15,891,423 members
Sign in
Sign in
Email
Password
Forgot your password?
Sign in with
home
articles
Browse Topics
>
Latest Articles
Top Articles
Posting/Update Guidelines
Article Help Forum
Submit an article or tip
Import GitHub Project
Import your Blog
quick answers
Q&A
Ask a Question
View Unanswered Questions
View All Questions
View C# questions
View C++ questions
View Javascript questions
View Visual Basic questions
View Python questions
discussions
forums
CodeProject.AI Server
All Message Boards...
Application Lifecycle
>
Running a Business
Sales / Marketing
Collaboration / Beta Testing
Work Issues
Design and Architecture
Artificial Intelligence
ASP.NET
JavaScript
Internet of Things
C / C++ / MFC
>
ATL / WTL / STL
Managed C++/CLI
C#
Free Tools
Objective-C and Swift
Database
Hardware & Devices
>
System Admin
Hosting and Servers
Java
Linux Programming
Python
.NET (Core and Framework)
Android
iOS
Mobile
WPF
Visual Basic
Web Development
Site Bugs / Suggestions
Spam and Abuse Watch
features
features
Competitions
News
The Insider Newsletter
The Daily Build Newsletter
Newsletter archive
Surveys
CodeProject Stuff
community
lounge
Who's Who
Most Valuable Professionals
The Lounge
The CodeProject Blog
Where I Am: Member Photos
The Insider News
The Weird & The Wonderful
help
?
What is 'CodeProject'?
General FAQ
Ask a Question
Bugs and Suggestions
Article Help Forum
About Us
Search within:
Articles
Quick Answers
Messages
Comments by seemazaib (Top 39 by date)
seemazaib
2-Feb-13 1:44am
View
Thanx for reply but i did not get any satisfactory answer.no i did not want to go in a deep i only want to understand the steps of work like example i read about S-boxes are weak its true?i only want to clear my own concept.i want to make my own base. i read from some where SSL is not much secure.so how it encrypt data?
seemazaib
9-Nov-12 13:07pm
View
i want to make a trust relationship(authentication) between two access points and than perform a secure seamless handoff between them.so for that purpose my assumptions are
1.access point1 and access point2 both will be make a trust relationship with each other.For that purpose both will share their identity with each other and save in their memory.
2.too keep account of each other an protocol will required in both access point.Like Cisco neighbor discovery protocol.
3.handoff protocl will required to keep roaming mobile station list in access point1 and in access point2.like access point1 will send its mobile station information to access point2 and vise virsa
how i show diagrammatically in layerd frame work.my id is game.1233@hotmail.com.
now problem
seemazaib
9-Nov-12 12:55pm
View
My advisor favorite subject is advance algorithm.She is also expecting an algorithm from me.
seemazaib
9-Nov-12 12:53pm
View
basically i have study till link layer 2 of osi model.That is my scope.basically i choose wrong topic for thesis.now my advisor is not changing that topic.I am now trying to read literature review.But every work is different in research paper.Some time work is related with each other.Now i am stuck in my work.I have read so many research papers which is not related to my topic.Now i am confused.what i do.How i solve my methodology.Very big problem.
seemazaib
9-Nov-12 12:39pm
View
I am tired totally,my mind condition ..............,i cant explain.do you know any phd or Mphil person related to networking.any your friend or colleague?
seemazaib
9-Nov-12 12:36pm
View
i already read about access point internal design,a,b,g,n are wifi access point technology,i already read about access point and server communication,mobile station association with access point,also how handoff occur ,its process or 3 phases, inter access point protocol(IAPP),management,control and data frame ,authentication server soo on.etc i not find any material related to communication only between two wifi access point,or between multiple access points.Why some one publish a research work on that topic.how access point1 will find its adjacent neighbor.how access point2 keep identity of access point1 in its memory vise virsa.
seemazaib
9-Nov-12 11:51am
View
my another question is that how i read implementation of protocol?is mathematical formulas existing for these protocol or not?i need simple and easy formulas which are understand able easily.
seemazaib
9-Nov-12 11:34am
View
have you any link or document related to that?
seemazaib
9-Nov-12 11:03am
View
you are experts please help me .These are questions in my mind.Because there are so many questions in my mind
seemazaib
9-Nov-12 11:00am
View
another question is that.you also know switches,routers has table.Like forwarding table to route the packets from source to destination.Is wifi access point has any table to route the frames or packets from source access point to another destination access point at wired back-end?you assume scenario access point 1 and access point 2 attached with same switch through coaxial cable .
seemazaib
9-Nov-12 10:53am
View
another question for trust between two access point.Can both exchange identity with each other if yes then how?Because i read access points has public and private key,also certificate of public key like Cert(Kp). for identity purpose both access point can exchange public key certificate?will it create any security issue or not?another question is that.if i want to built a protocol like Cisco neighbor Discovery for wifi access point.Can it will suit able for wifi access point?can you give me answer of these question?
seemazaib
9-Nov-12 10:41am
View
My question is that.Can wifi access point1 communicate with wifi access point2.How frame exchange or sends to each other?another question if i want to built a trust relation ship between 2 adjacent access points in same intra-subnet.how i will built?
seemazaib
9-Nov-12 10:28am
View
Deleted
Zoltán Zörgő: i need you help please reply as soon as possible
seemazaib
2-Nov-12 4:27am
View
Deleted
Zoltán Zörgő:My question is that.How Base station authenticate with the satellite?Is any procedure exist for trust relation ship between Two base station? how a base station keep account of other base station time to time?How one base station keep information related to mobile users of neighbor base station to perform secure rooming of mobile user from Old base station to new base station?Only i will focus on layer 2 of OSI model.I want to show diagrammatically methodology.Please help me.Basically i am confuse where these protocols will lay in a layer frame work and how?
seemazaib
2-Nov-12 3:50am
View
Deleted
where r u?i need your help
seemazaib
30-Oct-12 8:17am
View
Deleted
hello
seemazaib
24-Oct-12 8:15am
View
Deleted
can you suggest to me how i start writing on literature review.because in introduction i write about IEEE 802.11i,i do not find any more detail on IEEE 802.11i.In literature review how i start.In my mind first write about Wireless LAN,than about security (mostly security work done on data encryption,denial of service attack, main-in-the-middle attack )work which already done, than tell about handoff.because on basis of literature review the methodology will be define broadly.Please help me
seemazaib
24-Oct-12 5:51am
View
Deleted
no one helping.I am going to left my Mphil. No on guiding and Helping.
seemazaib
24-Oct-12 4:40am
View
Deleted
Thank you so much.Now Skype is working well
seemazaib
23-Oct-12 10:20am
View
Deleted
some on help me.i am trying to prepare my thesis proposal but i am failed.oh God what i do?oh God
seemazaib
23-Oct-12 8:42am
View
Deleted
radius server can give certificate to the access point.can you tell me at which layer radius server lay?access point and switch lay on layer 2.i want to limit my work at intra-subnet,and layer 2 handoff will be considered and basic service set (BSS) will be considered.Basically i want to do work on " enhancing efficiency for secure handoff in IEEE 802.11i wireless local area Network "because during handoff many researchers do working on latency of handoff.i want to introduce a security concept in handoff.so i noticed that main roll play by access points.so there must be some mechanism need.please help me ,give me some suggestion ,how i make my work best.
seemazaib
23-Oct-12 5:07am
View
Deleted
in my laptop i installed Skype.it was working well.but problem is coming in voice.no one can listen me and also i can not listen to others.voice driver is installed.you-tube videos voice is coming.what i do,how i resolve that problem?
seemazaib
23-Oct-12 4:59am
View
Deleted
Tell me about yourself
seemazaib
23-Oct-12 4:46am
View
Deleted
hy i am missing you
seemazaib
21-Oct-12 14:22pm
View
Deleted
if you have any information,any search engine you known about for searching best material or any best link related to networking.Please share with me.because Knowledge is necessary to achieve some thing.
seemazaib
21-Oct-12 13:40pm
View
Deleted
Thank you.if any problem i face can i asked from you?
seemazaib
21-Oct-12 12:57pm
View
Deleted
only correct my proposal once it will approved than i will do work my own-self.Only i need guidelines.
seemazaib
21-Oct-12 12:43pm
View
Deleted
i am depressed .Please not leave me alone.I am failed every time.my hope is finishing day by day.
seemazaib
21-Oct-12 12:02pm
View
Deleted
Zoltán Zörgő:please help me ,how i correct it.how i change it please.can you tell me what is difference between access point and router.you tell about neighbor discovery and handoff protocol is it exixting or not.if not than can i make it.Any simulator will make for it or not? in neighbor discovery protocol what means sending packets on wireless interface and where neighbour information will placed?what type of data will exchange over the wired backend.Because i think so access point memory is not so much large to keep information about neighbor client's and access points.What you think?where step 1,2,3 protocol will plcae?in access point or in Radius server?who will give the authentication certificate to the access point?is authentication certificate will placed in every access point own memory for ever?Please help me tomorrow is proposal submission day.I am very very depressed.
seemazaib
21-Oct-12 8:04am
View
Deleted
Zoltán Zörgő:can you correct it for me.Please tommorrow is my proposal submission day.
Problem Statement:
This research work is addressing the authentication process of access points to deal with secure handoff process in multiple Access Points (APs). There is a need to develop a new mechanism which will allow an authenticated seamless handoff between two APs.
Scope:
This research work will focus on authentication process between access points (APs) to ensure seamless handoff between two access points. Access point IEEE 802.11 a\b\g technology will use. A Wireless Access Point is supporting these technologies simultaneously [6].
Methodology:
Formulation of Layer Framework and it will be consisted in modular form. IEEE 802.1X technique will be adopted. Cryptographic Method will be used for authentication of access point. It will help to provide a seamless handoff between access points.
The Layered Framework will be consisted on following Module:
1) How to establish inter-AP trust? Supposing you are in an infrastructure with wired backend, you can use RADIUS and certificates to authenticate AP-s, thus every AP can verify the authenticity of it's neighbor.
2) Neighbor discovery protocol (like CDP, but over wifi). From time-to time, every AP is sending out discovery packets over it's wireless interface and keep account of it's neighbors. The data exchange itself should be done over the wired backend.
3) Handoff readiness protocol: every AP would be informed over the wired network about the clients known by it's neighbors. Thus every AP would know about all potential rooming clients. A client already authenticated by one AP can be trusted by the other ones too. This can be also used to move current encryption key from one AP to the other during rooming.
seemazaib
21-Oct-12 7:26am
View
Deleted
Please help me you know show me the right path.Oh you are great o my God.How i thank u.You are great ad visor.Please help me more until i am not completing my thesis.Can i consult you every time when i need your help.
seemazaib
21-Oct-12 7:19am
View
Deleted
yes you are right.this is true methodology.Yes this is my methodology.can i use it in my thesis proposal?Know according to it what will scope and problem statement will be make?is it new work any one perform it before which you send me?
seemazaib
21-Oct-12 5:14am
View
if i choose a layerd framework than what modules can add in it.Please help me.
According to My supposition:
1.handoff input module
2.List of access point module(based on access point MAC address.MAC is not secure therefore 3rd module propose)
3.Authentication process module
4.After authentication the mobile user context will be transfer to new access point.(can i include it or not?its necessary)
What you say its correct or not?Please help me
seemazaib
21-Oct-12 4:54am
View
Deleted
Zoltán Zörgő :i read the pdf file which you have sended.Its nice.In that document i noticed that all work has only done for mobile user's.focusing on reducing the handoff Latency for users.i did not find any authentication between two access points.why some one discussed on that topic.The cross layerd frame work is proposed in that document.what is difference between layerd and cross layerd framework.My serching is not good.I want to find a material on my topic but could not find.I am stuck in methodology and literature Review.My teacher was said to me make a literature indirectly,i can not perform directly work.I am much much confused and worried because tomorrow is proposal submission day.If i did not complete it than this year will be waste of my study. than i can start next year.I am much worried.
seemazaib
20-Oct-12 16:35pm
View
Deleted
Some flow in my mind,i do not known its correct or not?Like example old access point want to perform a secure handoff -> old access point will check in memory about listed access point MAC address-> old access point than chose its nearest new access point->old access point than send handoff input to new access point and also demand an identity or authentication certificate means to check, it is a trusted access point or not-> so new access point will send its identity to a old access point->old access point check in its memory about it validity if valid than a mobile station will be handover to the new access point other wise canceled the hand over process.New access point can also demand an authentication certificate from old access point before receive a new mobile station in its cell.
seemazaib
20-Oct-12 16:10pm
View
Deleted
basically my advisor will demand a simulator at end of thesis.I am now working on proposal.If i mail you my proposal than can you help me?to define a better Methodology.My teacher said to me explore the methodology.Because monday is last date of submission of proposal and now sunday is start.My own wish is that make a theoratical solution and not remains a need of semulator.i don not like codding its my weak point.
seemazaib
20-Oct-12 15:37pm
View
Deleted
I am very very depressed.I am working on that problem, i am failing every time.GOD help me what i?
seemazaib
20-Oct-12 15:24pm
View
Deleted
Zoltán Zörgő:ok i explain you.you notice that one access point make a cell in infrastructure mode.access point is working like a base station.it is providing services to the user's or mobile station.when mobile station is moving from one cell to an other cell then handoff occur from old access point to a new access point.mostly security issues are coming in wireless LAN.i want that first a trusted relation make between old and new access point, after built a trusted relation then handoff will be occur of mobile station from old access point to a new authenticated access point.I am doing this all due to security purpose,you know that rogue access point ,it is un-authenticated access point.it is also causing deniel of service attack.so if a solution proposed for that problem.My thesis will be complete and i will get Mphil degree.I want to make a frame work or a protocol for that problem.I donot know what will good solution and how make a framework or aprotocol.Basically no one provide a good guideline to me.Every one hiding its information.If peoples have any information about that problem why they are not sharing with others.If i make a success full person than i will make a special website for students of IT and i will provide information and help them.
seemazaib
20-Oct-12 12:58pm
View
Deleted
Zoltán Zörgő you are great.please help me what i do?I need information on the above define topic.Please can you tell me that to solve the authentication process between two access point,can a frame work proposed or not how i propose it?
Show More