SlideShare a Scribd company logo
Kiran Divekar
kirandivekar@gmail.com
Wireless:
Basics to Internals
About...
 15 years of IT industry experience
 Worked in multinationals like PMC Sierra,
Persistent, Nevis Networks, Marvell
Semiconductors, Ericsson.
 Vice-president of GeeP
 One of major contributors of Marvell wifi driver
in Linux Kernel tree. (mwifiex)
WiFi Devices
Wireless Sniffer
UUT
Cisco AP (bg)
Marvell AP (bgn)
STA for Adhoc
Wireless Network Connection
Wireless Network Connection
Wireless Network Connection
 Linux Kernel :
 CONFIG_NET_RADIO, CONFIG_CFG80211
 Wireless Access Point :
 Device for network connection
 Supplicant :
 Program to connect to AP
 GUI :
 Network Manager
Wireless Networks
 Infrastructure :
A − − − | − Access Point − − Access Point − | − − − D
B − − − | BSS1 BSS2 | − − − E
 Ad-hoc :
A − − − − − C
 /
|  / |
 /
| /  |
/ 
B − − − − − D
Infrastructure vs. Adhoc Networks
infrastructure
network
ad-hoc network
AP
AP
AP
wired network
AP: Access Point
Source: Schiller
Wireless Terms (802.11)
Access Point :
 A wireless access point (WAP) is a device that
acts as the central hub of all wireless data
communications.
Service Set ID :
 SSID is used to identify a network in wireless
domain.
Basic Service Set ID :
 MAC address of the WAP used to identify part of
network in a SSID.
Mode :
 Infrastructure (Managed) or Ad-hoc mode.
Channel :
 One of Predefined channels from 1 to 16 in terms
frequency range of 2.4 GHz to 2.5 GHz.
Wireless Terms (802.11)
Encryption :
 Method of encoding or scrambling data so that
only people with the secret key to unlock the code
can view the original data.
WEP: Wired Equivalent Privacy
WPA: WiFi Protected Access.
RSN(WPA2) : Robust Security Network.
WPSK : Pre-Shared Key.
EAP : Extended Authentication Protocol
Network configuration
 # Intel Corporation PRO/Wireless 3945ABG
Network Connection
DEVICE=wlan0 (check udev)
ONBOOT=yes
BOOTPROTO=static
HWADDR=00:19:d2:59:15:d2
NETMASK=255.255.255.0
IPADDR=192.168.1.100
DOMAIN=
TYPE=Wireless
ESSID=linksys
CHANNEL=6
MODE=Managed
RATE=
Wireless (GUI)
Connecting to Network
 Scan available networks
 iwlist wlan0 scan OR iw dev wlan0 scan
wlan0 Scan completed :
Cell 01 - Address: 00:18:39:2F:AD:86
ESSID:"linksys"
Mode:Master
Channel:6
Frequency:2.437 GHz (Channel 6)
Encryption key:on
IE: IEEE 802.11i/WPA2 Version 1
Group Cipher : CCMP
Pairwise Ciphers (1) : CCMP
Authentication Suites (1) : PSK
Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s
9 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s
48 Mb/s; 54 Mb/s
Connecting to Network
 Associate a particular network (SSID)
 iwconfig wlan0 essid “linksys” OR
iw dev wlan0 connect “linksys”
 iwconfig wlan0
wlan0 IEEE 802.11g ESSID:"linksys"
Mode:Managed Frequency:2.437 GHz Access Point:
00:18:39:2F:AD:86
Bit Rate=54 Mb/s Tx-Power=27 dBm
Retry min limit:7 RTS thr:off Fragment thr=2346 B
Encryption key:C589-F156-8324-1564-021A-4EF6-5D52-6818 [2]
Link Quality=83/100 Signal level=-51 dBm Noise level=-55 dBm
Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
Tx excessive retries:0 Invalid misc:0 Missed beacon:0
Wireless (GUI)
Connecting to Network
 iwlist wlan0 scan
 iwconfig wlan0 essid “linksys”
 Authenticate to one of APs (BSSID)
in that network.
 4 –way handshake for PSK
 WEP key exchange
 Dot1x handshake for EAP
 Check network connectivity
 ping <Ip address of AP>
Wireless Applications
 NetworkManager : Dan Williams
www.gnome.org/projects/networkmanager/
 Wpa_supplicant : Jouni Malinen
http://hostap.epitest.fi/wpa_supplicant/
 Hostapd
http://hostap.epitest.fi/
 KwifiManager
http://kwifimanager.sf.net
 Intel cards [ iwl3945, iwlwifi]
http://www.intellinuxwireless.org
Common Pitfalls
Wifi device


Where is my wifi device?
I can't do anything without that :-)
=>lspci or lsusb or similar.

ifconfig : see all network interfaces including wireless.

Driver for wifi device

Part of Linux Kernel Tree

Vendor Supplied Custom Driver.

Re-compilation needed?
=> Get kernel source
=> Recompile driver. (make ?)
=> Load driver (insmod)
Wifi device
rfkill

Used to enable / disable wireless, BT devices
=> Hard Blocked.... check hardware switch
=> Soft Blocked....

rfkill unblock wifi
ifconfig

Check ifconfig wlan0
wlan0 Link encap:Ethernet HWaddr e0:06:e6:d8:5e:9d
inet6 addr: fe80::e206:e6ff:fed8:5e9d/64 Scope:Link
UP BROADCAST MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:609842
TX packets:83 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:0 (0.0 B) TX bytes:14499 (14.4 KB)
Interrupt:19

If not up,
=> ifconfig wlan0 up

Network Manager Conflicts:-
=> service network-manager stop

Wifi HotSpot

Requires AP-STAwifi device capability
=> What is AP-STA???

Check Your Android Phones.
=> Android AP.

Wifi Direct:-
=> PlayStations, TVs, Printers

Features:-

=> simultanous operations on same channel.
WiFi Hotspot (GUI)
Wireless Debugging
Sniffer: www.wireshark.org
Wireless Internals
Iw dev wlan0 connect “linksys”
MAGIC ?
Wireless Tools
The Wireless Tools (WT) is a set of tools allowing
to manipulate the Wireless Extensions. They use a
textual interface and are rather crude, but aim to
support the full Wireless Extension. There are
many other tools you can use with Wireless
Extensions, however Wireless Tools is the
reference implementation.
 iwconfig manipulate the basic wireless parameters
 iwlist allow to initiate scanning and list
frequencies, bit-rates, encryption keys...
 iwspy allow to get per node link quality
 Iwevent to read the wireless events
 iwpriv allow to manipulate the Wireless
Extensions specific to a driver (private)
System call trace
Driver Firmware interface
What is a firmware ?
• Firmware is wireless networking software that
runs on the wireless chipset.
• The wireless device driver downloads the
firmware to the wireless chipset, upon
initialization.
• All low level wireless operations (Tx, Rx) are
performed by the firmware software.
• It works in two modes
 Synchronous Request, response protocol
 Asynchronous Events from FW.
• The firmware resides in /lib/firmware/
e.g. /lib/firmware/iwl-3945.ucode
User space Control
=> Basic tools like iw, iwconfig, iwlist
=> wpa_supplicant or NetworkManager
=> ConnManager
mac80211
=> Mac80211 is Linux kernel subsytem
=> Implements shared code for soft MAC, half MAC
devices
=> Contains MLME
• Beacon
• Probe Request, Response
• Associate
• Autenticate
• De-associate
• De-authenticate
cfg80211
=> Linux kernel layer between user space and mac80211
=> Sanity checking, protocol translations

=> Much thicker than WEXT.

=> CRDA. (Regulatory Domain)
Kernel configuration
Architecture
More
=> Internals of cfg80211, mac80211
=> CRDA : US, EU, JP
=> Configuration, data transmission, reception
=> http://wireless.linux.org
=> linux-wireless@vger.kernel.org
Wireless Basics & Internals
Thank You

More Related Content

What's hot

Introducing Widows 7
Introducing Widows 7Introducing Widows 7
Introducing Widows 7
Gene Carboni
 
Ian Prattlinuxworld Xen Aug2008
Ian Prattlinuxworld Xen Aug2008Ian Prattlinuxworld Xen Aug2008
Ian Prattlinuxworld Xen Aug2008
The Linux Foundation
 
XS Boston 2008 Project Status
XS Boston 2008 Project StatusXS Boston 2008 Project Status
XS Boston 2008 Project Status
The Linux Foundation
 
Getting Started with Patching (Patching 101)
Getting Started with Patching (Patching 101)Getting Started with Patching (Patching 101)
Getting Started with Patching (Patching 101)
Dell World
 
How to Architect a Novell Sentinel Implementation
How to Architect a Novell Sentinel ImplementationHow to Architect a Novell Sentinel Implementation
How to Architect a Novell Sentinel Implementation
Novell
 
Linux power management: are you doing it right?
Linux power management: are you doing it right?Linux power management: are you doing it right?
Linux power management: are you doing it right?
Chris Simmonds
 
Sw update elce2017
Sw update elce2017Sw update elce2017
Sw update elce2017
Stefano Babic
 
Ina Pratt Fosdem Feb2008
Ina Pratt Fosdem Feb2008Ina Pratt Fosdem Feb2008
Ina Pratt Fosdem Feb2008
The Linux Foundation
 
XS Boston 2008 OVF
XS Boston 2008 OVFXS Boston 2008 OVF
XS Boston 2008 OVF
The Linux Foundation
 
Dell EMC PowerEdge iDRAC9 - 14 features for power users
Dell EMC PowerEdge  iDRAC9 - 14 features for power usersDell EMC PowerEdge  iDRAC9 - 14 features for power users
Dell EMC PowerEdge iDRAC9 - 14 features for power users
Mark Maclean
 
Software update for IoT: the current state of play
Software update for IoT: the current state of playSoftware update for IoT: the current state of play
Software update for IoT: the current state of play
Chris Simmonds
 
Quick and Easy Device Drivers for Embedded Linux Using UIO
Quick and Easy Device Drivers for Embedded Linux Using UIOQuick and Easy Device Drivers for Embedded Linux Using UIO
Quick and Easy Device Drivers for Embedded Linux Using UIO
Chris Simmonds
 
Securing your Cloud with Xen - SUSECon 2013
Securing your Cloud with Xen - SUSECon 2013Securing your Cloud with Xen - SUSECon 2013
Securing your Cloud with Xen - SUSECon 2013The Linux Foundation
 
Quickboot on i.MX6
Quickboot on i.MX6Quickboot on i.MX6
Quickboot on i.MX6
Gary Bisson
 
GUI or command line - you can get the best of both worlds
GUI or command line - you can get the best of both worldsGUI or command line - you can get the best of both worlds
GUI or command line - you can get the best of both worlds
PaloSanto Solutions
 
XS 2008 Boston VTPM
XS 2008 Boston VTPMXS 2008 Boston VTPM
XS 2008 Boston VTPM
The Linux Foundation
 
6 profiling tools
6 profiling tools6 profiling tools
6 profiling tools
videos
 
Tuning Android for low RAM
Tuning Android for low RAMTuning Android for low RAM
Tuning Android for low RAM
Chris Simmonds
 
XS Japan 2008 BitVisor English
XS Japan 2008 BitVisor EnglishXS Japan 2008 BitVisor English
XS Japan 2008 BitVisor English
The Linux Foundation
 
Userspace drivers-2016
Userspace drivers-2016Userspace drivers-2016
Userspace drivers-2016
Chris Simmonds
 

What's hot (20)

Introducing Widows 7
Introducing Widows 7Introducing Widows 7
Introducing Widows 7
 
Ian Prattlinuxworld Xen Aug2008
Ian Prattlinuxworld Xen Aug2008Ian Prattlinuxworld Xen Aug2008
Ian Prattlinuxworld Xen Aug2008
 
XS Boston 2008 Project Status
XS Boston 2008 Project StatusXS Boston 2008 Project Status
XS Boston 2008 Project Status
 
Getting Started with Patching (Patching 101)
Getting Started with Patching (Patching 101)Getting Started with Patching (Patching 101)
Getting Started with Patching (Patching 101)
 
How to Architect a Novell Sentinel Implementation
How to Architect a Novell Sentinel ImplementationHow to Architect a Novell Sentinel Implementation
How to Architect a Novell Sentinel Implementation
 
Linux power management: are you doing it right?
Linux power management: are you doing it right?Linux power management: are you doing it right?
Linux power management: are you doing it right?
 
Sw update elce2017
Sw update elce2017Sw update elce2017
Sw update elce2017
 
Ina Pratt Fosdem Feb2008
Ina Pratt Fosdem Feb2008Ina Pratt Fosdem Feb2008
Ina Pratt Fosdem Feb2008
 
XS Boston 2008 OVF
XS Boston 2008 OVFXS Boston 2008 OVF
XS Boston 2008 OVF
 
Dell EMC PowerEdge iDRAC9 - 14 features for power users
Dell EMC PowerEdge  iDRAC9 - 14 features for power usersDell EMC PowerEdge  iDRAC9 - 14 features for power users
Dell EMC PowerEdge iDRAC9 - 14 features for power users
 
Software update for IoT: the current state of play
Software update for IoT: the current state of playSoftware update for IoT: the current state of play
Software update for IoT: the current state of play
 
Quick and Easy Device Drivers for Embedded Linux Using UIO
Quick and Easy Device Drivers for Embedded Linux Using UIOQuick and Easy Device Drivers for Embedded Linux Using UIO
Quick and Easy Device Drivers for Embedded Linux Using UIO
 
Securing your Cloud with Xen - SUSECon 2013
Securing your Cloud with Xen - SUSECon 2013Securing your Cloud with Xen - SUSECon 2013
Securing your Cloud with Xen - SUSECon 2013
 
Quickboot on i.MX6
Quickboot on i.MX6Quickboot on i.MX6
Quickboot on i.MX6
 
GUI or command line - you can get the best of both worlds
GUI or command line - you can get the best of both worldsGUI or command line - you can get the best of both worlds
GUI or command line - you can get the best of both worlds
 
XS 2008 Boston VTPM
XS 2008 Boston VTPMXS 2008 Boston VTPM
XS 2008 Boston VTPM
 
6 profiling tools
6 profiling tools6 profiling tools
6 profiling tools
 
Tuning Android for low RAM
Tuning Android for low RAMTuning Android for low RAM
Tuning Android for low RAM
 
XS Japan 2008 BitVisor English
XS Japan 2008 BitVisor EnglishXS Japan 2008 BitVisor English
XS Japan 2008 BitVisor English
 
Userspace drivers-2016
Userspace drivers-2016Userspace drivers-2016
Userspace drivers-2016
 

Viewers also liked

Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
Michael Boman
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
izhar ul haq
 
Wi Fi Security
Wi Fi SecurityWi Fi Security
Wi Fi Security
yousef emami
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best Practices
Cisco Mobility
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
Muhammad Zia
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN securityRajan Kumar
 
wireless communication
wireless communicationwireless communication
wireless communication
Sakshi Bhargava
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
Parvesh Taneja
 

Viewers also liked (9)

Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Wi Fi Security
Wi Fi SecurityWi Fi Security
Wi Fi Security
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best Practices
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
wireless communication
wireless communicationwireless communication
wireless communication
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to Fudcon 2015...Wireless: From Basics to Internals

Wireless Penetration Testing
Wireless Penetration TestingWireless Penetration Testing
Wireless Penetration Testing
Mohammed Adam
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
Nilesh Sapariya
 
Exploiting WiFi Security
Exploiting WiFi Security Exploiting WiFi Security
Exploiting WiFi Security
Hariraj Rathod
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkArunabh Mishra
 
POLYMER MODIFIED AND NEAT BITUMINOUS MIXES USING WARM MIX ASPHALT FOR PAVING ...
POLYMER MODIFIED AND NEAT BITUMINOUS MIXES USING WARM MIX ASPHALT FOR PAVING ...POLYMER MODIFIED AND NEAT BITUMINOUS MIXES USING WARM MIX ASPHALT FOR PAVING ...
POLYMER MODIFIED AND NEAT BITUMINOUS MIXES USING WARM MIX ASPHALT FOR PAVING ...
AnilKumar109331
 
Thesis_presentation ctm tk sha.ppt
Thesis_presentation ctm tk sha.pptThesis_presentation ctm tk sha.ppt
Thesis_presentation ctm tk sha.ppt
KavitaChhajed
 
Thesis_presentation.ppt
Thesis_presentation.pptThesis_presentation.ppt
Thesis_presentation.ppt
Nishant Kumar
 
Thesis presentation of college iit ppt.ppt
Thesis presentation of college iit ppt.pptThesis presentation of college iit ppt.ppt
Thesis presentation of college iit ppt.ppt
AmanJohnTudu
 
Thesis_presentation.ppt
Thesis_presentation.pptThesis_presentation.ppt
Thesis_presentation.ppt
MohdIshaq24
 
Ap&ac system development 2014
Ap&ac system development 2014Ap&ac system development 2014
Ap&ac system development 2014TOM LIU
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hackingMihir Shah
 
Wireless Security Basics
Wireless Security BasicsWireless Security Basics
Wireless Security Basics
SecurityTube.Net
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
arushi bhatnagar
 
Wireless gateways and mobile appl. servers
Wireless gateways and mobile appl. serversWireless gateways and mobile appl. servers
Wireless gateways and mobile appl. servers
Ankit Anand
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005
Bill Drew
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_kRama Krishna M
 
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
Santhosh Kumar
 

Similar to Fudcon 2015...Wireless: From Basics to Internals (20)

Wireless Penetration Testing
Wireless Penetration TestingWireless Penetration Testing
Wireless Penetration Testing
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Exploiting WiFi Security
Exploiting WiFi Security Exploiting WiFi Security
Exploiting WiFi Security
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh Network
 
POLYMER MODIFIED AND NEAT BITUMINOUS MIXES USING WARM MIX ASPHALT FOR PAVING ...
POLYMER MODIFIED AND NEAT BITUMINOUS MIXES USING WARM MIX ASPHALT FOR PAVING ...POLYMER MODIFIED AND NEAT BITUMINOUS MIXES USING WARM MIX ASPHALT FOR PAVING ...
POLYMER MODIFIED AND NEAT BITUMINOUS MIXES USING WARM MIX ASPHALT FOR PAVING ...
 
Thesis_presentation ctm tk sha.ppt
Thesis_presentation ctm tk sha.pptThesis_presentation ctm tk sha.ppt
Thesis_presentation ctm tk sha.ppt
 
Thesis_presentation.ppt
Thesis_presentation.pptThesis_presentation.ppt
Thesis_presentation.ppt
 
Thesis presentation of college iit ppt.ppt
Thesis presentation of college iit ppt.pptThesis presentation of college iit ppt.ppt
Thesis presentation of college iit ppt.ppt
 
Thesis_presentation.ppt
Thesis_presentation.pptThesis_presentation.ppt
Thesis_presentation.ppt
 
Wifi- technology_moni
Wifi- technology_moniWifi- technology_moni
Wifi- technology_moni
 
Ap&ac system development 2014
Ap&ac system development 2014Ap&ac system development 2014
Ap&ac system development 2014
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Wireless Security Basics
Wireless Security BasicsWireless Security Basics
Wireless Security Basics
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Wireless gateways and mobile appl. servers
Wireless gateways and mobile appl. serversWireless gateways and mobile appl. servers
Wireless gateways and mobile appl. servers
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
 
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
 

Recently uploaded

The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 

Recently uploaded (20)

The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 

Fudcon 2015...Wireless: From Basics to Internals

  • 2. About...  15 years of IT industry experience  Worked in multinationals like PMC Sierra, Persistent, Nevis Networks, Marvell Semiconductors, Ericsson.  Vice-president of GeeP  One of major contributors of Marvell wifi driver in Linux Kernel tree. (mwifiex)
  • 3. WiFi Devices Wireless Sniffer UUT Cisco AP (bg) Marvell AP (bgn) STA for Adhoc
  • 6. Wireless Network Connection  Linux Kernel :  CONFIG_NET_RADIO, CONFIG_CFG80211  Wireless Access Point :  Device for network connection  Supplicant :  Program to connect to AP  GUI :  Network Manager
  • 7. Wireless Networks  Infrastructure : A − − − | − Access Point − − Access Point − | − − − D B − − − | BSS1 BSS2 | − − − E  Ad-hoc : A − − − − − C / | / | / | / | / B − − − − − D
  • 8. Infrastructure vs. Adhoc Networks infrastructure network ad-hoc network AP AP AP wired network AP: Access Point Source: Schiller
  • 9. Wireless Terms (802.11) Access Point :  A wireless access point (WAP) is a device that acts as the central hub of all wireless data communications. Service Set ID :  SSID is used to identify a network in wireless domain. Basic Service Set ID :  MAC address of the WAP used to identify part of network in a SSID. Mode :  Infrastructure (Managed) or Ad-hoc mode. Channel :  One of Predefined channels from 1 to 16 in terms frequency range of 2.4 GHz to 2.5 GHz.
  • 10. Wireless Terms (802.11) Encryption :  Method of encoding or scrambling data so that only people with the secret key to unlock the code can view the original data. WEP: Wired Equivalent Privacy WPA: WiFi Protected Access. RSN(WPA2) : Robust Security Network. WPSK : Pre-Shared Key. EAP : Extended Authentication Protocol
  • 11. Network configuration  # Intel Corporation PRO/Wireless 3945ABG Network Connection DEVICE=wlan0 (check udev) ONBOOT=yes BOOTPROTO=static HWADDR=00:19:d2:59:15:d2 NETMASK=255.255.255.0 IPADDR=192.168.1.100 DOMAIN= TYPE=Wireless ESSID=linksys CHANNEL=6 MODE=Managed RATE=
  • 13. Connecting to Network  Scan available networks  iwlist wlan0 scan OR iw dev wlan0 scan wlan0 Scan completed : Cell 01 - Address: 00:18:39:2F:AD:86 ESSID:"linksys" Mode:Master Channel:6 Frequency:2.437 GHz (Channel 6) Encryption key:on IE: IEEE 802.11i/WPA2 Version 1 Group Cipher : CCMP Pairwise Ciphers (1) : CCMP Authentication Suites (1) : PSK Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s; 6 Mb/s 9 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s 48 Mb/s; 54 Mb/s
  • 14. Connecting to Network  Associate a particular network (SSID)  iwconfig wlan0 essid “linksys” OR iw dev wlan0 connect “linksys”  iwconfig wlan0 wlan0 IEEE 802.11g ESSID:"linksys" Mode:Managed Frequency:2.437 GHz Access Point: 00:18:39:2F:AD:86 Bit Rate=54 Mb/s Tx-Power=27 dBm Retry min limit:7 RTS thr:off Fragment thr=2346 B Encryption key:C589-F156-8324-1564-021A-4EF6-5D52-6818 [2] Link Quality=83/100 Signal level=-51 dBm Noise level=-55 dBm Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0 Tx excessive retries:0 Invalid misc:0 Missed beacon:0
  • 16. Connecting to Network  iwlist wlan0 scan  iwconfig wlan0 essid “linksys”  Authenticate to one of APs (BSSID) in that network.  4 –way handshake for PSK  WEP key exchange  Dot1x handshake for EAP  Check network connectivity  ping <Ip address of AP>
  • 17. Wireless Applications  NetworkManager : Dan Williams www.gnome.org/projects/networkmanager/  Wpa_supplicant : Jouni Malinen http://hostap.epitest.fi/wpa_supplicant/  Hostapd http://hostap.epitest.fi/  KwifiManager http://kwifimanager.sf.net  Intel cards [ iwl3945, iwlwifi] http://www.intellinuxwireless.org
  • 19. Wifi device   Where is my wifi device? I can't do anything without that :-) =>lspci or lsusb or similar.  ifconfig : see all network interfaces including wireless.  Driver for wifi device  Part of Linux Kernel Tree  Vendor Supplied Custom Driver.  Re-compilation needed? => Get kernel source => Recompile driver. (make ?) => Load driver (insmod)
  • 21. rfkill  Used to enable / disable wireless, BT devices => Hard Blocked.... check hardware switch => Soft Blocked....  rfkill unblock wifi
  • 22. ifconfig  Check ifconfig wlan0 wlan0 Link encap:Ethernet HWaddr e0:06:e6:d8:5e:9d inet6 addr: fe80::e206:e6ff:fed8:5e9d/64 Scope:Link UP BROADCAST MULTICAST MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:609842 TX packets:83 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:0 (0.0 B) TX bytes:14499 (14.4 KB) Interrupt:19  If not up, => ifconfig wlan0 up  Network Manager Conflicts:- => service network-manager stop 
  • 23. Wifi HotSpot  Requires AP-STAwifi device capability => What is AP-STA???  Check Your Android Phones. => Android AP.  Wifi Direct:- => PlayStations, TVs, Printers  Features:-  => simultanous operations on same channel.
  • 26. Wireless Internals Iw dev wlan0 connect “linksys” MAGIC ?
  • 27. Wireless Tools The Wireless Tools (WT) is a set of tools allowing to manipulate the Wireless Extensions. They use a textual interface and are rather crude, but aim to support the full Wireless Extension. There are many other tools you can use with Wireless Extensions, however Wireless Tools is the reference implementation.  iwconfig manipulate the basic wireless parameters  iwlist allow to initiate scanning and list frequencies, bit-rates, encryption keys...  iwspy allow to get per node link quality  Iwevent to read the wireless events  iwpriv allow to manipulate the Wireless Extensions specific to a driver (private)
  • 29. Driver Firmware interface What is a firmware ? • Firmware is wireless networking software that runs on the wireless chipset. • The wireless device driver downloads the firmware to the wireless chipset, upon initialization. • All low level wireless operations (Tx, Rx) are performed by the firmware software. • It works in two modes  Synchronous Request, response protocol  Asynchronous Events from FW. • The firmware resides in /lib/firmware/ e.g. /lib/firmware/iwl-3945.ucode
  • 30. User space Control => Basic tools like iw, iwconfig, iwlist => wpa_supplicant or NetworkManager => ConnManager
  • 31. mac80211 => Mac80211 is Linux kernel subsytem => Implements shared code for soft MAC, half MAC devices => Contains MLME • Beacon • Probe Request, Response • Associate • Autenticate • De-associate • De-authenticate
  • 32. cfg80211 => Linux kernel layer between user space and mac80211 => Sanity checking, protocol translations  => Much thicker than WEXT.  => CRDA. (Regulatory Domain)
  • 35. More => Internals of cfg80211, mac80211 => CRDA : US, EU, JP => Configuration, data transmission, reception => http://wireless.linux.org => linux-wireless@vger.kernel.org
  • 36. Wireless Basics & Internals Thank You