自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+
  • 博客(7)
  • 资源 (9)
  • 收藏
  • 关注

转载 undefined reference to `pthread_create‘

转:https://www.cnblogs.com/rohens-hbg/p/10417006.htmlubuntu 16.04 下 C语言开发环境,已经添加了头文件#include <pthread.h> 以及在Makefile中添加了 -lpthread,但是编译时仍然报错:undefined reference to `pthread_create'百度后得知,ubuntu下-lpthread必须跟在 gcc命令的最后才行。...

2020-09-17 19:50:21 91

转载 VNC实现Windows远程访问Ubuntu 16.04(无需安装第三方桌面,直接使用自带远程工具)

转自:https://www.cnblogs.com/xuliangxing/p/7642650.html本文主要是讲解如果理由VNC实现Windows远程访问Ubuntu 16.04,其实网上有很多类似教程,但是很多需要安装第三方桌面(xfce桌面等等),而且很多人不太喜欢安装第三方桌面,很多人像笔者一样喜欢原生自带的桌面(O(∩_∩)O哈哈~有点强迫症)。今天笔者给大家介绍一下,不需要安装...

2019-05-28 11:25:20 260

原创 ubuntu命令行配置samba匿名共享

sudo apt-get install sambasudo apt-get install smbfssudo cp /etc/samba/smb.conf /etc/config/smb.conf_backup配置共享名为:test_smb,共享路径为/home/wireless/smb,guest ok =yessudo vi /etc/samba/smb.conf添加如...

2018-10-16 11:15:15 2968

原创 Ubuntu 16.04和ubuntu16.04之间共享目录

一 服务器端配置:1 首先安装nfs服务端软件#sudo apt-get install nfs-kernel-server2 配置服务器端NFS 执行如下命令编辑文件/etc/exports:  # vi /etc/exports  在该文件里添加如下内容:  /home/wireless 192.168.1.*(rw,sync,no_root_squash,inse...

2018-08-20 16:36:41 2050

原创 openwrt 编译时报SOURCE_DATE_EPOCH must expand to a non-negative integer less than or equal to 2534023007

log:mkyaffs2image.c: In function 'main':mkyaffs2image.c:470:6: error: environment variable SOURCE_DATE_EPOCH must expand to a non-negative integer less than or equal to 253402300799fprintf(stderr,...

2018-08-14 15:08:55 2142

转载 最新automake使用方法

原文出自:https://www.cnblogs.com/chenshikun/p/6094089.htmlupdated by yulijun第一步:常用工具安装:正所谓:“工欲善其事,必先利其器”。我们常用的工具主要有GNU AutomakeGNU AutoconfGNU m4GNU Libtool1、查看自己系统中是否安装有这些工具终端输入命令:w

2017-12-17 21:38:32 3369

转载 吴恩达教授的机器学习公开课

http://open.163.com/movie/2008/1/B/O/M6SGF6VB4_M6SGHJ9BO.html

2017-08-14 16:33:03 1443

Digital signal processing principles, algorithms, and applicati

Digital signal processing principles, algorithms, and applicati

2024-04-15

802.11be draft 4.0 wifi7standard

802.11be draft 4.0 wifi7standard

2023-12-10

Fundamentals of Wireless Communication - 2005 1

Fundamentals of Wireless Communication - 2005 1

2023-12-06

下一代无线局域网802.11n中文版

介绍802.11n spec 原理,形成过程,实现细节和关键特性,对mimo,ofdma等关键特性深入讲解

2019-03-07

Device Provisioning Protocol v1.0

Table of contents 1 INTRODUCTION .......................................................................................................................................................... 8 1.1 Scope ............................................................................................................................................................ 8 1.2 References.................................................................................................................................................... 8 1.3 Definitions and acronyms............................................................................................................................ 10 1.3.1 Shall/should/may/might word usage .............................................................................................. 10 1.3.2 Conventions ................................................................................................................................... 10 1.3.3 Abbreviations and acronyms.......................................................................................................... 11 1.3.4 Definitions ...................................................................................................................................... 12 1.3.5 Symbols ......................................................................................................................................... 13 1.4 Architecture ................................................................................................................................................. 14 1.5 Device roles ................................................................................................................................................ 14 1.5.1 Authentication roles........................................................................................................................ 14 1.5.2 Configurator delegation.................................................................................................................. 15 1.6 Security considerations............................................................................................................................... 15 1.6.1 Overview ........................................................................................................................................ 15 1.6.2 Threat profile .................................................................................................................................. 15 1.6.3 Trust model .................................................................................................................................... 18 2 DPP PROTOCOL USAGE.......................................................................................................................................... 20 2.1 Overview ..................................................................................................................................................... 20 2.2 Infrastructure setup and connectivity .......................................................................................................... 20 2.2.1 AP configuration............................................................................................................................. 20 2.2.2 STA configuration........................................................................................................................... 20 2.2.3 Infrastructure connectivity .............................................................................................................. 20 2.2.4 Message flows for infrastructure connectivity ................................................................................ 20 2.3 Wi-Fi Direct ................................................................................................................................................. 23 2.3.1 Establishing a P2P group using DPP............................................................................................. 24 2.3.2 P2P Group operation ..................................................................................................................... 26 3 SECURITY.................................................................................................................................................................. 27 3.1 Properties.................................................................................................................................................... 27 3.2 Public key cryptography.............................................................................................................................. 27 3.2.1 Supported public key cryptosystem ............................................................................................... 27 3.2.2 Notation.......................................................................................................................................... 27 3.2.3 Cryptographic suites ...................................................................................................................... 28 3.2.4 Point representation....................................................................................................................... 28 4 DATA STRUCTURES................................................................................................................................................. 29 4.1 Public keys .................................................................................................................................................. 29 4.2 Connectors.................................................................................................................................................. 29 4.3 DPP Configuration object............................................................................................................................ 30 4.3.1 Wi-Fi Technology ........................................................................................................................... 30 4.3.2 DPP Discovery ............................................................................................................................... 30 4.3.3 DPP Credential .............................................................................................................................. 30 5 BOOTSTRAPPING OF TRUST.................................................................................................................................. 32 5.1 Overview ..................................................................................................................................................... 32 5.2 Bootstrapping information ........................................................................................................................... 32 5.2.1 Bootstrapping information format................................................................................................... 32 5.3 Scanning a QR code................................................................................................................................... 33 5.4 NFC............................................................................................................................................................. 34 5.4.1 Overview ........................................................................................................................................ 34 5.4.2 NFC Connection Handover............................................................................................................ 35 5.4.3 DPP bootstrapping via NFC URI record ........................................................................................ 37 5.5 Bluetooth ..................................................................................................................................................... 38 5.5.1 Overview ........................................................................................................................................ 38 5.5.2 Responder procedures .................................................................................................................. 40 5.5.3 Initiator procedures ........................................................................................................................ 40 Device Provisioning Protocol Specification v1.0 © 2018 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 4 of 124 5.6 PKEX: Proof of knowledge of a shared code, key, phrase, or word...........................................................41 5.6.1 PKEX preliminaries ........................................................................................................................ 41 5.6.2 PKEX exchange phase .................................................................................................................. 42 5.6.3 PKEX commit-reveal phase ........................................................................................................... 43 6 DPP AUTHENTICATION............................................................................................................................................ 45 6.1 Overview ..................................................................................................................................................... 45 6.2 DPP Authentication protocol ....................................................................................................................... 45 6.2.1 DPP capabilities negotiation .......................................................................................................... 46 6.2.2 DPP authentication request ........................................................................................................... 47 6.2.3 DPP authentication response ........................................................................................................ 47 6.2.4 DPP authentication confirm ........................................................................................................... 49 6.3 DPP Configuration protocol ........................................................................................................................ 50 6.3.1 Overview ........................................................................................................................................ 50 6.3.2 DPP configuration request ............................................................................................................. 50 6.3.3 DPP configuration response .......................................................................................................... 51 6.3.4 DPP Configuration Attributes object .............................................................................................. 51 6.3.5 Connector....................................................................................................................................... 52 6.3.6 DPP Configuration object............................................................................................................... 53 6.4 Network introduction protocol ..................................................................................................................... 55 6.4.1 Introduction .................................................................................................................................... 55 6.4.2 Connector group comparison......................................................................................................... 56 6.5 Network access protocols ........................................................................................................................... 56 7 STATE MACHINES .................................................................................................................................................... 57 7.1 Initiator state machine................................................................................................................................. 57 7.1.1 States ............................................................................................................................................. 57 7.1.2 Events and output .......................................................................................................................... 57 7.1.3 Variables ........................................................................................................................................ 57 7.1.4 Parent process behavior ................................................................................................................ 57 7.1.5 State machine behavior ................................................................................................................. 57 7.2 Responder state machine ........................................................................................................................... 59 7.2.1 States ............................................................................................................................................. 59 7.2.2 Events and output .......................................................................................................................... 59 7.2.3 Variables ........................................................................................................................................ 59 7.2.4 State machine behavior ................................................................................................................. 60 7.3 Configurator state machine......................................................................................................................... 62 7.3.1 States ............................................................................................................................................. 62 7.3.2 Events and output .......................................................................................................................... 62 7.3.3 Variables ........................................................................................................................................ 62 7.3.4 Parent process behavior ................................................................................................................ 62 7.3.5 State machine behavior ................................................................................................................. 62 7.4 Enrollee state machine................................................................................................................................ 64 7.4.1 States ............................................................................................................................................. 64 7.4.2 Events and output .......................................................................................................................... 64 7.4.3 Variables ........................................................................................................................................ 64 7.4.4 State machine behavior ................................................................................................................. 64 7.5 Detailed protocol description....................................................................................................................... 66 7.5.1 DPP bootstrapping......................................................................................................................... 66 7.5.2 DPP authentication exchange........................................................................................................ 66 7.5.3 DPP configuration exchange ......................................................................................................... 68 7.5.4 DPP network introduction exchange.............................................................................................. 69 7.5.5 Network access.............................................................................................................................. 70 8 DPP ATTRIBUTE, FRAME, AND ELEMENT FORMATS .......................................................................................... 71 8.1 DPP attributes ............................................................................................................................................. 71 8.1.1 DPP attribute body field definitions................................................................................................ 72 8.2 DPP frames................................................................................................................................................. 74 8.2.1 DPP Public Action frames.............................................................................................................. 74 8.2.2 DPP Generic Advertisement Service (GAS) frames...................................................................... 78 Device Provisioning Protocol Specification v1.0 © 2018 Wi-Fi Alliance. All Rights Reserved. Used with the permission of Wi-Fi Alliance under the terms as stated in this document. Page 5 of 124 8.3 DPP status and error codes........................................................................................................................ 81 8.4 Network Introduction protocol elements...................................................................................................... 82 8.4.1 Overview ........................................................................................................................................ 82 8.4.2 Network Introduction protocol AKM suite....................................................................................... 82 9 DPP CONFIGURATION BACKUP AND RESTORE.................................................................................................. 83 9.1 Overview ..................................................................................................................................................... 83 9.2 DPP AsymmetricKeyPackage..................................................................................................................... 83 9.3 DPPEnvelopedData .................................................................................................................................... 84 9.3.1 DPPAsymmetricKeyPackage encryption....................................................................................... 86 9.3.2 DPPEnvelopedData decryption ..................................................................................................... 86 9.4 DPP configuration backup .......................................................................................................................... 86 9.5 DPP configuration restore........................................................................................................................... 86 9.6 Enabling multiple Configurators in DPP...................................................................................................... 87 APPENDIX A (INFORMATIVE) TEST VECTORS ............................................................................................................ 88 A.1 Test vectors for DPP Authentication using P-256 for mutual authentication..............................................88 A.2 Test vectors for DPP Authentication using P-256 for Responder-only authentication ...............................91 A.3 Test vectors for DPP Authentication using P-384 for mutual authentication..............................................94 A.4 Test vectors for DPP Authentication using P-521 for mutual authentication..............................................98 A.5 Test vectors for DPP Authentication using Brainpool P-256r1 for mutual authentication ........................103 A.6 Test vectors for DPP Authentication using Brainpool P-384r1 using mutual authentication....................106 A.7 A.7 Test vectors for DPP Authentication using Brainpool P-512r1 for mutual authentication ..................110 APPENDIX B ROLE-SPECIFIC ELEMENTS FOR PKEX............................................................................................... 115 B.1 Role-specific elements for NIST p256 ...................................................................................................... 115 B.2 Role-specific elements for NIST p384 ...................................................................................................... 115 B.3 Role-specific elements for NIST p521 ...................................................................................................... 116 B.4 Role-specific elements for Brainpool p256r1 ............................................................................................ 117 B.5 Role-specific elements for Brainpool p384r1 ............................................................................................ 117 B.6 Role-specific elements for Brainpool p512r1 ............................................................................................ 118 APPENDIX C PKEX TEST VECTOR FOR NIST P256................................................................................................... 119 C.1 Initial state of Initiator and Responder ...................................................................................................... 119 C.2 Initiator generates PKEX Exchange Request frame................................................................................. 119 C.3 Responder processes PKEX Exchange Request frame........................................................................... 120 C.4 Responder generates PKEX Exchange Response frame ........................................................................ 120 C.5 Initiator processess PKEX Exchange Response frame............................................................................ 121 C.6 Initiator generates PKEX Commit/Reveal request.................................................................................... 121 C.7 Responder processes PKEX Commit/Reveal Request frame.................................................................. 122 C.8 Responder generates PKEX Commit/Reveal Response frame................................................................ 123 C.9 Initiator processes PKEX Commit/Reveal Response frame..................................................................... 124

2018-12-05

MIMO-OFDM Wireless Communications with MATLAB

Contents Preface xiii Limits of Liability and Disclaimer of Warranty of Software xv 1 The Wireless Channel: Propagation and Fading 1 1.1 Large-Scale Fading 4 1.1.1 General Path Loss Model 4 1.1.2 Okumura/Hata Model 8 1.1.3 IEEE 802.16d Model 10 1.2 Small-Scale Fading 15 1.2.1 Parameters for Small-Scale Fading 15 1.2.2 Time-Dispersive vs. Frequency-Dispersive Fading 16 1.2.3 Statistical Characterization and Generation of Fading Channel 19 2 SISO Channel Models 25 2.1 Indoor Channel Models 25 2.1.1 General Indoor Channel Models 26 2.1.2 IEEE 802.11 Channel Model 28 2.1.3 Saleh-Valenzuela (S-V) Channel Model 30 2.1.4 UWB Channel Model 35 2.2 Outdoor Channel Models 40 2.2.1 FWGN Model 41 2.2.2 Jakes Model 50 2.2.3 Ray-Based Channel Model 54 2.2.4 Frequency-Selective Fading Channel Model 61 2.2.5 SUI Channel Model 65 3 MIMO Channel Models 71 3.1 Statistical MIMO Model 71 3.1.1 Spatial Correlation 73 3.1.2 PAS Model 76 3.2 I-METRA MIMO Channel Model 84 3.2.1 Statistical Model of Correlated MIMO Fading Channel 84 3.2.2 Generation of Correlated MIMO Channel Coefficients 88 3.2.3 I-METRA MIMO Channel Model 90 3.2.4 3GPP MIMO Channel Model 94 3.3 SCM MIMO Channel Model 97 3.3.1 SCM Link-Level Channel Parameters 98 3.3.2 SCM Link-Level Channel Modeling 102 3.3.3 Spatial Correlation of Ray-Based Channel Model 105 4 Introduction to OFDM 111 4.1 Single-Carrier vs. Multi-Carrier Transmission 111 4.1.1 Single-Carrier Transmission 111 4.1.2 Multi-Carrier Transmission 115 4.1.3 Single-Carrier vs. Multi-Carrier Transmission 120 4.2 Basic Principle of OFDM 121 4.2.1 OFDM Modulation and Demodulation 121 4.2.2 OFDM Guard Interval 126 4.2.3 OFDM Guard Band 132 4.2.4 BER of OFDM Scheme 136 4.2.5 Water-Filling Algorithm for Frequency-Domain Link Adaptation 139 4.3 Coded OFDM 142 4.4 OFDMA: Multiple Access Extensions of OFDM 143 4.4.1 Resource Allocation – Subchannel Allocation Types 145 4.4.2 Resource Allocation – Subchannelization 146 4.5 Duplexing 150 5 Synchronization for OFDM 153 5.1 Ef

2018-11-13

Wi-Fi:802.11 物理层和发射机测量概述

本入门手册从整体上概括介绍了每项802.11 标准、其 物理层特点以及测试要求

2018-11-13

High-Accuracy Indoor Geolocation using Collaborative Time of Arrival (CToA)

Collaborative time of arrival (CToA) is the next generation, indoor geolocation method, which is designed for enabling scalability of the existing IEEE802.11/Wi-Fi-based, geolocation systems. The technique leverages on the IEEE802.11 fine timing measurements (FTM) capabilities, enabled in stateof- the-art Wi-Fi chipsets, and supports two concurrent operation modes; the CToA “client-mode” enables “GPS-like” operation indoors, and allows an unlimited number of clients to privately estimate their position and navigate indoors, without exposing their presence to the network

2018-11-13

精通Linux内核网络

《精通Linux内核网络》讨论Linux 内核网络栈的实现及其原理,深入而详尽地分析网络子系统及其架构,主要内容包括:内核网络基础知识、Netlink 套接字、ARP、邻居发现和ICMP 等重要协议的实现、IPv4 和IPv6 的深入探索、Linux 路由选择、Netfilter 和IPsec 的实现、Linux 无线网络、InfiniBand 等。 《精通Linux内核网络》不仅适合从事网络相关项目的专业人员参考,也能为相关研究人员和学生提供极大帮助。 目录 第1章 绪论 1 第2章 Netlink套接字 13 第3章 Internet控制消息协议(ICMP) 36 第4章 IPv4 61 第5章 IPv4路由选择子系统 105 第6章 高级路由选择 131 第7章 Linux邻接子系统 153 第8章 IPv6 192 第9章 Netfilter 227 第10章 IPsec 257 第11章 第4层协议 280

2018-11-13

802.11-2016

ieee-802.11最新协议802.11-2016,3000多页完整版,ofdma

2018-11-09

JSON.stringify 语法实例讲解.doc

非常好的实例讲解,可能有些人对系列化这个词过敏,我的理解很简单。就是说把原来是对象的类型转换成字符串类型(或者更确切的说是json类型的)。就这么简单。打个比方说,你有一个类,那么你可以通过这个方法转换成相应的json类型的

2014-02-14

webkit源码,保证有用

学习webkit很好的资源,从browserCreate开始

2013-08-25

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除