EC312 Security Exercise 15

Similar documents
Now we re going to put all that knowledge to the test and apply your cyber skills in a wireless environment.

Reading and working through Learn Networking Basics before this document will help you with some of the concepts used in wireless networks.

Report Number: 3415 Page 13 of 37

Click on the numbered steps below to learn how to record and save audio using Audacity.

EC312 Lesson 20: Electronic Warfare (3/20/14)

Date: 01/01/17 10:26:10AM

USING THE ARTISTRY SKIN ANALYZER

Wi-Fi. Wireless Fidelity. Spread Spectrum CSMA. Ad-hoc Networks. Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering

WiFiProbe Numeric Indicators

Digi-Wave Technology Williams Sound Digi-Wave White Paper

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor

Engr 1202 ECE. Clean Room Project

2015 Interference 101. Robin Jackman Application Engineer

Indoor Localization in Wireless Sensor Networks

best practice guide Ruckus SPoT Best Practices SOLUTION OVERVIEW AND BEST PRACTICES FOR DEPLOYMENT

Radio Path Prediction Software

K.NARSING RAO(08R31A0425) DEPT OF ELECTRONICS & COMMUNICATION ENGINEERING (NOVH).

Location Services with Riverbed Xirrus APPLICATION NOTE

Photoshop Exercise 2 Developing X

A graph is an effective way to show a trend in data or relating two variables in an experiment.

Chanalyzer Pro Sample Report

Homework KCL/KVL Review Bode Plots Active Filters

Chanalyzer 4. Chanalyzer 4 by MetaGeek USER GUIDE page 1

Contents. Telecom Service Chae Y. Lee. Data Signal Transmission Transmission Impairments Channel Capacity

Wireless Network Security Spring 2016

Exercise 1: RF Stage, Mixer, and IF Filter

Doug Fravel ADTRAN Global

Reference guide for Wireless Config Analyzer Express

USING THE ZELLO VOICE TRAFFIC AND OPERATIONS NETS

RF Management in SonicOS 4.0 Enhanced

How Radio Signals Work By Jim Sinclair READ ONLINE

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

1103 Period 26: Broadcasting

User Guide for the Calculators Version 0.9

Wireless Communication Systems Laboratory #2. Understanding test equipments. The students will be familiar with the following items:

Wireless Location Technologies

Wireless Network Security Spring 2015

Context-Aware Planning and Verification

Chanalyzer by MetaGeek USER GUIDE page 1

Cognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks

Lesson Plan 1 Introduction to Google Earth for Middle and High School. A Google Earth Introduction to Remote Sensing

The Deeter Group. Wireless Site Survey Tool

Operation Manual [Version 3.09]

Private WiMAX Installation and Troubleshooting

Smart Antenna ABSTRACT

Chanalyzer by MetaGeek USER GUIDE page 1

CHM 109 Excel Refresher Exercise adapted from Dr. C. Bender s exercise

CSNT 180 Wireless Networking. Chapter 4 Radio Frequency (RF) Fundamentals for Wireless LAN Technology

Florida Public Service Commission Staff Workshop on Smart Meters

Automatic power/channel management in Wi-Fi networks

How much do you use the Internet?

EIE324 Communication & Telecommunication Lab. Date of the experiment Topics: Objectives : Introduction Equipment Operating Frequencies

MIMO II: Physical Channel Modeling, Spatial Multiplexing. COS 463: Wireless Networks Lecture 17 Kyle Jamieson

Lesson Title: Using Waves to Communicate Subject Grade Level Timeline. Physical Science minutes. Objectives

INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA

Communication Technology

Close Range Positioning System using Wireless Networks. Abstract

Parent Guide. technology. time. student login. hallofheroesgame.com. student name: username: password:

UNDERSTANDING AND MITIGATING

BER Performance with GNU Radio

10/17/2011. I have an Air-Card. I have Satellite Internet. Why would I use Wi-Fi? Just for

ECE 497 Introduction to Mobile Robotics Spring 09-10

All Beamforming Solutions Are Not Equal

Wireless Intro : Computer Networking. Wireless Challenges. Overview

Client Roaming in a Micro and Macro Cell

Determining the Cause of a High Retry Percentage

WIFI and Your Health

Welcome to Weebly. Setting up Your Website. Write your username here:

Appendix A Decibels. Definition of db

ITT Technical Institute. ET2530 Electronic Communications Onsite and Online Course SYLLABUS

When you have completed this exercise, you will be able to determine the frequency response of a

INTRODUCTION TO DATA STUDIO

CS263: Wireless Communications and Sensor Networks

OFFICE WIRELESS NETWORK PERFORMANCE IMPROVEMENT BY CHANGING WIRELESS ROUTERS INSTALLMENT PATTERN AND RADIO CHANNEL SETTING

Lab 8: Frequency Response and Filtering

Chanalyzer Pro. Chanalyzer Pro by MetaGeek USER GUIDE page 1

Wireless LAN RF Design Fundamentals

Location Planning and Verification

Kaltura CaptureSpace Lite Desktop Recorder: Editing, Saving, and Uploading a Recording

Welcome to EnGenius Versatile Wireless Networking Applications and Configurations - Part 1 Outdoor Wireless Networking Products

1 Interference Cancellation

Modeling Your Motion When Walking

Building a robust Wi-Fi Network

StarPlus Hybrid Approach to Avoid and Reduce the Impact of Interference in Congested Unlicensed Radio Bands

Unit One: Explore Uses of Technology in Business

Activity P52: LRC Circuit (Voltage Sensor)

Location Based Technologies

Huawei Indoor WLAN Deployment Guide

Attorneys for Plaintiff XR Communications, LLC, dba Vivato Technologies UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF CALIFORNIA

HOW CAN A GPS HELP? WHY A GPS? HOW DOES A GPS WORK?

PHYSICS 220 LAB #1: ONE-DIMENSIONAL MOTION

Unmatched RF Spectrum Analysis DATA SHEETS. Unpublished

SYSTEM SENSOR WIRELESS REMOTE INDICATOR PRODUCT SPECIFICATION

[DOING AN ODA: STEP-BY-STEP INSTRUCTIONS]

ENGR1 Antenna Pattern Measurements

Physics of RFID. Pawel Waszczur McMaster RFID Applications Lab McMaster University

Wireless Networked Systems

LTE-Unlicensed. Sreekanth Dama, Dr. Kiran Kuchi, Dr. Abhinav Kumar IIT Hyderabad

Moving Man Introduction Motion in 1 Direction

Tektronix digital oscilloscope, BK Precision Function Generator, coaxial cables, breadboard, the crystal earpiece from your AM radio kit.

Transcription:

EC312 Security Exercise 15 Introduction to Wireless Signals and dbm In this wireless section of our course, we understand that there is a different way to send data from a transmitter to a receiver. The electromagnetic radiation all around us can travel through free space. If we encode some meaningful data onto these waves, we can communicate without being physically tethered to the medium. But how far away can we be? How close to the transmitter must we be in order to receive the message? Just like our human voice only travels so far when we shout, radio waves only travel so far from the transmitting station. At some point, you will just be out of range. Fortunately, we can measure the strength of the transmitter (how loud it can shout ) and the sensitivity of a receiver (how quiet a sound it can still hear ) When we put these measurements on a logarithmic decibel scale and compare their utility, we can figure out things like: What is the optimal location for a transmitter? Where is the best spot to get reception? Which devices receive a better signal? These are things you probably do with your cell phone all the time. Today we will do an experiment and see if we can answer these questions scientifically. Set-up. Equipment required: Your issued Laptop Xirrus software: (Follow the link off the EC312 website) 1

Part 1: Measuring signal strength from your local WiFi On your laptop, check the wireless connections and you should see a list of devices. One of the devices is the wireless Access Point (AP) name cyber2_xx. The xx holds the place of your room number. If you do not see the specific AP for your room, tell your instructor. a b c d e Once you notice the cyber2 AP, start Xirrus Wi-Fi Inspector by double clicking the icon on your desktop. Let s explore the Xirrus Graphical User Interface (GUI) above. You should identify each of the following alphabetic parts on the display above and then perform any specific instructions on your laptop. a) Start by clicking on settings and turning Locate Sound to Off. Click OK. b) In the upper left is the Radar Display. This shows the relative signal strength of an AP. The stronger the AP, the closer it is to the middle. It doesn t correlate with specific direction of the AP relative to you, but it will converge to the center as strength increases. c) In the center top is Connections which lists the details of the AP you are connected to. d) Below that is Networks which lists of all the AP s you can observe with their respective data. e) Signal History is a time versus signal strength (dbm) graph of the AP you are trying to locate. Highlight the cyber2_xx node and then right click and then click on locate cyber2_xx and you should see it appear on the signal history plot. 2

Question1: For your cyber2_xx AP, write the following details down on the lower left corner of the map on the solution page. SSID( Service Set Identifier) - the wireless network name, BSSID ( Basic Service Set Identifier) - the MAC address of the wireless interface unit Channel - allows the carrier frequency to be separated into bands to keep from overlapping. Frequency - carrier frequency of the signal. Now that we have Xirrus running, we can take some measurements of the signal strength. Look at the Networks display list in the middle (d above), find your AP, highlight it and note the dbm. Question 2: Record the signal strength noted for your AP on the table on the last page of the lab under classroom. Question 3: Assume you record the signal strength of some other fictional access point when you are standing next to it as -30 dbm. Next, you walk some distance away from it and take another signal strength measurement and record it as -33 dbm. By what factor has the signal strength dropped from measurement one to measurement two? (Hint: convert each measurement to mw then divide measurement two by measurement one) Keep this realization in mind when answering the following questions. A SMALL CHANGE IN DECIBELS CAN MEAN A LARGE CHANGE IN POWER. Question 4: Staying highlighted on your assigned AP, move from point to point on the map and record the signal strength (dbm), allowing a period of time to let the value settle. Note if the dbm falls much below -90 it may drop from your list. You can locate it again by returning closer to the classroom. Simply record -90 if your AP is lost at a point. Question 5: Convert your dbm measurements to mw and finish filling in the table. PP (ddbbbb) Recall that PP (mmmm) = 10 10 Question 6: Observations: a) At what locations did you receive the strongest signal? b) The weakest signal? c) Would you expect to stay connected to this AP in Maury Hall? Why or why not? d) Have an instructor check your results. 3

Part 2: The Hunt Understanding how Xirrus reads signal strength, we will now try to locate an unknown AP using the program. This AP is not located in your classroom, but you should be able to pick up the signal in your hallway. a) Try to find the AP with SSID Bad_Egg_xx ( again with xx indicating your class room). b) Turn On the Locate Sound in Settings and change the polling time to 1 second. Right click on Bad_Egg_xx in the Networks list and select locate. This will create a ping. The closer the pings are together the stronger the AP s signal. c) Begin walking through the lab deck following your ping, dbm and Radar in a direction that makes the signal stronger. Question 7: Where is the AP located? What is written on the AP? Question 8: Consider the following scenarios. a) Emissions controls in the military, refers to controlling your Radio Frequency Emissions. Keeping The Hunt from above in mind, why might it be important to maintain radio silence at certain times in Navy and Marine Corps? b) The military often uses physically isolated data networks; that is, they are not connected to the internet. However, these same networks often have wireless components. Are they still vulnerable to cyber exploitation or attack? How? Captain Ryan Whitty, USMC 4

Name: Questions 1/2/4/5: EC312 Security Exercise 15 Question 3: Question 6: a) b) c) d) Instructor/Lab Tech Signature Question 7: Question 8: a) b) 5