09.11.2012 Views

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Manufacturer Detected %<br />

D-Link Corporation 68 22.44<br />

Netgear Inc 50 16.50<br />

Cisco-Linksys 36 11.88<br />

Cisco 35 11.55<br />

3Com Europe Ltd 16 5.28<br />

Unidentified Manufacturers 13 4.29<br />

Apple Computer 12 3.96<br />

Belkin Corporation 9 2.97<br />

Colubris Networks 9 2.97<br />

Airspan 6 1.98<br />

Others 49 16.17<br />

Total 303<br />

Table 4.3 Device manufacturer detected in night scan<br />

Several conclusions can be derived from the data presented above. The first conclusion<br />

is that a majority <strong>of</strong> the wireless equipments used in the city are from D-Link with an<br />

average <strong>of</strong> 25% <strong>of</strong> the whole WLAN detected with Netgear following closely behind at<br />

an average <strong>of</strong> 15% <strong>of</strong> the market share. However in 2004, Lin, Sathu and Joyce<br />

reported that the main player in the WLAN in Auckland CBD was Cisco Aironet<br />

controlling 33% <strong>of</strong> the whole market (Jeffcoate, Chappell, & Feindt, 2002). The<br />

differences that have been observed shows that the data gained from the field trip can be<br />

used to analyze trends in WLAN equipment preference among users in a particular area<br />

by interested party such as equipment suppliers and vendors.<br />

The second conclusion is that the origin <strong>of</strong> a wireless device can be easily determined<br />

by comparing the first six alphanumerical values <strong>of</strong> the device MAC address with the<br />

OUI data retrieved from the IEEE website mentioned previously. This process can be<br />

attempted by almost anyone with access to the internet or the OUI data. This<br />

information when combined with other data such as encryption status can be used my<br />

malicious users to launch attacks against the WLAN.<br />

4.2.2 Encryption<br />

The encryption status <strong>of</strong> the WLANs detected in the Auckland CBD is summarized in<br />

Table 4.4.<br />

29

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!