AIS300 - Scheme of Work - Scholarly Commons Home
AIS300 - Scheme of Work - Scholarly Commons Home
AIS300 - Scheme of Work - Scholarly Commons Home
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Manufacturer Detected %<br />
D-Link Corporation 68 22.44<br />
Netgear Inc 50 16.50<br />
Cisco-Linksys 36 11.88<br />
Cisco 35 11.55<br />
3Com Europe Ltd 16 5.28<br />
Unidentified Manufacturers 13 4.29<br />
Apple Computer 12 3.96<br />
Belkin Corporation 9 2.97<br />
Colubris Networks 9 2.97<br />
Airspan 6 1.98<br />
Others 49 16.17<br />
Total 303<br />
Table 4.3 Device manufacturer detected in night scan<br />
Several conclusions can be derived from the data presented above. The first conclusion<br />
is that a majority <strong>of</strong> the wireless equipments used in the city are from D-Link with an<br />
average <strong>of</strong> 25% <strong>of</strong> the whole WLAN detected with Netgear following closely behind at<br />
an average <strong>of</strong> 15% <strong>of</strong> the market share. However in 2004, Lin, Sathu and Joyce<br />
reported that the main player in the WLAN in Auckland CBD was Cisco Aironet<br />
controlling 33% <strong>of</strong> the whole market (Jeffcoate, Chappell, & Feindt, 2002). The<br />
differences that have been observed shows that the data gained from the field trip can be<br />
used to analyze trends in WLAN equipment preference among users in a particular area<br />
by interested party such as equipment suppliers and vendors.<br />
The second conclusion is that the origin <strong>of</strong> a wireless device can be easily determined<br />
by comparing the first six alphanumerical values <strong>of</strong> the device MAC address with the<br />
OUI data retrieved from the IEEE website mentioned previously. This process can be<br />
attempted by almost anyone with access to the internet or the OUI data. This<br />
information when combined with other data such as encryption status can be used my<br />
malicious users to launch attacks against the WLAN.<br />
4.2.2 Encryption<br />
The encryption status <strong>of</strong> the WLANs detected in the Auckland CBD is summarized in<br />
Table 4.4.<br />
29