
Let’s explore..
802.11ax – Uplink and Downlink Operations
Wifi 6 enhances the 802.11ac technology by improving the Network Efficiency with higher data rates. Here are the key features which 802.11ax provides over 802.11c. Let’s dive in a little – Parameters802.11ac802.11axSpectrumNo Support for 2.4 GHz Supports 5GHz only Supports 2.4 GHzSupports 5 GHzSupports 6 GHz (extended)Bandwidth20 MHz, 40 MHz, 80 MHz, 160 MHz20 MHz,…
802.11k – Radio Resource Management
The 802.11k protocol provides mechanisms for APs and clients to dynamically measure the available radio resources by sending neighbor reports, beacon reports, and link measurement reports to each other. This allows the APs and clients to understand the RF environment and helps the client to take improved roaming decisions. Neighbor Report Request/ResponseNeighbor Requests are sent…
Block Acknowledgement
Block acknowledgement (BA) was initially defined in IEEE 802.11e as an optional scheme to improve the MAC efficiency. 802.11n amendment ratified in 2009 enhances this BA mechanism then made it as mandatory to support by all 802.11n-capable devices. The Originator which intends to use Block Ack Mechanism, should first check if the recipient station is capable of participating in Block…
WPA3-Personal (SAE)
Simultaneous Authentication of Equals (SAE) is a new Pre Shared Key (PSK) based authentication introduced in IEEE 802.11-2016 specification that intends to replace the less secure WPA2-PSK authentication. Why SAE over PSK ? With Pre Shared Key, the chances of offline dictionary attacks are more where an attack can be performed by obtaining a ciphertext generated…
802.11N Features
IEEE 802.11n is an amendment to the IEEE 802.11-2007 wireless networking standard to improve network throughput over the two previous standards — 802.11a and 802.11g — with a significant increase in the maximum raw data rate from 54 Mbit/s to 600 Mbit/s with the use of four spatial streams at a channel width of 40 MHz.…
Opportunistic Wireless Encryption (OWE)
What is OWE and why do we need it ? In few past years, we have heard of a lot of situations in which the Open and WPA2 pre-shared key networks were cyber attacked and easily compromised. Coffee shops, restaurants and many other public venues still use captive portal which in majority is open SSID’s,…
802.11r – Fast BSS Transition (FT)
IEEE 802.11r was published in 2008 and was aiming for faster and secure handoff’s within the service set. It is also known as Fast Basic Service Set Transition (Fast BSS Set Transition) Key items involved when we talk about FT, Mobility Domain : Mobility Domain (MD) is a set of basic service sets (BSS) with…
802.11ax – Explicit Beamforming (TxBF)
As we know, that Omnidirectional antennas will send out signals in all directions, but it’s important to increase the efficiency of the signal transmission by keeping them focussed where it’s needed. The coherent way to doing this is by using beamforming, which directs the energy towards the users by making use of sounding signal, channel…
Details on Cryptography
What is cryptography ? Cryptography is the study of securing communications from those for who intend to read and possibly misuse the sensitive content of the communication. Encryption algorithms are used to encrypt the data by taking the original message, or plaintext, and converts it into cipher-text, which is not understandable. There are five primary functions of…
Transmit beamforming (Implicit feedback)
Before we start, few terms that we need to be clear with: MIMO channel sounding : In many cases, it is required to obtain a full characterization that details the measurement of the MIMO channel.It requires the transmission of sufficient number of High Throughput Long Training Fields (HT-LTFs) to sound the full dimensionality of the…
Loading…
Something went wrong. Please refresh the page and/or try again.