
Explore our World of Wireless
Image from https://www.electronicproducts.com/iot-bandwidth-requirements-overtaking-internet-in-space-schemes/#
Latest Posts
- Point-to-Point Mesh Link via Aruba AP-387Aruba AP-387 with integrated antenna has been specially designed for Point to point connectivity across a max. distance of 400 meters. This AP uses 60 GHz 11ad radio bonded with 5 GHz radio for the mesh link connectivity. During harsh weather conditions, it fails back from 11ad to 5GHz radio. AP-387 is recommended to work with PoE+; instead of PoE. However, it will still workContinue reading “Point-to-Point Mesh Link via Aruba AP-387”
- Overview of Private LTE in CBRSAnother interesting cellular technology that is gaining focus is the use of private LTE/private 5G in CBRS (Citizen Broadband Radio Service) spectrum by enterprises. It is an alternate wireless solution to the existing 802.11 Wi-Fi. CBRS is an unlicensed frequency spectrum (known by band 48) from 3550 to 3700 MHz that is currently approved by FCC in US. This is shared among 3 tiers withContinue reading “Overview of Private LTE in CBRS”
- Implementation of WPA3-PersonalWPA3-Personal (or WPA3-SAE) can be implemented in two modes: WPA3-SAE-transition mode that allows both WPA2 and WPA3 devices to use the same passphrase to connect to the wireless network. PMF is only optional in this case to allow the WPA2 clients to connect. However, PMF is mandatory in WPA3-SAE mode and is required for all 802.11ax to support this mode. In WPA3-SAE mode, even ifContinue reading “Implementation of WPA3-Personal”
- OWE (Opportunistic Wireless Encryption)This is another Wi-Fi security standard that has been introduced to prevent passive eavesdropping especially in public spaces that uses open authentication. OWE capable client device is unaware of the security procedure that is implemented in the background. OWE uses embedded DF key exchange during the association to generate PMK, followed by 4-way handshake. End to end security is not implemented in OWE where theContinue reading “OWE (Opportunistic Wireless Encryption)”
- Replacement of Faulty MSM775 Wireless ModuleHPE has stopped manufacturing these wireless modules . However, there are still customer enterprises who continue to rely on this wireless product. Online articles are limited. Our setup has two MSM775 modules in a team where the primary module acting as the team manager had gone bad and we will replace the faulty module with the new one. Step 1– Make the interim team managerContinue reading “Replacement of Faulty MSM775 Wireless Module”
- RF CalculationsRF measurements are performed in dB (decibels )and not in mW since it is difficult to perform calculations on smaller mW values of wireless power. Due to this reason, change in RF power is expressed as logarithmic functions of power values. dBi – measurement of antenna gain relative to theoretical isotropic antenna gain dBd – measurement of antenna gain relative to the dipole antenna gainContinue reading “RF Calculations”
- 802.11e802.11e defines EDCA (Enhanced Distributed Channel Access) mechanism for medium access for QoS frames and WMM is a Wi-Fi Alliance certification that verifies if an 802.11 station implements EDCA as stated in the protocol. It is important to give more priority for medium access to high priority traffic like Voice and Video; unlike DCF where same priority is given for all kinds of frames. SinceContinue reading “802.11e”
- Chapter 7: Power Save MechanismsWhenever, a Wi-Fi station intends to sleep, it will set the power management bit of the last frame that it is transmitting to 1. This indicates to the AP the client station’s intention to sleep and AP will start buffering the data for the client. AP includes Association IDs of all the associated stations in the TIM field of it’s beacon frame that has dataContinue reading “Chapter 7: Power Save Mechanisms”
- Understanding SSL HandshakeSSL involves two main functions: encryption and authentication of the certificate. Encryption is a part of data confidentiality and authentication is important for the identification of the source of data. SSL requires the use of a server certificate that is issued by a trusted CA. Certificate Basics A certificate is an important component for SSL communication that is issued by the Certificate Authority (CA) onceContinue reading “Understanding SSL Handshake”