking.khu.ac.kr Contents Background Introduction USN (Ubiquitous

More information

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer Optimal Clock Synchronization in Networks Christoph Lenzen Philipp Sommer Roger Wattenhofer Time in Sensor Networks Synchronized clocks are essential for many applications: Sensing TDMA Localization Duty-

More information

idocent: Indoor Digital Orientation Communication and Enabling Navigational Technology

idocent: Indoor Digital Orientation Communication and Enabling Navigational Technology idocent: Indoor Digital Orientation Communication and Enabling Navigational Technology Final Proposal Team #2 Gordie Stein Matt Gottshall Jacob Donofrio Andrew Kling Facilitator: Michael Shanblatt Sponsor:

More information

Using the IFR 2975 for Advanced Project 25 Keyloading Capabilities and AES/DES Encryption

Using the IFR 2975 for Advanced Project 25 Keyloading Capabilities and AES/DES Encryption Application Note Using the IFR 2975 for Advanced Project 25 Keyloading Capabilities and AES/DES Encryption by Rob Barden Secure communications are vital to national security interests and are of paramount

More information

The Intuitive Web-Based Wi-Fi Planning Tool

The Intuitive Web-Based Wi-Fi Planning Tool 0 ezwifi Planner The Intuitive Web-Based Wi-Fi Planning Tool User Manual V 1.0 Overview Tools to simulate wireless deployment with EnGenius wireless products. Upload floor plan & set up environment parameters

More information

ES-400/ES-500W/ES-500WR User's Guide

ES-400/ES-500W/ES-500WR User's Guide ES-400/ES-500W/ES-500WR User's Guide Contents ES-400/ES-500W/ES-500WR User's Guide... 7 Scanner Basics... 8 Scanner Parts Locations... 8 Scanner Parts... 8 Scanner Buttons and Lights... 11 User Replaceable

More information

BBM for BlackBerry 10. User Guide

BBM for BlackBerry 10. User Guide BBM for BlackBerry 10 Published: 2019-01-15 SWD-20190115102527350 Contents What's new in BBM...5 What's new in BBM...5 Get started...6 About BBM...6 Signing in to BBM... 6 Change your BBM status or profile...

More information

Operating Instructions. Sophos Access Points

Operating Instructions. Sophos Access Points Sophos Access Points Foreword We are pleased to welcome you as a new Sophos Access Point customer. These operating instructions will help you install and configure the access point and provide technical

More information

Location Services with Riverbed Xirrus APPLICATION NOTE

Location Services with Riverbed Xirrus APPLICATION NOTE Location Services with Riverbed Xirrus APPLICATION NOTE Introduction Indoor location tracking systems using Wi-Fi, as well as other shorter range wireless technologies, have seen a significant increase

More information