Sunday, 22 December 2013

Steps of RF Optimization

What ar the steps of RF Optimization?
The major steps utilized in RF optimisation ar preparation, knowledge assortment, knowledge analysis, and modification and realization.
1.Preparation of RF optimisation
First of all build the target of the optimisation KPI , divide the sites in clusters, build the a glance at} route, and collect tools and prepare documents for the RF optimisation able to positive the} swish operation of RF optimisation.
Ø Prepare the optimisation objective
Make the optimisation objective of the RF-related KPI indexes,including the coverage quantitative relation, soft football play quantitative relation, and pilot pollution quantitative relation,which compose the network optimisation acceptance indexes.
Ø Divide web site in clusters
Divide the sites into totally different cluster. usually the sites settled in same neighborhood ar classified in {an exceedingly|in a very} same cluster.Perform the cooccurring RF optimisation for a gaggle {of {site|website|web web site}s|of net sites|of websites} rather than one site. The cooccurring RF optimisation for a gaggle {of sites|of net sites|of websites} ensures that co-frequency interference between adjacent cells is taken into account within the network optimisation.
Ø verify the DT route
Before beginning a Drive a glance at}, the DT route is created for confirming whether or not the Network meets acceptance KPIs necessities. If the DT route for network acceptance is already scheduled , make {sure that} the scheduled route contains the route for confirming whether or not the network meets acceptance KPIs necessities.
2. knowledge assortment
Collect the MS/AT knowledge by the Drive a glance at}, indoor a glance at}, and sign tracing, and verify that the KPI necessities ar met supported the decision tracing knowledge and configuration knowledge of the BSC or access network (AN). This knowledge is additionally used for knowledge analysis. 
Ø Drive a glance at}
During network readying, network optimisation is usually performed underneath the blank condition of the network. Perform voice service or knowledge service tests for the network within the consistent with the service varieties within the network designing space. Use DT tools to gather the radio signals for analyzing the outside signal coverage, handoff, and pilot pollution issues.
After the communication network is place into operation, the network load additionally be|is also} significant. Hence, network tests within the loaded condition ar needed. once finishing the network optimisation within the blank condition, perform a a glance at} to verify that the standard of the network within the loaded condition meets the wants. the info assortment for the network within the loaded condition is analogous thereto for the network within the blank condition.
Ø Indoor a glance at}
The services to be a glance at}ed by the indoor check should be provided within the seamless coverage network consistent with the contract (for the business office) or designing report (for the trial office). the tactic of indoor a glance at} is that the same as that of the DT. an enclosed a glance at} is performed to check the signal coverage within the indoor coverage areas (such as in building, grocery, and underground train), important places (such as gymnasium and governmental offices), and a few special a glance at} areas (such as vital person|VIP|high-up|dignitary|panjandrum|high muckamuck|important person|influential person|personage} areas) to get, analyze, and solve RF issues.
Ø BSC Configuration knowledge assortment
Before and through RF optimisation, collect the configuration knowledge concerning the adjacent cells for network optimisation and collect extra configuration knowledge from BSC. Then, check whether or not the prevailing configuration knowledge is per the previous knowledge record and {therefore the|and additionally the} designing knowledge.
3.Data Analysis
Find out the issues of the network, specialize in the coverage, pilot pollution, and football play issues, and take corresponding modification measures.
Ø Coverage Analysis
that specialize in signal distribution, the coverage analysis could be a key task of RF optimisation. The coverage analysis includes the dominant cell analysis, downlink coverage analysis, and transmission coverage analysis.
ü No signal or poor signal coverage
If no signal is detected in {an exceedingly|in a very} cell consistent with the DT, the BTS could haven't any transmit power or the antennas additionally be|is also} blocked throughout the a glance at}.
ü Cross-cell coverage
If the signals from a cell may be received within the close cells, the Coverage of this cell is {just too|is merely too} wide.The cross-cell coverage additionally be|is also} caused by improper web site height or improper settings of antenna tilt angles. The cross-cell coverage cells interfere with adjacent cells. and {therefore the|and additionally the} interference causes the decrease of system capability. in a position to} increase the antenna angle or lower the antenna height to resolve the cross-cell coverage downside. whereas determination the cross-cell coverage downside, avoid the existence of no signal coverage space.
ü No-dominant cell space
The no-dominant-cell space refers to the realm that has no dominant cell or the dominant cell changes oftentimes. No dominant cell ends up in frequent handoffs, reduces the system potency, and will increase the decision drop quantitative relation.You can modify the antenna angle and AZ, enhance the coverage of a powerful signal cell (or the near cell), and cut back the coverage of alternative weak signal cells (or the remote cells) to resolve the no dominant cell downside.
ü Downlink coverage analysis
Analyze pilot signal strength and Rx power collected by the DT. If the pilot signal Rx power is smaller than the thresholds, downlink coverage issues could exist. Mark the realm while not signal coverage within the downlink and analyze the gap between the realm and adjacent BTSs. Analyze the close surroundings of the realm and check whether or not the distribution of Rxs in adjacent sites is traditional. once the analysis, in a position to} decide whether or not the downlink coverage may be improved by modifying antenna angle and AZ. Check whether or not a replacement new} space while not signal coverage exists once the coverage downside of a no signal coverage space is resolved by modifying the antenna. If the antenna modification cannot solve the issues concerning no signal coverage areas, add ton of} sites.
ü transmission coverage analysis
Analyze Texas power collected by the DT.If the Texas is on {top of|over|more than|beyond} the edge, transmission coverage issues could exist. Mark the areaswithout transmission coverage and check whether or not downlink coverage is additionally unprocurable in thoseareas. once each transmission and downlink coverage is poor, the downlink coverage issuestake precedence over the transmission coverage issues. If solely transmission coverage is poor, youcan solve the matter by eliminating the impact of transmission interference, modifying theantenna AZ and angle, or adding the tower mounted electronic equipment (TMA).
Ø Interference Analysis
The interference analysis includes the transmission interference analysis and downlink interference analysis. The interference affects the cell capability and even ends up in the decision drops and access failures.
ü Downlink interference analysis
Analyze the pilot strength Ec/Io collected by the DT.If the Ec/Io is not up to the edge, transmission interference could exist. Mark the areas withpoor Ec/Io and check whether or not downlink Rx coverage is unprocurable in these areas. If downlink Rx coverage is poor, the coverage downside exits. Analyze the causes and so solve the matter. If Rx coverage is nice however the Ec/Io worth is smaller than the edge, downlink interference exists. Analyze the interference causes and so solve the matter.
Perform the subsequent steps to investigate pilot pollution:
1. ensure the pilot pollution areas.
2. Analyze that cells cause the pilot pollution within the stress space.
3. Analyze the Rx and {therefore the|and additionally the} Ec/Io distribution within the cells associated with pilot pollution. Confirm
the cells wherever the coverage has to be reduced or improved, and supply solutions to the
pilot pollution.
Ø football play Analysis
In RF optimisation, closeness optimisation and soft football play quantitative relation management involve handoffs. By modifying RF parameters, in a position to} management the scale and {therefore the|and additionally the} position of the football play space to cut back decision drops because of dramatic signal modification. This improves the football play success quantitative relation.
The optimisation of the adjacent cell list concentrates on the missing configuration of adjacent cells. Use Nastar to ascertain the neighbor cell info and provides suggestions concerning adding, removing, or keeping neighbor cells for every cell.
optimisation of sentimental football play quantitative relation too high soft football play quantitative relation wastes system resources and reduces system capability. throughout RF optimisation, positive the} cowl rage,and management the soft football play quantitative relation inside a suitable vary. in a position to} cut back or changethe soft football play region by increasing the lean angle, modifying the AZ, lowering the antenna, or reducing pilot power.

Call Drops in CDMA

Reasons for decision Drops in CDMA System
The following will be reason for the born decision in CDMA:
In the Forward Link:
1) Improper setting for the overhead channel power level and also the traffic channel power thresholds.
2) Improper hand off parameter setting.
3) Removing the pilot from the active set by the candidate set before the replacement.
4) Pilot is just too weak to lock the code pursuit loop.
5) Distortion of the forward signal by the facility electronic equipment.
6) Improper management of the forward channel power.
7) High Frame Error Rate (FER), poor pilot, or poor RSSI.
within the Reverse Link:
1) Improper setting of the access parameters, improper setting of the open loop power management, or improper setting of the reverse link Eb/No threshold price.
2) variety of communication conditions cause the system to revert to the system determination state of the initiated system setting.
3) Maximized French telephone power and poor link quality.
4) Unsuitable pilot throughout the hand off operation.
5) Poor performance of the forward link power management channel.
6) Link imbalance.
7) High FER, frequent amendment within the transmit gain, and high transmit power.
Possible software package issues inflicting the decision Drop/Failure:
1) associate degree updated neighbor list wasn't received. once a triple-crown inter-MSC laborious hand off, a message carrying associate degree updated neighbor list of the target cell should be received—if the list isn't received, a decision drop happens. In accordance with this embodiment, this drawback is resolved by applying a supplementary package to the BTS software package (i.e., change the software) to forestall decision drops owing to this condition.
2) The guard timer isn't properly operating. once a triple-crown forward channel inter-MSC laborious hand off, the time till the associated reverse channel inter-MSC laborious hand off happens is restricted so as to forestall the ping reek phenomena. In accordance with this embodiment, once analyzing the message, if the above-noted time is shorter than a planned price (e.g., 5 seconds), a supplementary package is applied.
3) associate degree improper message is received whereas acting the laboriousHandOver. In accordance with this embodiment, associate degree improper message of this kind is indicative of a mobile station drawback or a software package drawback, whereat acceptable corrective measures square measure taken.
4) once acting the laborious hand off, the decision isn't sounding and so the decision is born. In accordance with this embodiment, this condition is set to be a mobile station drawback, whereat corrective action is effectuated.
Environmental drawback inflicting decision Drop/Failure
The reason behind the decision drop/failure is also associate degree RF environmental drawback, e.g., excessive path loss or delay unfold, which ends in low signal strength within the inter-MSC hand off space. once acting laborious hand off underneath the condition of a previous signal from the serving cell, the serving cell signal bit by bit worsens as a result of the mobile station is moving towards the target cell. during this state of affairs, if the mobile station fails to receive the signal provided by the serving cell BTS, the laborious hand off towards the target cell can't be performed, and since the FER will increase, the decision is born. In accordance with the embodiment, this condition is remedied by adjusting the transmitpower from BTS in the direction of antena or vice versa. The optimized signal strength (Ec/Io) within the service cell of the inter-MSC laborious hand off is -10˜-7 d

GSM Network & RF optimisation

GSM Network & RF optimisation
1. GSM Network RF optimisation glowing Technologies Proprietary Use consistent to Company directions - All Rights Reservedde No.1 glowing Technologies RF optimisation Workshop Macro Cell glowing Technologies - Proprietary small Cells
2. AGENDAAGENDA IntroductionIntroduction Single Band optimisation PhilosophySingle Band optimisation Philosophy Network optimisation methodNetwork optimisation Process optimisation PhasesOptimization Phases glowing BSS optimisation ParametersLucent BSS optimisation Parameters Cell Selection/ Cell ReselectionCell Selection/ Cell Reselection glowing Technologies Proprietary Use consistent to Company directions - All Rights Reservedde No.2 glowing Technologies Power managementPower Control –– ProceduresProcedures HandoverHandover –– ProceduresProcedures Drive take a look ating and AnalysisDrive Testing and Analysis Drive equipmentDrive Test instrumentality Single Band optimisation PhilosophySingle Band optimisation Philosophy Network optimisation methodNetwork optimisation Process glowing BSS optimisation ParametersLucent BSS optimisation Parameters Cell Selection/ Cell ReselectionCell Selection/ Cell Reselection glowing Technologies - Proprietary
3. IntroductionIntroduction what's optimisation ? - Activity of achieving and maintaining the desired quality as designed glowing Technologies Proprietary Use consistent to Company directions - All Rights Reservedde No.3 glowing Technologies Why optimisation ? - Deviations between set up and reality Activity of achieving and maintaining the desired glowing Technologies - Proprietary Deviations between set up and reality
4. what's optimisation ?What is optimisation ? style glowing Technologies Proprietary Use consistent to Company directions - All Rights Reservedde No.4 glowing Technologies optimisation Implementation what's optimisation ?What is optimisation ? style glowing Technologies - Proprietary coming up with Implementation
5. Why optimisation ?Why optimisation ? • quality of radio coming up with - applied mathematics variations within the path loss characteristics - Finite parcel of land information resolution • Implementation - Antenna graph and effective radiated power glowing Technologies Proprietary Use consistent to Company directions - All Rights Reservedde No.5 glowing Technologies - Antenna graph and effective radiated power - Antenna pattern distortion • setting - seasonal environmental changes, e.g trees, leaves - Environmental changes like new highways, new buildings quality of radio coming up with applied mathematics variations within the path loss characteristics Finite parcel of land information resolution Antenna graph and effective radiated power glowing Technologies - Proprietary Antenna graph and effective radiated power seasonal environmental changes, e.g trees, leaves Environmental changes like new highways, new buildings
6. Single Band optimisation PhilosophySingle Band optimisation Philosophy Coverage - sensible amplitude across the full cell, coverage holes at intervals a cells topographic point should be reduced. Interference - an inexpensive level of interference should be contained at cells topographic point so as to produce a top quality air glowing Technologies Proprietary Use consistent to Company directions - All Rights Reservedde No.6 glowing Technologies topographic point so as to produce a top quality air relinquishment Behavior - the standard of the air to relinquishment behavior is nice, no excess handovers, Rxquality at acceptable level, BTS & MS use minimum transmit power. Traffic Distribution - the standard of the air to traffic distribution is nice, most quantity of traffic may be bimanual. Single Band optimisation PhilosophySingle Band optimisation Philosophy sensible amplitude across the full cell, coverage holes at intervals a cells topographic point should be reduced. an inexpensive level of interference should be contained at cells topographic point so as to produce a top quality air-interface. glowing Technologies - Proprietary topographic point so as to produce a top quality air-interface. the standard of the air-interface during a cell with relevancy relinquishment behavior is nice, no excess handovers, Rxquality at acceptable level, BTS & MS use minimum transmit power. the standard of the air-interface during a cell with relevancy traffic distribution is nice, most quantity of traffic may be bimanual.
7. optimisation PhasesOptimization Phases Initial optimisation Primary optimisation c •Site Audit •Proper Parameters use •Verify Neighbors list •Reviewing Frequency set up •Verify existing coverage, website style objectives •Analysis & Identification of downside areas/cells •from PMS & drive take a look at statistics, •customer complaints glowing Technologies Proprietary Use consistent to Company directions - All Rights Reservedde No.7 glowing Technologies Primary optimisation Maintenance optimisation c •customer complaints •Prioritization of issues •Identify answer and Implement •Retest the matter areas •Consistency Check of the OMC information •Fine-tuning of parameters •On going method, weekly optimisation • information maintenance and consistency audits correct Parameters use Verify Neighbors list Reviewing Frequency set up Verify existing coverage, website style objectives Analysis & Identification of downside areas/cells from PMS & drive take a look at statistics, client complaints glowing Technologies - Proprietary client complaints Prioritization of issues determine answer and Implement Retest the matter areas Consistency Check of the OMC information calibration of parameters On going method, weekly optimisation information maintenance and consistency audits
8. BSSBSS parameters associated with optimisationparameters associated with Optimization CELL (RE) choice POWER management glowing Technologies Proprietary Use consistent to Company directions - All Rights Reservedde No.8 glowing Technologies relinquishment management parameters associated with optimisationparameters associated with Optimization glowing Technologies - Proprietary
9. BSSBSS parameters associated with optimisationparameters associated with Optimization Areas of improvement : reduction of interference glowing Technologies Proprietary Use consistent to Company directions - All Rights Reservedde No.9 glowing Technologies reduction of interference relinquishment behavior improvement Traffic distribution parameters associated with optimisationparameters associated with Optimization Areas of improvement : reduction of interference glowing Technologies - Proprietary reduction of interference relinquishment behavior improvement
10. Cell (Re)SelectionCell (Re)Selection ? glowing Technologies Proprietary Use consistent to Company directions - All Rights Reservede No.10 glowing Technologies ? two cell (re)selection criteria: C1 & C2 glowing Technologies - Proprietary
11. Cell (Re)SelectionCell (Re)Selection C1 Criteria Used for cell choice and re glowing Technologies Proprietary Use consistent to Company directions - All Rights Reservede No.11 glowing Technologies C2 Criteria employed in a hierarchicalhierarchical choice solely Used for cell choice and re-selection glowing Technologies - Proprietary hierarchicalhierarchical cell structure for re-
12. Cell (Re)SelectionCell (Re)Selection C1 = (A- where: A = Received Level Average B = MS_TXPWR_MAX_CCH glowing Technologies Proprietary Use consistent to Company directions - All Rights Reservede No.12 glowing Technologies B = MS_TXPWR_MAX_CCH Criteria met if C1> zero. MS can camp on to the cell with the best C1 value. -Max(B,0)) = Received Level Average - RXLEV_ACCESS_MIN = MS_TXPWR_MAX_CCH - easy lay.output power of the MS glowing Technologies - Proprietary = MS_TXPWR_MAX_CCH - easy lay.output power of the MS Criteria met if C1> zero. MS will camp on to the cell with the highest
13. Cell Reselect physical phenomenonCell Reselect Hysteresis animal product one glowing Technologies Proprietary Use consistent to Company directions - All Rights Reservede No.13 glowing Technologies Cell Reselect physical phenomenonCell Reselect Hysteresis animal product two Location Update one Location Update two glowing Technologies - Proprietary
14. Cell Reselect physical phenomenonCell Reselect Hysteresis animal product one glowing Technologies Proprietary Use consistent to Company directions - All Rights Reservede No.14 glowing Technologies Cell Reselect physical phenomenonCell Reselect physical phenomenon animal product two Reselect physical phenomenon animal product Reselect Hysteresis animal product glowing Technologies - Proprietary
15. Power managementPower Control amplitude vary (in dBm) zero one two three Rxlevel < -110 < Rxlevel < -109 < Rxlevel < glowing Technologies Proprietary Use consistent to Company directions - All Rights Reservede No.15 glowing Technologies three .. .. .. .. .. sixty two sixty three -108 < Rxlevel < -49 < Rxlevel < Rxlevel > SIGNAL LEVELSSIGNAL LEVELS vary (in dBm) Rxlevel < -110 one hundred ten < Rxlevel < -109 109 < Rxlevel < -108 glowing Technologies - Proprietary 108 < Rxlevel < -107 .. .. .. .. .. forty nine < Rxlevel < -48 Rxlevel > -48 SIGNAL LEVELSSIGNAL LEVELS

Mobile Information Crunch

The technologies which will save US from the “mobile information crunch”
It’s arduous to believe that it’s been but 5 years since Apple introduced the App Store, launching a multi-billion greenback business around content and services for mobile devices. Since then mobile apps have helped propel smartphone sales through the layer, with shipments topping 720 million units last year. meantime NPD predicts 2013 might be the year tablets outsell notebooks.
Correspondingly T-Mobile has aforesaid that smartphone users area unit intense the maximum amount as thirty times a lot of information than simply many years past, which craving grows every year. Cisco estimates that international mobile information traffic is almost doubling every year and can grow 13-fold within the next five years. As that growth comes at larger and bigger scale, network operators area unit finding themselves at overcapacity. whereas the FCC is exploring ways that to create a lot of spectrum offered, there's merely not enough to travel around within the short term, and it’s solely progressing to intensify.
This “mobile information crunch,” as we tend to at artificer (and others) seek advice from it, offers one in all the simplest investment opportunities there has ever been around medium infrastructure. Here’s a glance at many key sectors we tend to believe can expertise outsize growth, and area unit finance consequently. (Disclosure: artificer has investments in or a relationship with 2 of the businesses mentioned during this piece; see below for those disclosures.)
New cell website technology
So if a lot of spectrum isn’t offered, however will carriers get a lot of capability out of existing airwaves? several area unit wanting to feature new cell sites, as cellular spectrum may be “reused” at multiple locations if there's enough separation between sites. Carriers area unit terribly excited regarding moving to a “HetNet,” which is able to incorporate thousands of tiny cells – or powerless radio access nodes that offer constant practicality as a bigger tower for atiny low region. The HetNet can build the network immensely a lot of complicated, with the little cells adding thousands a lot of points of interference which will have to be compelled to be managed.
Companies like Ubiquisys area unit building intelligent software package for tiny cells to create them a lot of manageable among the Radio Access Network (RAN). tiny cells conjointly introduce complications with backhaul (that is, returning the signal to the core network). For all of their flexibility, {they area unit|they're} usually placed in locations wherever ancient ways of backhaul like fiber cables or line-of-sight-microwave are impractical or unavailable . Blinq Networks and Siklu area unit among the businesses functioning on new ways of backhaul for otherwise hard-to-reach tiny cell deployments.
Offloading alternatives
An easier method for carriers to ease the spectrum crunch is just to induce obviate the maximum amount information traffic over their networks as doable, enabled by the employment of Wi-Fi offload technologies from corporations like AirSense, WeFi, and Devicescape.
Ralph Diamond State la Vega, chief operating officer of AT&T quality, told associate degree audience he “has been preaching about” this for a few time. however he’s done quite that – AT&T currently owns hotspots at some thirty,000 McDonald’s and Starbucks locations, that handle traffic from the network’s customers once they area unit within the store. this can be tougher than it should appear, as carriers have to be compelled to make sure that the buyer expertise on Wi-Fi is pretty much as good or higher than exploitation the mobile network. transfer awareness of that hotspots area unit accessible and have a robust signal still as having the ability to seamlessly transition a user between the cellular and Wi-Fi network while not interrupting service area unit essential areas being self-addressed by new corporations.
Network shaping
Finally, some startups area unit going directly at the core network with software package solutions that optimize the flow of mobile information traffic. this can be maybe {the area unita|the world|the realm} we tend to are most excited regarding, as proved by our investments in Intucell and Vasona Networks (Note: Intucell was recently sold-out to Cisco, however I stay on the board of directors; artificer still maintains associate degree investment in Vasona Networks).
Earlier this year, Intucell signed a multi-million greenback deal to deploy its self-optimizing network technology across AT&T’s entire U.S. network. Intucell’s answer optimizes the RAN by distinguishing in real time faulty or underutilized cells and adjusting their configuration mechanically to produce the optimum level of coverage. Similarly, Vasona is investing its position as software package within the network to deliver informatics video and information at the acceptable time and bit rate over a given cell.
What makes US significantly excited regarding this last category? Carriers will check software package solutions on their network at a coffee direct value and see proved leads to a brief time before committing to a a lot of substantial order. From associate degree capitalist perspective, this implies shorter sales cycles and a a lot of capital-efficient business: we tend to area unit currently seeing startups that haven't raised cash before however have already completed sure-fire trials with major operators.

Saturday, 21 December 2013

Wireless security choices do not have to interrupt the bank
As wireless network attacks increase, wireless computer network (WLAN) security becomes associate exhausting proposition for many enterprises. Users and guests demand easy accessibility, however company resources ought to be protected against this high-profile attack vector. associate enterprise might break the bank attempting to take care of compliance and minimize risk -- when it must understand it's protected against malicious foes. the nice news is that there area unit several glorious, well-documented open supply (i.e., free) tools obtainable to check and monitor your wireless network. and that they do not need a tin-foil hat.
First, establish the system you would like to use. this could be a virtual machine image running on your existing laptop computer or a full-blown "bag of tricks" consisting of hardware dedicated for observation and testing functions. after I 1st started troubleshooting wireless, I used the previous, however presently found limitations from not having a system put aside for this purpose. If you choose to travel with a zealous system, you will not would like the foremost strong hardware, however it helps to own enough additional house for storing captures. In my case, i take advantage of a five-year-old laptop computer for this purpose.
Second, confirm the correct combination of package and Wi-Fi card that you just will place in monitor, or RFMON, mode to capture traffic. RFMON is comparable to promiscuous mode for local area network, except on a wireless network it permits you to grab everything -- as well as the management frames -- while not truly being associated to a service set symbol (SSID) or access purpose (AP). this is often a crucial element and if you have ever sniffed on a wireless interface with Wireshark while not being in monitor mode, you will see the plain distinction. Notice that you just get local area network frames "translated" as local area network, which implies you will miss a number of the vital traffic. you furthermore mght will not be able to perform packet injection, that is important for quickly cracking wired equivalent privacy (WEP) or conducting a distributed denial of service (DDoS) like a de-authentication attack.
Unix-based systems: additional wireless security choices, more tools
Achieving monitor mode is a smaller amount painful on a Unix-based package principally due to the quantity of drivers obtainable for a large form of chipsets supported by a number of the foremost standard open supply wireless software system tools. you'll choose your favorite flavor of UNIX operating system to use, then compile or add the packages; or, the simpler possibility is to use get back or Kali UNIX operating system. Marketed by Offensive Security, these distributions area unit tailor-made versions of Ubuntu or Debian, containing the foremost standard and helpful security tools for penetration testing and digital forensics.
As for the Wi-Fi adapter, if you are victimization UNIX operating system , save yourself the heartbreak and find the foremost standard
"go-to" for wireless security professionals, an Alfa, supported the RTL8187L Ralink chipset. initially sight, it looks slightly unwieldy, perhaps somewhat old style with its USB cable attachment, however with a high-gain antenna and also the suction cup attachment, war-walking with associate Alfa is not too unpleasant. There area unit actually different choices out there in additional convenient kind factors, however at a median value of $25, you cannot get it wrong. I in person purchase them in bulk and provides them out as vacation gifts to co-workers. everybody ought to own associate Alfa. however if you want to research different decisions, the friendly developers at Aircrack-NG have helpfully denote one in all the most effective compatibility lists around.
Another profit to victimization associate external adapter? It's easier to use with a virtual machine image. this implies that I will use it with Kali UNIX operating system running on my Macbook Air during a pinch.
Now for the fun half. Most security professionals can say that the most effective thanks to take a look at the safety of your wireless network is to undertake to compromise it. this is often why pentests area unit counseled as a best observe in building and maintaining smart network security. however please use caution. like any tool, if it's used improperly, there is forever the prospect that your production network is affected, and not during a great way. There are privacy problems associated with sniffing traffic. make certain your management is conscious of your actions and totally approves. i like to recommend a testing sandbox once beginning out which does not imply your native restaurant. With an additional Alfa card, which may be run in soft AP mode, you'll simply produce a take a look at atmosphere reception.
Cracking, analyzing your wireless network infrastructure
Once you begin up get back or Kali, you will find a overplus of wireless security choices and applications obtainable and prepared to travel. a number of them could seem discouraging to use initially, due to the command-line interface, however fate and Aircrack-NG area unit 2 of the foremost standard, with several documentation obtainable at the project websites.
Aircrack-NG could be a suite centered totally on "cracking" and analyzing WEP and WPA/WPA2PSK-encrypted wireless networks. With the inclusion of tools like Airbase-ng, it is also doable to simulate attacks against purchasers, creating it quite helpful in auditing the safety and wireless intrusion detection/penetration (WIDS/WIPS) practicality of any 802.11 network.
Kismet, meanwhile, a packet somebody and IDS, is totally passive. It captures traffic that may be viewed by most typical packet analyzers like Wireshark or Tcpdump and is useful in scoundrel detection. Running on cheap or repurposed instrumentality, fate is one in all the most effective, least-expensive choices for putting in a WIDS in your enterprise.
Still have questions? you'll realize various educational videos on-line at Securitytube.net or Hak5.org, that create these applications accessible for anyone. Security nerds wish to share (or show off) what they've learned with the community, and it is a good way for a n00b to develop wireless security information. however if you are still bothered by UNIX operating system and navigating a statement, there is a version of Aircrack-NG for Windows that might get you started.
If you are actually sporting, use associate golem pill or phone running in USB host-mode with a connecter which will power associate external USB Wi-Fi adapter. i take advantage of associate recent Samsung Galaxy. It works fine and is far additional moveable than carrying around a laptop computer.
These area unit simply a couple of of the tools you'll use to boost the safety of your wireless network while not bankrupting your organization. they are additionally a good thanks to improve your information and troubleshooting ability of 802.11 local area network protocols.

Tuesday, 10 December 2013

Discrete wireless
Wireless separate observation and controls standards rising
Industrial wireless is proving valuable for automation professionals in several areas of business automation with merchandise and standards rising. folks square measure snug with wireless since they use it in their daily lives with cell phones, personal computers, security observation, and different devices. Wireless standards so far have centered on analog sensors, however there's growing interest and adoption of wireless for separate observation and for dominant digital output points. separate observation and management points considerably number analog input and outputs in automation systems and square measure the biggest installation value on most comes. separate points monitor contact closures from a good vary of sensors and use contact outputs to manage a good vary of devices, together with motors, 2 position valves, and solenoids. If wireless value and reliableness improve to vie with hardwiring, this could be a true improvement in automation systems. Today, wireless sensors square measure being applied to pick applications that have a high come on investment as a cheap means that for observation hard-to-reach locations and deploying new innovative applications. Examples embody connecting way distant sensors that square measure too dearly-won to wire, like tank monitoring/control, Associate in Nursingd as an alternate to mechanical device slip rings on rotating machines connecting electrical signals from a stationary to rotating structure.
Discrete issues
One of the challenges for wireless is that the majority of separate points (contacts in/out; digital in/out) in works automation need high-speed response since they're usually a part of interlocking management logic that synchronizes machine and production line operations. additionally, the purpose density is way above analog points in method applications. There square measure a good vary of devices, together with limit switches, proximity sensors, relays, push buttons, stack lights, machine stops, and motor starters. Applications that don't need high response speed square measure the primary candidates for wireless. apparently, there square measure approved safety applications operative mistreatment wireless 802.11, however it's necessary to recollect that wireless becomes a part of the security loop. If there's a communications breakdown, this causes a security fault.
Proprietary wireless
Early parent users are prior wireless standards mistreatment numerous proprietary wireless devices primarily to watch and management hard-to-reach separate points. There square measure variety of proprietary industrial wireless offerings within the U.S. and Canada and different countries, and plenty of operate within the 900-MHz band or lower frequency, providing a powerful signal that permits communication through walls and different structures. Legal frequencies for these applications vary by earth science. Common belief (industrial, scientific, and medical) bands for industrial and industrial applications are:
220-MHz band in China
433-MHz band in Europe and a few different countries
869-MHz band in Europe
900-MHz band in North America and a few different countries
2.4-GHz and five.7-GHz bands, allowed in most elements of the globe
As radio waves travel, the radio signals step by step lose energy. the upper the frequency of transmission, the faster the nonparticulate radiation can lose energy right down to a degree wherever it can not be detected by a receiver. Higher frequency waves additionally lose energy additional quickly once attempting to penetrate walls, trees, or different obstructions. If each a 900-MHz radio and a two.4-GHz radio had identical output power and receiver sensitivity and were compared facet by facet, the 900-MHz radio would get nearly double the vary of the two.4-GHz radio.
Building automation business
The building automation business is considerably less strict in communications response needs than industrial automation with additional fast adoption of wireless. The BACnet building automation protocol commonplace for building automation hardwired networks outlined by ASHRAE (American Society of Heating, refrigerant, and air con Engineers) has agreements with ZigBee and EnOcean wireless standards organizations that have outlined interfaces and protocol mapping to BACnet.
ZigBee is Associate in Nursing 802.14.4 mesh-based commonplace that has been enforced within the two.4-GHz, 915-MHz (Americas), and 868-MHz (Europe) frequency bands.
EnOcean technology is predicated on ultra-low power physics and radio technology that permits it to be hopped-up mistreatment energy harvest home to transmit wireless signals over a distance of up to three hundred meters mistreatment 868- or 315-MHz frequencies with 125-kbps rate. EnOcean made-up and proprietary energy harvest home wireless sensors within the Nineteen Nineties. a decent EnOcean example may be a light-weight switch that, once pushed, generates power for Associate in Nursing EnOcean radio to transmit to a receiver to show on a lightweight. EnOcean contributed key technology to the ISO/IEC 14543-3-10:2012 commonplace, titled data technology—Home Electronic Systems (HES)—Part 3-10: Wireless Short-Packet (WSP) protocol optimized for energy harvesting—Architecture and lower layer protocols.
WirelessHART activity
The HART Foundation reports that several finish users have requested that HART technology support separate applications, and that they currently have a separate applications specification. sap Pratt, HART Communication Foundation chief engineer commented, “Where WirelessHART adopted orphan method instruments and applications, this new specification adopts orphan separate applications.” HART has outlined a separate variable for on/off or state-related values that will be inputs from, or outputs to, plant instrumentality. The separate variable can also contain a replica of the register values from a connected programmable logic controller (PLC). Inputs receive a plant signal and standing and convert those signals into a digital price. The conversion method could embody signal acquisition, termination, isolation, and/or indication for that signal’s state. The input is also a straightforward Boolean price, push-button inputs, or binary coded information (BCD). If the input is Associate in Nursing on/off or open/close kind, like with a electrical switch or limit switch, the signal will be diagrammatic in a very single bit. If, on the opposite hand, the state of the input varies, like with a interference valve, wherever the valve is open, closed, opening, or closing, the state needs a full word. Output modules transmit single bit or state signals to activate numerous devices, like actuators, interference valves, on-off valves, solenoids, and motor starters. The output maintains a target price and should embody the particular price yet for a separate output. typically the output module maintains the standing of the output, too (i.e., whether or not the output is functioning correctly). a number application modifies separate outputs by writing the target price of the output, then monitors the transitions to intermediate and/or final states by reading the particular price. All HART separate merchandise should embody core necessary capabilities that enable equivalent device varieties to be changed while not compromising system operation. HART separate options square measure backward compatible to HART core technology, like the device description language.
ISA 100.11a
The ISA one hundred.11a social unit sixteen has been considering separate works automation and revealed a technical report, ISA-TR100.00.03-2011 Wireless User needs for works Automation. ISA100 WG16 is leased to analyze applications for wireless technology within the works automation and separate producing industries, like automotive producing, packaging machinery, machining, and AI. The technical report presents descriptive user and market-related needs of wireless communication in works automation applications and explores use cases, works automation topologies, and proposals for attributes and values for existing, emerging, and abstract solutions for wireless communications as applied to works automation applications. The report highlights works automation useful and technical needs that place distinctive demands on wireless, together with the high dealing response speeds. as an example, one in every of the foremost strict applications cited is extremely high-speed process needs for device feedback of a motion management loop to actuate a servo drive to attain precise positioning in microseconds.
The report noted that information from one node ought to be diagrammatic as a register, or set of registers, in a very manner that's almost like, and sculpturesque once, information scan from a distant I/O unit of a PLC. If all the information square measure separate, then all inputs and outputs square measure to be diagrammatic as binary bits of one information part. as an example, one sixteen-bit word = 16 inputs or outputs. It recommends that a single data model similar to that of the PLC be defined. Model use cases cited embody separate inputs, intelligent limit switch standardization parameters, proximity switch sensitivity price, separate outputs, gap or time of day delay, and pulse output parameters.
This technical report presents categories of desires outlined as use cases:
Wire substitution
Simple substitution of wires on stationary instrumentality (e.g., automation controller to I/O, controller to controller, controller to enterprise system) describes a general case for wireless.
Robot finish effector
A automaton finish effector is that the operating finish of a automaton that interacts with tooling to perform specific functions.
Track-mounted instrumentality
Track-mounted instrumentality includes overhead cranes, hoists, gantries, and rail cars that square measure accustomed move material and personnel.
Rotary instrumentality
Rotary instrumentality (e.g., packaging fillers) usually spins around one fastened axis.
Torque and gauge tools
Torque tools square measure used on automatic assembly lines to tighten fasteners (e.g., bolts) to a prescribed tightness. Gauge tools square measure utilized in producing operations to live specific attributes of a unit of labor against a prescribed tolerance.
Mobile material containers
Mobile material containers (also referred to as intermediate bulk containers or IBCs) square measure accustomed transport raw materials, work-in-process (WIP), and finished product to varied locations among a producing operation. Examples embody totes, super sacks, barrels, and similar vessels.
Mobile high-value assets
Mobile high-value assets embody removable or standardized tooling (e.g., molds, dies), storage (e.g., movable racks), maintenance tools (e.g., hopped-up hand tools), and different transferrable assets that square measure utilized in the manufacture of product or maintenance of machines.
Mobile take a look at and standardization fixtures
Mobile take a look at and standardization fixtures discuss with mixtures of sensors and recorders that capture information associated with units beneath take a look at.
Wireless LAN (802.11)
Standard 802.11 wireless LAN has become commonplace throughout business and provides a clear transport for several industrial LAN protocols, together with Modbus communications protocol, EtherNet/IP, and PROFINET. Users square measure merely connecting LAN PLCs or LAN remote I/O devices to a wireless LAN (802.11) adapter to speak. Wireless LAN modules also are out there for several controllers and remote I/O merchandise that plug directly into them in situ of hardwired network interface modules. additionally to controllers, there square measure several devices mistreatment industrial LAN, together with sensors, motor drives, Associate in Nursingd robots which will simply be connected to an 802.11 wireless LAN network. Key issues in these applications embody total range of 802.11 access points needed to adequately cowl desired space, existing wireless {ethernet|local space network|LAN} networks operational within the same area, wireless vary, installation surroundings (indoor or outdoor), and security. Since these applications square measure running over commonplace wireless LAN, there will be lots of different communications traffic with the potential to make issues. Some corporations square measure communication with safety devices over 802.11, and these square measure approved safety applications. These safety applications square measure attention-grabbing however if there's a communications fault, the machine method should attend the desired safe state stopping production.
PI activity
The PI organization chargeable for PROFIBUS and PROFINET includes a wireless social unit centered on wireless. Since PROFINET is Ethernet-based, it's already being applied running over 802.11 and Bluetooth. additionally, the PROFISAFE safety protocol is being applied over 802.11 wireless mistreatment PROFINET because the transport mechanism. The wireless social unit is additionally developing the FA WSAN (factory automation wireless sensor actuator network) specification. The technology is predicated on the ABB WISA technology and uses the IO-Link standard because the protocol. The IO-Link commonplace defines a point-to-point association for separate I/O that gives data from good separate devices. in a very hardwired application, this can be accomplished with a three-conductor sensor/actuator cable Associate in Nursingd an IO-Link Master. only 1 IO-Link device will be connected to one port. a singular characteristic of the WISA/WSAN technology is that the radio and sensors will be hopped-up from the radio waves.
User considerations
Users square measure learning that building complex wireless needs a systems approach. For example, wireless has been growing at a quick rate, that has the potential to make performance problems at a plant website while not correct system level management. If you have got ever been in an online café and pissed off as a result of you can't get e-mail with too many of us mistreatment the Wi-Fi, you have got knowledgeable about what will happen in Associate in Nursing unmanaged wireless network. whereas this can be frustrating, Associate in Nursing unmanaged network with the potential for the loss of information communications in a very wireless building complex application might become harmful. I even have spoken with users WHO knowledgeable about wireless issues caused by many sources, together with microwave ovens, walkie-talkies, and IT adding wireless devices while not notifying plant personnel.
It is straightforward to consider wireless communication as limitless, however it's limitations almost like wired industrial networks. Wired industrial networks have a finite information measure out there for communications, and overloading the network can produce performance issues. Wired industrial networks square measure in a very closed system, creating them inherently additional settled than unmanaged wireless communications. Wireless networks even have limitations on communications information measure and response problems if not managed.
Sorting it all out
The WirelessHART cluster has the primary and solely specification out for separate wireless, and a few members have merchandise with different organizations developing standards. New wireless points can still be additional to systems to access difficult-to-reach sensor/actuator locations for brand new functions. What proportion of total points on a project are going to be wireless within the close to future is anyone’s guess.
The number of wireless points deployed nowadays may be a little fraction relative to the amount of hardwired points. within the future, the amount of points that may be connected wirelessly is probably going to extend, assumptive wireless for separate applications becomes additional responsive, reliable, and cost-efficient. it's exhausting to vie with the reliableness Associate in Nursingd handiness of hardwiring to an I/O card for separate points.

Monday, 9 December 2013

Building the 4G wireless network: Exploring LTE design and services drivers
This four-part telecommunication Insights guide takes an in depth check up on however 4G semipermanent Evolution (LTE) design and technology designing and preparation choices ought to be influenced by LTE service opportunities in varied wireless markets, moreover as why carriers ought to evolve their railway network infrastructure toward associate Evolved Packet Core for wireless broadband and the way changes in railway network technology and operations area unit being driven by these problems.
Wireless operators' 4G LTE design and infrastructure designing choices area unit being driven by a mix of rising wireless services, a immensely swollen set of mobile devices to support, the chance to supply broadband access wherever wireline is not appropriate, and changes in users' social and content-consumption behaviors. within the 1st of 4 in-depth articles on building out 4G LTE spec, telecommunication authority Tom Nolle, president of CIMI business firm., appearance at however every 4G LTE market driver will take LTE designing in a very slightly completely different direction.
Few individuals within the mobile trade dispute the sure thing of 4G semipermanent Evolution (LTE), however the temporal order and therefore the nature of deploying LTE network technology and infrastructure is a smaller amount sure. instead of a one-size-fits-all approach, 4G LTE design is being determined by the particular competitive and chance drivers that give the impetus for operators to shift to LTE. The solutions vary due to important variations in wireless markets.
The most credible driver for deploying 4G LTE design, however, is that the market-wide shift from a voice-driven wireless revenue model to a spotlight on non-voice services -- i.e., broadband information and video. Operators worldwide are providing unlimited-usage models, and competition is driving down mobile per-minute costs. At best, voice average revenue per user (ARPU) is capped, and it's probably to spiral down over successive 5 years. Short message service (SMS) is below similar pressure, therefore information and content services that embody video area unit the hope of the longer term.
The most effective mechanism for promoting mobile information services has been the expansion in smartphone use. The Apple iPhone created smartphones a market development, spawning a number of competitive models and therefore the entry of Google's ASCII text file mobile robot software as a general rival. to make robot, Nokia and Intel -- that each antecedently offered their own ASCII text file Linux smartphone platforms -- united to mix their programs to spice up market interest. Proving the purpose, trade statistics purpose to smartphones creating up a 3rd of all phone sales inside a year.
In the U.S. alone, smartphone use has clogged cells and whole railway areas, moving the quality of smartphone information services and therefore the services offered via ancient handsets. Smartphones conjointly intensify the competitive good thing about higher mobile information speeds, and therefore the success of smartphones can accelerate 4G LTE design preparation.
Multiple wireless economic process drive 4G LTE evolution
The wireless economic process driving 4G LTE design preparation area unit several and sophisticated. Here's a short summary of the most forces that operators ought to consider:
Third-party developer programs. a subject matter associated with the smartphone is that the explosion of interest in third-party developers, applications and application stores. each smartphone vender currently has one, and therefore the GSMA -- a GSM-focused trade cluster -- declared associate initiative to make an identical application framework and store across 24 operators, and membership is growing. Phone applications are a main focus of Microsoft's new mobile design, Windows Phone seven.
Apps give associate assist. Applications area unit a natural pairing with smartphones as a result of a all-purpose browsing perform is of restricted worth to users, as a result of the little screen and therefore the problem of manipulating the device to navigate websites whereas mobile. Applications will draw on-line data, however they package the user navigation in a very means per mobile device and user constraints. Applications do not need 4G LTE services, however most operators area unit reluctant to create substantial investments in 3G-based application stores and repair layer design for concern that the success of the investment might hyperbolize 3G networks.
Taking the place of wireline broadband. In rural areas and developing economies, 4G LTE spec evolution is being aroused by the necessity to supply wireless services as another to fixed-wire broadband services. several developing countries depend upon itinerant services as a result of they lack fixed-line infrastructure. In these markets, it might be unproductive to aim to deploy wireline broadband given the low economic densities obtainable to justify it. LTE networks supply a huge advantage in these areas by providing a wireless service that may be accustomed support fastened broadband access in selected homes and businesses from constant infrastructure that supports ancient mobile services. This driver is especially valuable in areas that depend upon business as a result of net access is progressively a baseline demand for travelers.
Regulatory problems. Public and restrictive pressure to incorporate broadband access in universal service subsidies or to fund rural broadband widens the scope of interest in LTE as a fixed/mobile combination. once LTE design is paired with frequencies that provide affordable vary, it will serve a reasonably massive earth science economically whereas supporting each fastened sites and mobile services. As before, this doctrine offers higher|a far better|a much better|a higher|a stronger|a more robust|an improved} come on infrastructure and better use of scarce spectrum resources. WiMAX, the opposite 4G technology, is additionally suited to the agricultural market, however LTE is usually viewed as a a lot of appropriate strategy as a result of it's associate evolution of 3G wireless and is a lot of versatile wherever mobile phones and wireless broadband be.
Mobile appliance explosion. A final important driver for LTE is that the mobile appliance explosion, 1st seen within the use of network-enabled e-book readers and currently increasing to new-age pill appliances. These devices area unit rising because the core of a replacement series of business models supported delivering content to users UN agency area unit less "mobile" and use the device from a spread of fastened locations as hostile victimisation it whereas moving -- virtually. Operators expect that this migratory-use behavior model can produce sizable demand on cells in locations wherever individuals sit and socialize (i.e., classic welcome sites).
Supporting mobile users with completely different usage patterns. Some network operators offload 3G network traffic victimisation hotspots and Wi-Fi to support these users, however others like better to keep their users on their own cellular networks victimisation femtocells. Among the benefits of femtocell technology is that the proven fact that it are often applied to either 3G or 4G/LTE networks, however given the sure thing of LTE design preparation, most operators say they attempt to deploy femtocells as a district of their overall LTE program. Femtocells also can be employed in the house to confirm that LTE customers have sensible service even throughout the amount of transition from 3G.
Wireless voice complexness. several operators conjointly face a cost-side driver for LTE architecture: the necessity to modernize voice services around voice net Protocol (VoIP). as a result of 3G voice is predicated on time-division multiplexing (TDM), as most wireline voice services area unit, the match between the 2 has been sensible up to currently. because the wireline voice change plant ages, it becomes tougher to justify reinvesting within the technology, given the sharp downward trend in voice valuation and therefore the accumulated competition from net voice services like Skype. If wireline voice is to shift to VoIP, then wireless voice ought to moreover.
The interest in moving to a lower-cost VoIP service model has accelerated since 2008, partially as a result of of world economic conditions and competition from over the prime (OTT) players like Skype and Google that has become a lot of intense. whereas few operators arrange a fork-lift voice infrastructure upgrade, most expect that they're going to be moving aloof from the TDM model over successive 5 years, and a call to shift to packet voice for mobile services would facilitate this migration. several operators area unit watching making a parallel VoIP model supporting each mobile and wireline users whereas step by step phasing out the older voice infrastructure because it ages.
The bottom line on 4G LTE design preparation
Operators gain the advantage of upper information rates per cell from 4G LTE, larger client capability per cell, and a lot of economical use of backhaul and railway connect infrastructure for services that area unit progressively data-dominated. the present explosion in smartphone and mobile appliance interest makes it clear that the markets will quickly stress the capacity of 3G networks which further 3G investment are problematic if there's any risk that competitors will leapfrog to 4G. as a result of that risk exists in nearly each developed wireless market, there's very little probability that a given mobile operator won't confront a minimum of one amongst these LTE drivers in its spot within the close to future.