All you wanted to know about testing Wi-Fi adapters, but were afraid to ask

All you wanted to know about testing Wi-Fi adapters, but were afraid to ask
 
 
One of these days our company will be 20 years old. The last 15 years of these 20 we are making programs for the analysis of Wi-Fi networks. Part of this work is the development of drivers for Wi-Fi adapters, and in this article I will describe how the development team is testing the products of its work, and how the testing process has evolved over these 15 years along with the evolution of standards and adapters. There will be many pictures (what is called "geek porn") and technical details.
 
Bplus Technology , which, among a large assortment of very interesting ...
+ 0 -

"Expanding Borders": the 6 GHz band will be supplied to Wi-Fi

Federal Communications Commission ( .FCC ) considers option with the extension of the frequency range used by Wi-Fi networks. It is proposed to allocate 6 GHz to wireless networks.
 
 
Under the cut - the reasons for this decision and the reaction of the community.
 
 
"Expanding Borders": the 6 GHz band will be supplied to Wi-Fi
 
/Flick / Terry Ross / CC
 
 

Why expand the frequency spectrum of


 
Now for the operation ...[/h]
+ 0 -

Just about complicated. Part ? we continue to create a wireless "smart home". Based on Z-Wave technology and MajorDoMo

Just about complicated. Part ? we continue to create a wireless "smart home". Based on Z-Wave technology and MajorDoMosoftware.  In this article we continue the first steps to create our wireless "Smart House" based on technologies and the protocol for open source. For example, the connection of a single device working on Z-Wave technology: smart socket FIBARO Wall Plug Z-Wave (FGWPF-102_ZW5).  The choice is made for the following reason: the device has several functions: it works as a relay and a switch, you can turn on /off both on demand and on schedule, the meter of the power currently consumed, the electricity meter for a certain period of time.  In this part of the manual there will be quite a lot of pictures ...
+ 0 -

Vulnerability in various Bluetooth implementations

Vulnerability in various Bluetooth implementationsThe disadvantage of the Bluetooth protocol has been ignored for more than a decade, but the thunder still broke out. Test your devices!
 
 
Israeli scientists Eli Biham Lior and Newman discovered a serious cryptographic vulnerability in the Bluetooth standard specification. The flaw allows an attacker to attack " Man in the middle of " To intercept and substitute encryption keys during the connection between two devices. The problem is related to the lack of verification of the security parameters and affects the implementation of the protocol in the device drivers of vendors such as Apple...
+ 0 -

Tasting the Seagull. In the arsenal of radio hacker

Tasting the Seagull. In the arsenal of radio hacker
 
Here it is like this, all your life you study, you work, you think you are such a peppercorn, salt of the earth, and then you understand
 
It was so, I planned system of jamming navigation , made fee for her. I write, honestly, without guile, say, the synchronization input is, you can send there the signal of the exact PPS time and do the measurements.
 
And then it dawned on me: if there is no navigation, then there is no exact time either! (Here I also remembered old Munchausen, who also wanted to pull himself out by the hair from the water). Almost everything today, including me, still does ...
+ 0 -

5G AGAINST WI-FI: WAITING AND REALITY

5G AGAINST WI-FI: WAITING AND REALITY  
 
Recently, the issue of the future of Wi-Fi networks in connection with the expected mass construction of fifth-generation cellular networks is increasingly being discussed. Indeed, why do we need Wi-Fi in a world where cellular networks provide billions of people with high-speed Internet access? Will the family of Wi-Fi standards stop with the arrival of 5G? Will technology leave the market, having completed its "historic mission"? Everyone who answered these questions in the affirmative is devoted to this article. We hope that all the others who understand network technology will also find it interesting ...
+ 0 -

How to make friends of all operators in the stadium and not sow it with hundreds of

How to make friends of all operators in the stadium and not sow it with hundreds ofantennas.The FIFA World Cup has already begun, and in this regard, in several arenas of the championship, we deployed our new infrastructure. One of the arenas - "St. Petersburg", home stadium FC "Zenith". In this post we will talk about how the connection is made on one of the main venues of the tournament, where we hide the antennas, and why our engineers go four thousand steps before each match (if not more often).     material on how to monitor the mobile network in Moscow ...
+ 0 -

Influence of signal frequency on the energy of radio links in free space

Influence of signal frequency on the energy of radio links in free spaceWhat changes when the applied frequency band is changed in radio communication is not always correctly formulated even by experienced radio amateurs. On the one hand, the formula for transferring Friis is extremely simple, and there seems to be nothing to discuss. On the other hand, in this formula, in addition to explicitly mentioning the wavelength λ, it is implicitly hidden in other coefficients. There are many statements, notes and articles, that with higher frequencies the power of radio links is worse, there are no less articles of "myth exposures" - saying that there is nothing worse than ...
+ 0 -

Sochi.Kamera: the features of creating a project in general, completely, completely from scratch, without standards and already implemented examples

Sochi.Kamera: the features of creating a project in general, completely, completely from scratch, without standards and already implemented examples Sochi.Camera - A site with broadcast of streams from more than 300 web cameras installed in Sochi and its environs. The site and the entire service is non-commercial, created and maintained on its own funds by a local ISP "Business Communication" , already almost 10 years. In this post we will describe how to code from absolute zero; about the battle with YouTube (we won); why free software is bad, and free video streaming service is good. Perhaps in the future, when they turn to us with another proposal - write for 100-200 thousand rubles. the same service as Sochi.Camera, we instead ...
+ 0 -

Notes IoT-provider. Activation and security in LoraWAN

Notes IoT-provider. Activation and security in LoraWANHello, dear fans of the Internet Things. Continuation of IoT-provider's notes.
 
The first part of > || > The second part is > || > The third part is > || > The fourth part is
 
Today it's time to talk about security in LoRaWAN. There are many rumors and legends. We will try to understand how this works and what the risks are.
 
In general, to move to the topic of security, you'll have to do a little introductory and talk about the initial initialization of the radomodule on the network. This process in LoRaWAN is called activation.
 
For brevity, I will list below the list of terms ...
+ 0 -