Lantronix presents: How to add 802.11BG to your Embedded Device Gary Marrs Senior Field Application Engineer 06-26-09 1 @2004 Lantronix Corporation. All Rights Reserved. Confidential Agenda for Today Review of Basic RF concepts Wireless Security Implementing a WLAN embedded interface Troubleshooting a WLAN link Questions / Discussion 2 @2004 Lantronix Corporation. All Rights Reserved. Confidential About Lantronix Networking solutions for over 19 years (Founded: 1989) Sales, manufacturing, and support in Asia, Europe, USA Annual sales $56M+ Market and technology leader in device servers, console servers, and embedded Ethernet solutions Over 3,000,000 networkenabled devices and 20,000+ customers worldwide 3 @2004 Lantronix Corporation. All Rights Reserved. Confidential Lantronix Headquarters Irvine, California NASDAQ: LTRX What we Do… Lantronix Device Networking products provides complete solutions for complex networking integration. 4 Accelerated Time-to-Market: Lantronix Device Server’s are easy to integrate allowing any device to be enabled with network connectivity—in a few days using an external box and in a few weeks using an embedded unit. Reduced Design Risk: Lantronix products are already engineered, tested, and EMC-compliant, eliminating the R&D and investment risk inherent in any new design. Competitive Edge: Network enabling a device provides functionality with quantifiable benefits. Through pre-emptive notification and remote diagnostics, service costs will drop while responsiveness increases, simultaneously improving both revenue and customer satisfaction. @2004 Lantronix Corporation. All Rights Reserved. Confidential (Wireless Design) is a hard rocky path fraught with pitfalls for the naive and uninitiated Patrick Mannion – Senior Editor EE Times 5 @2004 Lantronix Corporation. All Rights Reserved. Confidential Implementing 802.11BG into an Embedded System… …Comes a reality of challenges: ● Difficulty of integrating chipsets and drivers ● Understanding of RF and TCP/IP networking ● FCC (Federal Communications Commission) and Worldwide certifications ● Wireless Security 6 @2004 Lantronix Corporation. All Rights Reserved. Confidential Which Wireless Technology is Right for Your Application? 7 RF technology Range Data Rate Power Security Zigbee 10-40 m Low Low Medium Bluetooth 10 / 100m Medium / High Medium Medium 802.11BG 100m High High High 802.11A 50m High High High Proprietary Wireless design Up to 4 km Low to Medium Low to High Low to Medium @2004 Lantronix Corporation. All Rights Reserved. Confidential IEEE 802.11 Wireless 8 @2004 Lantronix Corporation. All Rights Reserved. Confidential IEEE 802.11 - Infrastructure Mode In infrastructure mode (also called Infrastructure BSS), there is a wireless "station", which is usually a PC equipped with a wireless network interface card (NIC), and an "access point" (AP), which acts as a bridge between the wireless and wired networks. 9 @2004 Lantronix Corporation. All Rights Reserved. Confidential IEEE 802.11 Modes – Ad hoc Mode Ad hoc mode (also called peer-to-peer mode or an Independent Basic Service Set, or IBSS) is simply a set of 802.11 wireless stations that communicate directly with one another without using an access point or any connection to a wired network. 10 @2004 Lantronix Corporation. All Rights Reserved. Confidential Wireless Configuration To communicate via Wireless, the computers must have the same Network Name. The Network name for wireless is called the SSID. To add security, you can configure the Network Authentication and the Data Encryption. WEP, WPA and WPA2 are the standards for data encryption. To configure an Access Point – you can enable or disable SSID broadcast. An enabled SSID broadcast will allow anyone to find and connect to the access point. It is a good idea to change the default password on your AP or Wireless router. 11 @2004 Lantronix Corporation. All Rights Reserved. Confidential Basic RF Concepts 12 @2004 Lantronix Corporation. All Rights Reserved. Confidential Signal Strength There are 4 units of measurement used to represent RF signal strength. mW – (milliwatts) dBm – (dB-milliwatts) Received Signal Strength Indicator (RSSI) A percentage measurement Measuring RF energy in mW is not always convenient. Signal strength does not fade in a linear manner. Due to free space loss, RF energy fades inversely to the square of the distance. Example – measure the signal at 20m away from the AP. Then move to 40m away (double the distance), the signal power decrease by a factor of 4. 13 The dBm is a logarithmic function and mathematically represents this relationship very well. @2004 Lantronix Corporation. All Rights Reserved. Confidential Signal Power in Decibels The power of RF signal levels is commonly measured in Decibels (dB). dBm stands for a dB above one milliWatt To convert between watts and dBs use this formula: dB = 10 x log10 (power output / power input) To find dBm – simply use 1 mW for the input power dBm = 10 x log10 (power output / .001) ie.. 100 mW = 20 dBm mW values less than 1mW are represented by negative dBm values. Every 3 dB increase is a doubling of power 14 @2004 Lantronix Corporation. All Rights Reserved. Confidential Power in Decibels 15 Power (in watts) Power (in dBm) 0.000000000001 -90 = ,001 pW 0.00000000001 -80 = .01 pW 0.0000000001 -70 = .1pW 0.000000001 -60 = 1 pW 0.00000001 -50 = 10 pW 0.0000001 -40 = 100 pW 0.000001 -30 = 1 nW 0.00001 -20 = 10 nW 0.0001 -10 = 100 nW 0.001 0 = 1 mW 0.01 10 = 10 mW 0.1 20 = 100 mW 1 30 = 1W 10 40 = 10 W 100 50 = 100 W 1000 60 = 1000 W @2004 Lantronix Corporation. All Rights Reserved. Confidential Power (in watts) Received Signal Strength Indicator (RSSI) RSSI is generic radio receiver technology metric. IEEE 802.11 defines RSSI as a relative received signal strength in a WLAN environment, in arbitrary units. RSSI provides a way for the circuitry on a WLAN NIC to measure and represent RF energy. RSSI measurements are unit less and in the range 0 to 255. The maximum value, RSSI_Max, is vendor dependent. Every chipset vendor scales the RSSI differently. The 802.11 standard does not define any relationship between RSSI value and power level in mW or dBm. Key Point – you can not compare the RSSI readings from different WLAN chipset vendors. 16 @2004 Lantronix Corporation. All Rights Reserved. Confidential Percentage Signal Strength The percentage represents the RSSI for a received packet. The RSSI value is divided by RSSI_Max and multipled by 100. Provides a good way to circumvent the complexities of RSSI readings. If all vendors used percentage, then percentage would provide a good cross vendor metric for comparing signal strength. 17 @2004 Lantronix Corporation. All Rights Reserved. Confidential Antennas An antenna is a device that is made to efficiently radiate and receive radiated electromagnetic waves. There are several important antenna characteristics that should be considered when choosing an antenna for your application as follows: Antenna radiation patterns Power Gain Directivity Polarization 18 @2004 Lantronix Corporation. All Rights Reserved. Confidential Antenna Radiation Patterns An antenna radiation pattern is a 3-D plot of its radiation far from the source. Antenna radiation patterns usually take two forms, the elevation pattern and the azimuth pattern. Angle The elevation pattern is a graph of the energy radiated from the antenna looking at it from the side. Sometimes referred to as the vertical view. 19 @2004 Lantronix Corporation. All Rights Reserved. Confidential Sin2 Angle Antenna Radiation Patterns The azimuth pattern is a graph of the energy radiated from the antenna as if you were looking at it from directly above the antenna as illustrated. Sometimes referred to as the Horizontal view. 20 @2004 Lantronix Corporation. All Rights Reserved. Confidential Y Angle X Rubber Duck Omni Antenna 21 @2004 Lantronix Corporation. All Rights Reserved. Confidential Reflector Grid WLAN Antenna 22 @2004 Lantronix Corporation. All Rights Reserved. Confidential Antennas – Power Gain The perfect antenna is known as an Isotropic radiator – generates a perfect sphere of energy like light emitted from a light bulb. Isotropic radiators only exists in theory The Gain of an antenna is a ratio of the power input to the antenna to the radiated power output. The simplest antenna is a dipole antenna. Consists of 2 equal length pieces of wire that are at a length that is resonant to the desired frequency. Dipole antennas exhibit 2.1 dB of gain!!! The gain of an antenna is specified in dBi or dBd. dBi is the gain referenced to an isotrope. dBd is the gain referenced to a dipole. 23 @2004 Lantronix Corporation. All Rights Reserved. Confidential Antennas - Polarization Polarization is the orientation of electromagnetic waves far from the source. For Example - a simple dipole antenna produces a signal polarized in the same plane as the antenna. A vertically mounted dipole produces a vertically polarized signal. Ideally, the receiving antenna should be co-polarized with the transmitting antenna. A cross-polarized receiving antenna offers significant rejection of the transmitted signal. 24 @2004 Lantronix Corporation. All Rights Reserved. Confidential Types of Antennas Dipoles and Isotropes are common omnidirectional antennas. This means they generate a field 360 degrees around them. Yagi – is a common high gain directional antenna. Patch or panel – useful for their slim profile Dish or Parabolic – very high gain directional antenna 25 @2004 Lantronix Corporation. All Rights Reserved. Confidential Signal to Noise Ratio - SNR Defined as the ratio of a signal power to the noise power corrupting the signal 802.11 environments use this term slightly different. There it is used as “ the ratio of the power of the data signal to the power level of the noise floor”. In this case, noise refers to the background RF radiation present in the receiver's environment. Every environment has some noise; sources of interference, like cordless phones and Bluetooth, increase noise. Signal-to-Noise Ratio (SNR) compares peak signal strength to noise. An SNR of 22 dB or more is workable. The higher the SNR, the more stable and usable the WLAN network is. 26 @2004 Lantronix Corporation. All Rights Reserved. Confidential RF Interference - Multipath Multipath interference – occurs when the desired signal reaches the receiving antenna via multiple paths, each of which has a different propagation delay and path loss. Each of the received signals are summed at the receiving antenna Caused by reflections off objects in the environment or atmosphere. 27 @2004 Lantronix Corporation. All Rights Reserved. Confidential RF Interference - Fade Signal Fading is interference related to a time-varying change in the path loss of a link. The movement of objects in the radio path causes reflections which result in random variations in amplitude and the frequency of the received signal. Examples are – leaves blowing in the wind, rain and someone closing a door. Fade Margin – this is the amount of power in excess of what is needed to maintain a connection. Or, the amount by which a received signal level may be reduced without causing system performance to fall below a specified threshold value. The greater the fade margin, the more reliable the system will be under adverse propagation conditions. 28 @2004 Lantronix Corporation. All Rights Reserved. Confidential Antenna or Spatial Diversity Antenna diversity - a receiving station obtains two observations of the same signal sent from a transmitting station. The receiver will switch reception to the antenna currently receiving the stronger signal. For best results, the antennas are usually placed one wavelength apart. Only useful for receiving data. The use of antenna diversity can augment the wireless connection and minimize the effects of multipath interference. The Diversity Gain is the ratio of the signal field strength obtained by diversity to the signal strength obtained by a single path. Diversity gain is usually expressed in dB. 29 @2004 Lantronix Corporation. All Rights Reserved. Confidential Free Space Loss (FSL) Radio waves get weaker with distance The attenuation associated with distance in an unobstructed path is called Free Space Loss. FSL (in dB) is calculated by using the following formula: (20Log10 x freq. in Mhz) + (20Log10 x dist. in miles) + 36.6 For example - at 2.4 Ghz for 2 miles FSL = 20Log10 x 2,400 + 20Log10 x 2 + 36.6 = 110 dB The higher the frequency, the more attenuation will occur over a given distance. A 6 dB power change will double or halve the total distance. 30 @2004 Lantronix Corporation. All Rights Reserved. Confidential Free Space Loss at 2.4 Ghz FSL in dB 31 3 100 .6 201 .2 402 .3 804 .7 1 .6 km 3 .2 km 8 .0 5k 16. m 1k 40. m 25 80. km 5k m 50. 1 25. 2 12. 6 .1 3 .0 1 .5 Free Space Loss (FSL) 40 50 60 70 80 90 100 110 120 130 140 150 @2004 Lantronix Corporation. All Rights Reserved. Confidential Receiver Sensitivity Receiver Sensitivity is the lowest power level at which the receiver can detect an RF signal and demodulate data. Sensitivity is purely a receiver specification and is independent of the transmitter. Improving the sensitivity on the receiver (making it more negative) will allow the radio to detect weaker signals, and can increase the transmission range. Receiver Sensitivity is dependent upon transmission speeds! 32 @2004 Lantronix Corporation. All Rights Reserved. Confidential A Link Budget How many dBs of radio path loss can my Wireless link handle before communications deteriorates ? We can easily answer this once we have the following pieces of information: Radio transmit power (Ptx) Transmit antenna gain (Gtx) Receiver antenna gain (Grx) Diversity Gain (Gdv) Receiver Sensitivity (Srx) Fading Margin (M) Using the Formula: LB = Ptx + Gtx + Grx + Gdv – Srx - M 33 @2004 Lantronix Corporation. All Rights Reserved. Confidential A Link Budget Example - Downlink For example, suppose we have the following link. We are transmitting from a Orinocco AP-700 Access Point to a Lantronix WiPort at 11 Mbps. Here is the data: Transmit power = 24 dB Transmit antenna gain = 2.1 dBi Receiver antenna gain = 2.1 dBi Diversity Gain (Gdv) = 0 dBi Receiver Sensitivity = -82 dBm (of the WiPort) Fading Margin (M) = 20 dBm LB = 24 + 2 + 2 + 0 – (-82) – 20 = 90 dBm This means that the radio link can overcome 90 dB of attenuation and still work correctly 34 @2004 Lantronix Corporation. All Rights Reserved. Confidential A Link Budget Example - Uplink The next example, we have the return link (called the uplink). We are transmitting from a Lantronix WiPort to a Orinocco Access point at 11 Mbps. Here is the data: Transmit power = 14 dB Transmit antenna gain = 2.1 dBi Receiver antenna gain = 2.1 dBi Receiver Sensitivity = -84 dBm Diversity Gain (Gdv) = 2 dBm Fading Margin (M) = 20 dBm LB = 14 + 2 + 2 + 2 – (-84) – 20 = 84 dBm This means that the radio link can overcome 84 dB of attenuation and still work correctly. However, it is 6 dBm worse than the downlink and will only have a range of half as far. 35 @2004 Lantronix Corporation. All Rights Reserved. Confidential Analysis of Link Example This formula provides an estimate of performance. It allows you to compare competing solutions and estimate service coverage. This formula does not account for cable or connector losses. These can be significant and should be considered for real applications. You must calculate the link in both directions. Typically, an access point will have higher gain than a remote station adapter. The weaker link of the two, will be the limiting factor. In clear free space, the Down link example is good for around 314 meters. However, the uplink is good for only 157 meters. Which is what we should have expected – half the distance. These examples assume that there are no obstructions. If obstructions or interference exist (which is very likely), then the link margin will be less. 36 @2004 Lantronix Corporation. All Rights Reserved. Confidential Link Adjustments What can you do to get more link (or fade) margin? Since the IEEE- 802.11 and the FCC regulate the spectrum, you can not increase power output! You can shorten the distance or minimize interference / obstructions. Not Practical !!! You can use an antenna with more gain. This is a reasonable choice but it does require some paper work (and possible testing) with the FCC. The most practical solution is to increase Receiver sensitivity by selecting a slower transmission speed. Simpler modulation schemes provide better receiver sensitivity. 37 @2004 Lantronix Corporation. All Rights Reserved. Confidential Wireless Security 38 @2004 Lantronix Corporation. All Rights Reserved. Confidential Wireless Security Wireless security presents a challenge because anyone in ear shot range can potentially receive your data. There are 2 pieces to a secure WLAN connection. Encryption and Authentication = A Secure Environment Encryption is the scrambling of data prior to transmission Authentication determines if client radio is authorized to connect to the wireless network Both require additional processing power that can tax an embedded system Built-in security is a good option Large enterprise environments need a better way to handle Key management. 39 @2004 Lantronix Corporation. All Rights Reserved. Confidential Wired Equivalent Privacy - WEP Most WLANs in use today use WEP. WEP is vulnerable to attack for a number of reasons. WEP uses RC4 algorithm for encryption with a 40 bit or 104 bit key. The initialization vector (IV) is 24-bit. For authentication there is Open or Shared Key. Open is essentially no Authentication. With Shared Key, WEP is used for authentication. A four-way challenge-response handshake is used. It is possible to derive the keystream used for the handshake by capturing the challenge frames in Shared Key authentication. Both Authentication mechanisms are weak. In August 2001, Fluhrer, Mantin and Shamir published a cryptanalysis of WEP that explained how to recover the RC4 key after eavesdropping on the network in as little as one minute. 40 @2004 Lantronix Corporation. All Rights Reserved. Confidential WiFi Protected Access - WPA WPA was created in response to several serious weaknesses researchers had found in WEP. Intermediate solution until 802.11i was finalized. WPA supports 2 modes. A less secure "pre-shared key" (PSK) mode. Also supports an enterprise authentication mode that is designed for use with an 802.1x authentication server. Data is encrypted using the RC4 stream cipher, with a 128-bit key and a 48-bit initialization vector (IV). One major improvement in WPA over WEP is the Temporal Key Integrity Protocol (TKIP), which dynamically changes keys as the system is used. When combined with the much larger IV, this defeats the well-known key recovery attacks on WEP. By increasing the size of the keys and IVs, reducing the number of packets sent with related keys, and adding a secure message verification system, WPA makes breaking into a Wireless LAN far more difficult. 41 @2004 Lantronix Corporation. All Rights Reserved. Confidential IEEE802.11i / WPA2 Security WPA2 is the approved Wi-Fi Alliance interoperable implementation of 802.11i. WPA2 makes use of the Advanced Encryption Standard (AES) block cipher (referred to as CCMP); WEP and WPA use the RC4 stream cipher. Like WPA, WPA2 supports 2 modes. A pre-shared key mode (PSK), also known as personal mode and 802.1X for enterprise authentication. PSK mode is used in small networks that don’t require the complexity of an 802.1x authentication server. The key can be entered as 64 hex digits or as a pass phrase of 8 to 63 ASCII characters. PSK mode provides authentication via a pre-shared key, or password. 42 @2004 Lantronix Corporation. All Rights Reserved. Confidential IEEE802.11i / WPA2 Security Enterprise authentication mode uses the Extensible Authentication Protocol (EAP) and typically requires a RADIUS or other authentication server for strong authentication. 802.1X includes several different types of EAP protocols for enterprise security. EAP-TLS EAP-TTLS/MSCHAPv2 PEAPv0/EAP-MSCHAPv2 PEAPv1/EAP-GTC EAP-SIM LEAP is a Cisco protocol used in hospitals and other large enterprise applications. LEAP has exposed weaknesses and is not part of the 802.11i specification. 43 @2004 Lantronix Corporation. All Rights Reserved. Confidential Implementing a Wireless LAN Solution for an embedded device 44 @2004 Lantronix Corporation. All Rights Reserved. Confidential Implementing an 802.11B WLAN There are 3 options for implementing a WLAN interface for an embedded application. 1. The first option is to buy a chip set (usually 2 or more chips) and integrate the hardware and software into your existing application and uP. 2. The second option is to integrate a PCMCIA (PC Card) or a Compact Flash (CF) card with your existing uP and operating system. 3. The third option is to buy an off-the-shelf solution that is designed to integrate directly with your existing controller. 45 @2004 Lantronix Corporation. All Rights Reserved. Confidential Tradeoffs for the Chip set solution Advantages Can provide a cost effective solution for high volume applications Allows the most customizations of the network and radio Interface. Disadvantages Requires RF technical expertise to complete the hardware design Requires extensive software integration to interface to the existing uP. Requires complete FCC testing and approval before product can be released Time to Market – 14 to 18 months minimum. 46 @2004 Lantronix Corporation. All Rights Reserved. Confidential Implementing a CF or PC card design Must support the full CF or PC card interface here. 32 bit MicroController TCP/IP Stack CF or PC Card SW Driver +3.3 V and gnd 47 @2004 Lantronix Corporation. All Rights Reserved. Confidential CF or PC WLAN Card Tradeoffs for the PC Card / Compact Flash (CF) solution Advantages Makes sense if you are going to implement an OS that already supports that particular card Some cards offer higher output power Disadvantages Requires a fair amount of storage and processing on the host CPU. The embedded CPU must support a full TCP/IP stack. Requires software integration to interface to the existing Driver. In some cases the driver is hard to get. Can require extensive FCC testing and approval before product can be released Some or all of the encryption or key generation will be relegated to the host CPU Time to Market – 10 to 12 months minimum. 48 @2004 Lantronix Corporation. All Rights Reserved. Confidential Tradeoffs for the off-the-shelf solution Advantages Can easily integrate with existing uP firmware. Does not require any changes to existing firmware code if you are already using a serial interface. Design can be completed in 4 to 8 weeks (quick time to market). Does not require highly skilled RF HW and SW engineers on staff to implement. The OEMs FCC compliance can be leveraged to gain approval. In most cases it is only a paper work project if the design uses a 3 dBi antenna or less. Disadvantages Limited options to customize RF interface. 49 @2004 Lantronix Corporation. All Rights Reserved. Confidential Implementing an off-the-shelf solution 50 @2004 Lantronix Corporation. All Rights Reserved. Confidential Lantronix WLAN Modules - Advantages • MatchPort BG, MatchPort BG Pro & WiPort • Fast time to market. Wireless connectivity in as little as 60 days. Reduces project risk • Eliminates the need for RF & networking expertise • Frees up resources to focus on your application solution • Built-in WEP, WPA & WPA2 security. Support for PSK or full enterprise security. • Both Wire and Wireless in one module. POE options for wired Ethernet • Supports serial to WLAN or Ethernet bridging to WLAN. • Compact form factor • Future proof technology allows us to easily productize new Wireless devices 51 @2004 Lantronix Corporation. All Rights Reserved. Confidential WiPort Wireless Embedded Device Server • IEEE 802.11BG wireless radio • Capable of Wired or Wireless communications Serial to 802.11BG Serial to 10/100 Mbps Wired Ethernet Bridge 10/100 Mbps to 802.11BG • Built-in WEB Server. 1800 KB Flash Memory available for OEM WEB pages WPA & WEP & 802.11i PSK security • 2 High Speed Serial Ports (920 Kbps) • Up to 11 digital I/O Pins ModBus ASCII/TCP or RTU/TCP (optional) RS485 support included • Power 3.3 VDC @ 460 mA max • Operating Temperature of -40 to +70 C • FCC CFR47 part 15 Compliant 52 @2004 Lantronix Corporation. All Rights Reserved. Confidential WiBox – External Wireless Device Server External Wireless Device Server • IEEE 802.11bg wireless radio • Adhoc or Infrastructure modes • Supports bridging • 1800 KB Flash Memory available for OEM WEB pages • 2 High Speed Serial Ports (920 Kbps) • Port 1 – RS232 • Port 2 – RS232, RS422 or RS485 • Power 9 to 30 Vdc (2W max) • Operating Temperature of 0 to +60 C 53 @2004 Lantronix Corporation. All Rights Reserved. Confidential MatchPort BG Optimized 802.11 b/g Radio module • Capable of Wired or Wireless communications WEP, WPA & WPA2 PSK built-in security Serial to 802.11BG Serial to 10/100 Mbps Wired Ethernet Bridge 10/100 Mbps to 802.11BG Exclusive AES end-to-end encryption option 2 Serial ports - 921 Kbps Data Rate 802.11 Power Saving Radio Sleep Mode Options Web Server with Java Applet Support Operating Temperature of -40 to +70 C • FCC CFR47 part 15 Compliant Compact: 45mm x 45mm with 40-pin 2 mm Header 54 @2004 Lantronix Corporation. All Rights Reserved. Confidential MatchPort BG Pro Optimized 802.11 b/g Radio module • Capable of Wired or Wireless communications Serial to 802.11BG Serial to 10/100 Mbps Wired Ethernet Bridge 10/100 Mbps to 802.11BG WPA, WEP & 802.11i (AES-CCMP encryption) PSK WPA2 Enterprise/EAP Protocols • 2 Serial Ports (230 Kbps) • Up to 5 GPIO digital I/O Pins • Power 3.3 VDC @ 460 mA max • Operating Temperature of -40 to +70 C • FCC CFR47 part 15 Compliant On-board U.FL antenna cable connector Variety of available cables to meet customer needs Pin Compatible with all MatchPort 55 @2004 Lantronix Corporation. All Rights Reserved. Confidential Trouble shooting WLAN NetStumbler – a useful tool for pinpointing details of a wireless network, helping you configure, secure, optimize and discover. http://www.netstumbler.com/ Ethereal/Wireshark – Very useful for troubleshooting Ethernet and 802.11bg networks. http://www.wireshark.org/ Airsnort - a wireless LAN (WLAN) tool which recovers encryption keys. Passively monitors transmissions, computing the encryption key when enough packets have been gathered. Fluke – hand-held tools for WLAN analysis. 56 @2004 Lantronix Corporation. All Rights Reserved. Confidential Network Diagnostic Utilities IPCONFIG – Shows the entire TCP/IP configuration present in a host computer Type in: C:\IPCONFIG PING – Test connectivity across the network and confirm that an IP address is reachable Type in: C:\PING <ip address> ARP (ARP.EXE) – Used to display the ARP cache which holds the IP to MAC address translation Type in: C:\ARP –a to see ARP cache 57 @2004 Lantronix Corporation. All Rights Reserved. Confidential References for Wireless Networking Implementing 802.11, 802.16 and 802.20 Wireless Networks, Ron Olexa. Elsevier Communications Engineering Series 802.11 Wireless LAN Fundamentals, Pejman Roshan, Jonathon Leary. Cisco Press. 802.11 Wireless Networks – The definitive Guide. Matthew S. Gast. O’Reilly “You believe you understand what you think I said…” Joshua Bardell 58 @2004 Lantronix Corporation. All Rights Reserved. Confidential Thank you… Questions?? @2004 Lantronix Corporation. All Rights Reserved. Confidential
© Copyright 2024