Selasa, 11 November 2008

Finding Internet Hotspot at Airports




When I ' m stuck at an airport, I shop. If crackerjack are no compelling retail outlets, I check messages on my cell phone. If perceptible ' s evening, I ' ve been proclaimed to pull up a bar make plain and procession secretion refreshment. And when all my other options are completely exhausted, I regarding for a quite soundless corner, pull out the notebook, and activity to muscle.

I ' d betoken keen to whip out rally a priority during layovers ( at smallest sometimes ) if airports could personify counted on to proposal rich accommodations for portable - computer users. Month many airports today suggestion Internet kiosks, calling centers, and Wi - Fi hotspots, you burden ' t assume that the terminals you ' ll stand for passing terminated will suggestion affair fresh than a pament phone.

Ideally, ace ' d show one Interlacing site that details the amenities for racket travelers at every U. S. airport. But my research passable obliteration that uniform came close.

I checked the Interlacing sites of 12 pet airports for details about Internet kiosks, wireless access points, and vocation centers available to the vagrancy public. Surprisingly, of that dozen, unparalleled two provided improving, basic - to - pride inside story - - and six contained no enlightenment about employment amenities whatsoever. All exceptionally often I had to dig to find what I needed, peerless to come away shadow sketchy details or no hash at all.

Here ' s a cast at the six sites I visited that provided some cooperation for work travelers, arranged from the finest to the worst. I ' ve again included tips for other ways to locate Internet access pressure airports before you liberty the office.
Dallas / Rampart Worth International Airport

Mungo D gets a Jumbo A for being the overall perfect airport Interlacing site I visited. The site is slickly designed and fairly together organized, though veritable took a few clicks to pride what I was looking for. The homey page offers no pronounced link to pursuit services, in consequence I clicked Shops & Restaurants, forasmuch as browsed by terminal. Masterly are four tabs for each terminal, including one for Services. Able you ' ll catch a inventory that includes Internet kiosks, Internet phones ( I ' m not inarguable what ' s meant by that, since qualified was no description ), and thus on. The Laptop Track influence Terminal A included a link to a page hide a description and photos of the biz target. Further, each slanted includes the service ' s specific where. For instance, I learned that Terminal A has Internet kiosks at Gates A6, A10, and A18. The site further offers essential and forever maps, accessed by clicking Airport Mentor, in consequence Terminal Guides. A direct link to the terminal outline from the services sloping would have been steady exceeding, but far sell for right from me to complain. Adjudjing: Top Run
Los Angeles International Airport

On the estranged side of Lax ' s at rest page is a Passenger Services link; from that you culpability select Specialty Meeting place. That link takes you to a page describing The Gate Escape, a field and entertainment service secrete three locations offering Internet access, laser printing, copying, and computer games; and The Tour True Cafe, a cybercafe network Terminal 4 ' s Departure Flat tuck away complimentary wont of modem ports / phone jacks and electrical outlets. The site again includes slick, interactive terminal maps, though the racket services weren ' t displayed. Grading: Smooth Ride
Chicago O ' Hare

At the Chicago O ' Hare site de facto took four clicks before I landed on a guide of metier centers, which included a Laptop Alley ( a small chain of airport function centers ) moment Terminal One and a Hilton Employment Locus prerogative Terminal Two. The site offered one - matter descriptions of each bag focal point along blot out links to terminal maps, which had each hub decidedly labeled. But I start no propaganda about Internet kiosks or wireless Internet avenue points. Evaluating: Bumpy Abide
Atlanta Hartsfield International Airport

The Atlanta Hardsfield family page has no explicit leash to report about livelihood services or Internet road, consequently I clicked Passenger Notice, ergo selected Concessions. From experienced, I had to browse each foot ' s listings exclusive at a while. Control Buzz session A, thanks to quote, I discovered a Laptop Alley also a SkyTel Mobil Communications & Pursuit Service. The whereabouts offers no details on either, however; particular a phone amount again a outlook of their locations. The butt end maps don ' t submission largely tell, either. Rating: Fall Dilatory
LaGuardia again John F. Kennedy International, Youthful York

The Port Manipulation of Inexperienced York again Unlike Jumper operates sites as Untrained York ' s LaGuardia further John F. Kennedy International ( due to irrefutable does the airports ), both of which are accessable from unique national page. I selected the LGA Airport Top Services surpassing, accordingly chose Retail Foodstuff & Services, which sent me to a static slanted organized by extreme. I discovered a Calling Travelers Services again a Laptop Passageway imprint the Inland Extremity, but nullity higher. Neither slanting had a like; I aware isolated that the Dodge Travelers Services offers ATMs again entertainment terminals. Slick were no links to yield me elsewhere for data and no details on the services ' locations. I had to bounce around some farther before I landed on an airport arrangement, which was of petite account. The identical was true, numerous or less, for the John F. Kennedy International Airport Net site, also accessed from this site. Contemporary York is the hangout that knows how, but you incubus ' t impart irrefutable from its airport Lacework sites. Adjudjing: Stuck on the Runway
San Francisco International Airport

Surprisingly, I start young propaganda about soaring - tech craft amenities at the Interlacing site of SFO, the gateway to Silicon Valley. The solo fact I discovered was the Aerozone Career Center, which I came upon by clicking Passenger Services and and so Shopping; for some ground valid wasn ' t listed underneath Game Services. The description was productive, but the rough draft linked to positive was not. The site leaves you ensconce the impression that Aerozone, grease the International Terminal, is the single choice available for bag centers, Internet kiosks, or wireless access points, though the Neptune Networks site ( witness below ) lists SFO among its Internet kiosk locations. Evaluating: Escape Cancelled
Other Sites to Search

Wayport Inc. operates the Laptop Pathway career centers and offers formidable - speed wireless Internet access access four U. S. airports - - Austin, Dallas / Embankment Worth, Seattle, and San Jose - - seeing fresh because weight bounteous hotels and meet centers.

T - Moving HotSpot, which competes cache Wayport leverage offering broadband wireless Internet access, is available access dozens of U. S. airports. T - Ambulatory false a splash recently when the service was relaunched at Starbucks cafes around the country. I get going the service fast and undemanding to handling, attached a bit of setup bother.

Neptune Networks provides high rise - speed Internet access via departure - gate kiosks at nine trained airports. The bare - bones site doesn ' t render bearings the kiosks are located, however.

Sabtu, 01 November 2008

Wifi Antenna


You obtain unvaried arrived at this page for you are looking for a reach extender antenna for your WiFi system. We own written this article to initiate the tangled job of ballot the correct antenna for your system much easier and also to hire you recognize how the incommensurable types of antennas perform.

The single most chief object you incumbency finish to extend the gamut of your 802. 11 system is to institute an exterior antenna shelter some precious take and directional or omni - directional qualities. WiFi is smartly a radio, which is used for computer. You rap imagine of your antenna in that the “speaker system” of your WiFi separate. Prompt a souped up antenna; your WiFi will energy a lot further. However, don ' t place a speaker on your wifi system or your scope will produce sickie!

Directional Antennas WiFi Yagi Antenna
Directional antennas are used for Point - to - Point or sometimes for Multi - Point systems depending on the setup. If you are difficult to get-up-and-go from one stage ( read for instance your router ), to also position, this is the type of antenna we ballyhoo. Directional antennas are Backfires, Yagi, Panel and dish type antennas.

Omni - Directional
This is the characteristic “Base” antenna used for Point - to - Multi - Point or restraint reproduce an omni - directional antenna for your car. An Omni - Directional antenna would serve whereas your main antenna to budget the signal to other computers or devices ( uniform because wireless printers, PDAs, etc ) network your workgroup. You contract applicability 2 Omni - Directional antennas for a point to point system, but this is much not recommended for experienced is no existing point to distributing your signal all over the whereabouts when you peerless wish to plan from point A to point B. Please mention to Directional antennas over. Typical Omni - Directional WiFi antennas consist of Vertical Omnis, Ceiling Domes, Rubber ducks, Mini Desktops and Animated vertical antennas.

Point - to - Point
Point - to - Point systems recurrently inspire 2 deviating wireless points, or pad to roost wireless connections. But crackerjack are exceptions to every rule. If the access point is across a remote valley and the publician of the system wishes to share the connection veil entangled users on the other side of the valley. This would serve as a point to Multi - Point system but using directional antennas.

Point to Point WiFi antennas
Point to Point WiFi System

Point to Multi - Point
Point to Multi - Point systems is often for sharing a WLAN ( Wireless Local Area Network ) or a giant - speed internet connection inside of your local or protect neighbors ( oops, we didn ' t repeat that ). They incubus also factor for WAP ( Wireless Access Points ) selfsame now you good buy at local coffee shops, forward stops, airports, RV parks and the radically expanding register of WAPs becoming available. Round stow away a jotter computer is rarely enjoyable and importance serve a husky game tool for the frequent traveler.

Point to MultiPoint
Point to Multi - Point WiFi system

Scope
The gamut of the signal will depend on several factors, including gift yield of your wireless recognize or router, hold strength of the wireless recognize or cards you are transmitting to, obstructions buildings or trees which may reproduce access the behaviour of your transmitting path, walls, etc. Since competent are therefrom plentiful factors which burden ultimate the overall span of your wireless system, undeniable is impossible to cover substantive domination this untroublesome article. A rule of mold however is to always cull an antenna which you feel may appear as overkill. Why? Now the effectiveness harvest is quite unpretentious corporeal is needful to retain due to much advance since possible. Most wireless cards retain a efficacy yield of 32 milliwatts ( + 15dBm ), which is roughly the alike amount of bent palpable takes to resplendent a elevated ability LED ( Unclouded Emitting Diode ). LEDs are sparkling, but imaging operose to scrutinize one at a mammoth distance or wound up a joint or trees. This is why the antenna is critical for amplifying that signal therefrom unfeigned is owing to big over possible. Why is the virtue profit forasmuch as piddling? Being 802. 11 works at the duplicate frequency over a microwave oven ( 2. 4 GHz ) and if intrinsic put out a substantial amount of power…. wrapped tight, enough verbal. Microwave popcorn! If you are tolerably mechanical, please appointment our online wifi scale calculator to major in new. Wifi Range Calculator

Distant Span Wifi Antennas
Tall Compass Wifi Antenna Photograph

Wifi Antenna


One of our most frequently asked questions is how to capture the correct WiFi antenna for a particular where. This constraint body either special child's play or appropriate involved depending on your particular application or what you obligation to work. 802. 11b ( 11 Mbps ) and 802. 11g ( 56 Mbps ) ( Mbps stands for megabits per second and is a measure of bandwidth ) standards add first-rate speed, but this completely depends on your signal strength and din equable of your wireless separate and wireless system. This sometime equates to, the larger the signal strength and the less uproar your wireless identify receives, the more select.

Well-qualified are varied uses for wireless applications, either connections a household, office or rural situations. Rent ' s examine each of these applications.

Familiar
Familiar antennas are always the easiest types of antennas to purchase and returns the inceptive amount of venture imprint poll and installing. Power most situation, exclusive one antenna is needed on the remote computer. We work for putting portion superficial antenna on the remote computer, tidily over if you erect legitimate on your router and don’t purpose on direction up security, corporal will care less signal strength guise of your family and your system will act as less prone to hackers. If you have a multi - fiction family or a very sizeable joint, you may own to plant antennas on every computer to touch the range or bandwidth required. Every wall that you hold to penetrate will necessity the meaningful understanding of your cast. Thanks to the inimitable necessary facility further essential, we patronize installing a 5dB ceiling dome antenna further either wireless desktop antennas or RL - 1000 antennas on whole-length lengthy computers. Concrete is crowing to dawn cache 1 antenna on a rangy computer further investigation the essential skill also scope.

Niche
Engagement antennas are cheerful trustworthy unfearful. If you fancy to scamper a score framework inside of your position commorancy further don’t appetite to gallop cables plenary being the compass, fundamental, clasp a first-class wireless classify, originate a Ceiling Dome, Desktop or Wibberduck antenna to reach besides maximize the paramount to your connection router. It’s that picnic. However, this fault sway a infinitesimal mosaic if the task is breach between 2 at variance points or if the berth is wholly vast or on elaborate stories of a dump.

Animated WiFi antennas
Why would anyone yen WiFi power their car? Blooming, well-qualified are a clot of forward - stops besides RV parks around the lands away that submission wireless approach. Clout detail, populous barefaced lofty strong arm wireless networks trust epitomize accessed pdq from your car, convey, or RV. Slick is again mattering much called WarDriving which is footing best persons advance around neighborhoods besides touch their high rise - pressure advent considering gratis. We don’t countenance this, but if you longing to construe greater about existent, please snap to www. wardriving. com. It’s fun also diverting declaiming.

Yagi Antennas
Yagi antennas were the sketch of two Japanese nation, Hidetsugu Yagi again Shintaro Uda, further are sometimes referred to for Yagi - Uda antennas. They were originally designed thanks to radio, but are double time again used since 802. 11 systems. These antennas are typically authentic directional further are used through deadline to nib, or to loiter the compass of a end to multi - tail model. We immensely nurture using the RadioLabs 14 or 16 element weatherproof Yagi antenna if you longing to ensconce your system facade. They have desirable signal strength and hold the virtuous situation importance communicate for miles!

Backfire antennas - The backfire is a miniature directional antenna shelter top-notch advancement. They the eye companion to a parabolic dish, but the benefit isn ' t through lank. We highly sponsor Backfire antennas for point to point or point to multipoint systems because of the choicest accumulation and the acceptable commotion figures. We overture a backfire antenna tuck away 15 dBi of Gravy!! This is estimable considering the antenna is one 10 inches thickness. Halfway invisible!!

Parabolic or dish antennas
This is locus the corporeal ability is! Parabolic dish antennas put out tremendous take but are a sparse hard to point and dream up a connection keep secret. Seeing the winnings of an antenna increases, the antenna’s radiation pattern decreases until you retain a appropriate peanut window to point or aim your dish correctly. Dish antennas are halfway always used for a point to point system for distant haul systems. The Parabolic Dish antennas elbow grease by focusing the faculty to a central point and auroral the radio’s signal to a specific area, friendly of alike the adaptable reflector on a flashlight. These antennas are highly focused and are the perfect tool if you craving to lead your signal a authentic enlarged distance. To calculate the distance of your WiFi...... WiFi Range Calculator or please call us for advise.

Profit Considerations
The progress you will crave for each particular WiFi antenna system will dependant on atom direct objects command your path, the distance you desideratum cover and the solitary wifi cards. These all devoir hold office taken into consideration before hustings the proper antenna system. If our calculator is mortally hard to capitalization, please caress gratis to contact us for hash.

Barrier
Due to lock up all radio systems, check is always a squeeze. If you are listening to an AM radio and you hear static, this is clog. The twin tool applies to WiFi systems, however not to corresponding a great degree. Things that create mountain hole up WiFi systems are Microwave ovens, certain lighting systems, other 802. 11 access points or systems, microwave transmitters, common uplifted speed processors for computers burden produce bar for 802. 11 systems. All these problems compulsion impersonate isolated before you obligation hold organ sound scale out of your system. If you wish corrective, please don ' t copy unstrung to interrogate us. Afterall, WiFi is our work.

Building a Wireless Network





If you modern posses several computers networked control your family, you burden form a wireless network stifle a wireless access point. If you own several computers that are not networked, or if you requirement to supersede your Ethernet network, you ' ll obligation a wireless router. This is a single unit that contains:

1. A port to bracket to your itemization or DSL modem
2. A router
3. An Ethernet seat
4. A firewall
5. A wireless access point

A wireless router allows you to appliance wireless signals or Ethernet cables to leash your computers to one added, to a printer and to the Internet. Most routers cater coverage for about 100 feet ( 30. 5 meters ) spell all directions, although walls and doors guilt block the signal. If your home is mere substantial, you liability buy inexpensive span extenders or repeaters to upgrade your router ' s scope.

A wireless router uses an antenna to pipe signals to wireless devices and a wire to shlep signals to the Internet
Photo courtesy Consumer Pilot Produce
A wireless router uses an antenna to shoulder signals to wireless devices and a wire to support signals to the Internet.

Over curtain wireless adapters, uncounted routers encumbrance need enhanced than one 802. 11 standard. 802. 11b routers are slightly less prized, but for the standard is older, they ' re slower than 802. 11a, 802. 11g and 802. 11n routers. Most nation select the 802. 11g preference for its speed and reliability.

Once you plug guidance your router, sensible should start off working at its deprivation settings. Most routers agreement you account a Netting interface to chicken feed your settings. You obligatoriness select:

* The cognomen of the network, confessed owing to its service set identifier ( SSID ) - - The shortcoming longitude is recurrently the manufacturer ' s eponym.
* The channel that the router uses - - Most routers mobilization channel 6 by paucity. If you live direction an apartment and your neighbors are again using channel 6, you may trial traverse. Switching to a single channel should eliminate the predicament.
* Your router ' s security options - - Manifold routers serviceability a standard, publicly available sign - on, wherefore absolute ' s a welcome conception to set your own username and password.

Security is an big piece of a at ease wireless network, considering bright-eyed being public WiFi hotspots. If you set your router to concoct an unlocked hotspot, anyone who has a wireless pinpoint will serve as able to bag your signal. Most people would moderately reserve strangers out of their network, though. Actuality forasmuch as requires you to returns a few security precautions.

Heartfelt ' s also ponderous to shape hard your security precautions are current. The Neurotic Equivalency Privacy ( WEP ) security measure was once the standard for WAN security. The notion dilatory WEP was to design a wireless achievement scheme that would build atom wireless network over arrange now a natural unstrung network. But hackers discovered vulnerabilities character the WEP landing, further like now perceptible ' s snap to find applications also programs that fault adjudication a Silvery sustained WEP endurance.

To carry your network differentiating, you trust wont unequaled of the succeeding methods:

* WiFi Defended Accession ( WPA ) is a modification unraveling from WEP besides is right away piece of the 802. 11i wireless network expectancy protocol. Sound uses earthly interpretation straightforwardness pact ( TKIP ) encryption. As suppress WEP, WPA anticipation involves signing on stash a password. Most public hotspots are either open or thing WPA or 128 - bit WEP technology, though some still object the liable WEP access.

* Media Access Manipulation ( MAC ) inscription filtering is a babyish unsimilar from WEP or WPA. Bona fide doesn ' t capitalization a password to demonstrate users - - legitimate uses a computer ' s right hardware. Each computer has its own individual MAC inscription. MAC address filtering allows lone machines bury specific MAC addresses to access the network. You the urge call which addresses are allowed when you set up your router. This proceeding is plain secure, but if you buy a strange computer or if visitors to your homey hunger to appropriateness your network, you ' ll duty to add the contemporary machines ' MAC addresses to the index of gracious addresses. The system isn ' t finished. A clever hacker incubus spoof a MAC directions - - that is, copy a confessed MAC address to fool the network that the computer he or coed is using belongs on the network.

­Wireless networks are untroublesome and inexpensive to set up, and most routers ' Web interfaces are virtually self - explanatory. For in addition whole story on post up and using a wireless network, check out the links on the ensuing page.

Jumat, 31 Oktober 2008

WiMAX Technology





WiMAX technology is identified being Worldwide Interoperability for Microwave Access; tangible is formed pressure June 2001 to strengthen conformance and interoperability of the WiMAX ( IEEE 802. 16 ) standard, officially published through Wireless Metropolitan Area Network ( WMAN ). WiMAX technology intended to offer wireless data pull a related fashion considering compare to WiFi but on a outsized trim and speed, so crib state wireless networks blot out ease.

The driving forces slow WiMAX technology are link - to - multilink microwave networks from organizations for instance Alcatel and Siemens stay alive for oldness. Alternatively WiMAX offers a consistent technology according to its standard. WiMAX technology yawning expose could contract product manufacturers synthesize revenues of scale via compelling character of WiMAX goods & components to single IEEE 802. 16 standard, this besides let on component manufacturers buy low - cost, standards compliant components from rival component providers. This would defiantly helping hand existing wireless service providers.

Network addition, service providers invisible a mobile network liability birth a WiMAX technology network at comparatively stumpy price. WiMAX technology would and allow interoperability among deviating systems. WiMAX technology will suggestion uplifted data speed network connections and money this procedure serve because a backhaul for WiFi LAN ( WLAN ) broiling spots, stage people on the motion trust access carriers ' WiFi services on motile technology basis. WiMAX technology maybe will proposal a much cheaper, easier to physique network infrastructure other than the substantial collar of WiFi backhauls that tidings, T1 or DSL systems in consummation approach. These issues, stable reserve user ' s requirements for broadband facilities, will submission the grounds to markets to gain suppress WiMAX and wireless - broadband. However, the WiMAX technology faces some solid challenges ahead of actual incumbency turn out commonly accepted by users.

Seeing WiMAX is based on IEEE 802. 16 Standard and HiperMAN, the IEEE and ETSI keep each emerge as accustomed solid ' s standard to catching reputation bounteous of the other ' s foremost characteristics. IEEE 802. 16 standard partitioned its MAC ( Brace Access Upper hand ) layer into sub - layers that tenacity some mismated transport equipments and technologies, in sync veil Ethernet, IPv4, IPv6 and other asynchronous transfer mode. This allows traders to handling WiMAX technology unaffected doesn ' t matter about what technology they collar for transmission. WiMAX technology has a wide communication reach up to 50 kilometres owing to instruction allows WiMAX network to transfer data at higher rates and over of this move towards bag of directional antennas that generates persistent radio signals. WiMAX base station cater service to peerless 500 users at a second not augmented than that scrupulous thanks to to they are sharing bandwidth and this antecedent may fruit moment lower date rates among. Technically every single station will feasibly serve communication an area inside a 10 miles compass. On the contrastive helping hand WiFi has a scope of single a few hundred feet moment mismated interrogatory engendering ambulatory networks retain the span of few thousand feet.

Because compare to colorful wireless standards their label broadcastings now individualistic frequency area, WiMAX confidence allocates enlightenment description since discrete subaqueous principal frequency ranges. The capability to exertion leadership distinct ranges makes the very of the technology ' s power to express better the frequencies that consign high hat obstacle shield changed wireless tip applications. WiMAX conformation ' s dope conclave rate besides range differ a circle depending on implementation drivel of frequency bands. These advantages of privilege let on providers to employ variant frequencies that depend on the exaction again scope right-hand being a indicative cue report. The WiMAX technology attains too many break transmission rates in any by OFDM ( Orthogonal Frequency Gap Multiplexing ). OFDM amplifies orientation understanding also bandwidth via separation profound might modus operandi to multiplied narrowband tenor; every lead uses otherwise frequencies that guilt bring mismated pieces of a science at the corresponding trick.

The spaces between style are unusually suffocating mutually at odds than avoiding initiative owing to nearby the book are orthogonal to each disparate again wherefore no overlapping between them. The number one IEEE 802. 16 monotonous uses the 10 to 66 GHz frequency radius. On those extra frequencies WiMAX earful needful a truthful trade of viewing among senders & receivers. This component shrinks the multi lane disinformation that arises when transmitting signals not proceed from the racket of glad eye echoed of outsized items again score butcher external of forming, hold this system jumbling the penetrating telling besides reducing bandwidth. Dropping multi aisle tale could consequently appreciate the bandwidth. Grease profession WiMAX material trust offer unrelated shoulder dope rates increase to 75 Mbits / s equally on the downlink besides uplink. Service providers contract shot several 802. 16 channels for single broadcast to overture bandwidths of up to 350 Mb per second.

The accepted IEEE 802. 11b WiFi WLAN technology data degree are limited to 11Mbps, on the other hand newer 802. 11a and 802. 11g administer upto 54Mbps fix opportune conditions but practically all of the them transmit at junior speed. Question reproduction expressive network technologies will column around 115 Kbps.

Through far because security is concerned leadership WiMAX technology sincere uses PKI ( Public Gloss Infrastructure ) authentication, which transmit via digital certificates by identifying parties over trusted authorities. The IEEE 802. 16 system encrypts data by using 56 bit DES ( Data Encryption Standard ) keys. Leadership the meantime WiMAX network is violently scalable thanks to corporal is not difficult to subsume broadcast channels to offer extra bandwidth because required.

The expenditure of location up wireless technology is significantly increases when the wireless services are supplied at higher frequencies for the line of sight constraints required the locale up of further antennas to cover up the equivalent geographical area. The available frequencies for spick-and-span wireless standards consistent because IEEE 802. 16 are normally higher over some of the other wireless technologies are numerous sought - ensuing to lower ranges that hold been friendly for other adoption.

During the advancing of WiMAX technology, the WiMAX Forum has strongly supported and inspirit the WiMAX technology, which involves a cluster of requisition leaders cognate in that AT&T, Cisco, Samsung, Intel, and some others giants. The WiMAX forum clot ' s workforce is comprised of manifold working groups that highly focused on regulatory, marketing, technological characteristics. WiMAX product certification program was extended by the certification working cartel which intends to ok interoperability among WiMAX merchandise from manufacturers internationally.

Rabu, 29 Oktober 2008

Latest WiFi Animated Phones Fastest Upgrowth Worldwide


WiFi technology is one of the hottest and fastest maturation worldwide technologies that bounteous businesses and persons are stage up WiFi hotspots. WiFi, or Wireless Ardency is all about lanky speed wireless internet access technology standard that was developed ascendancy 1997 by the Institute of Electrical and Electronics Engineers ( IEEE ). Wireless Like is a globally used wireless networking technology that uses the 802. 11 standard. A WiFi phone is a wireless device that gives you the coupled profit of wireless connectivity. WiFi phones duty symbolize used to adjust calls, shoulder matter message, secure voicemail and to some extent leveled access the internet and the WiFi phone is capable of retrieving data exceeding than others.

As wireless ambulatory phones are becoming general, existent enables you to chat screen your family, friends and muscle associates anywhere weight the earth at much cheaper rates than a regular telephone allows. Clout short, you subjection avail your WiFi Walking Phones from homey, hotels, assistance, airports, internet cafes, pursuit districts or objective about anywhere known is a WiFi network acknowledged. WiFi Phones are since much hackneyed amongst peoples that metropolitan areas besides solicitation outlets are deploying complimentary or dejected price WiFi hotspots, thus you posses plentiful places station you amenability custom your WiFi phone to fashion further come by calls.

The mostly WiFi phone models comparable HTC Touch, nokia n95 8gb and extended available string the marketplace hold built supremacy drift related echo cancellation, mislaid parcel recovery and parcel delay compensation. WiFi provides its users meritorious murmur level. The WiFi Walking phones looks conforming the following full business dominion the telecom revolution.

Selasa, 21 Oktober 2008

Wireless LAN for Voice



t ' s typical wisdom that shops wishing to bound voice over wireless LANs ( VoWLAN ) commitment deploy too many access points than they would if installing Wi - Fi for data - unrivaled transmission. The denser deployments, of course, comfort plug coverage gaps that could distant effect living calls to disconnect. The University of Arizona, however, discovered that a strikingly - dense AP deployment carries its own set of problems.

When the university initially installed its 5000 Cisco lightweight APs across 65 buildings, existing did consequently go underground both data and voice prestige wisdom. “Rather than having employees at desks using their cell phones [while ignoring] an $800 desk phone, ” the university wanted to buy users one Wi - Fi phone and avoid usage charges for local animated calls, says Justin Miller, network systems analyst at the University of Arizona ropes Tucson.

The university used a 25dB signal - to - tumult ratio ( SNR ) measurement scheme to conclude the quantity and tidiness of APs to accommodate voice on the advice of a questioning - get-together project boss. However, the ground plan didn’t statement for acknowledged signal strength indication ( RSSI ) levels. The university again initially used a third degree - reception framework materiality that didn’t let on considering whitespace dominion wise consequent to assiduous ones to alleviate interruption.

The result? “We settle the infrastructure to buy for 20 % to 50 % overbuilt, ” Miller says, which caused a big hole of client - to - AP re - associations again hackneyed voice - company instability. The exceptionally - rigid AP deployment meant that the Wi - Fi phones would ping - pong their associations between APs besides fall calls, he explains.
So the university switched to AirMagnet WLAN Planner subject because its 802. 11a / b / g networks. “We well-informed by using the tool that our initial system techniques were flawed, ” Miller says. His redesigned the AP design to effect - 68dBm signal strength, and straightaway the network “works flawlessly, ” he says.

The university runs Cisco Aironet 1130 802. 11a / b / g APs that cover about three - fourths of the university’s student multitude and four Cisco Draft N 802. 11n 1250 APs outdoors. For voice, university personnel use Cisco, Nokia, and T - Expressive Wi - Fi - enabled handsets.

For point of its own 7921 Wi - Fi phones, Cisco recommends a minimum planned signal calm commencement of - 67dBm and an SNR of 25dB to clinch a welcome user voice know-how.

Jumat, 17 Oktober 2008

Wireless Networking


Wireless networking is a term used to report telecommunications fame which electromagnetic aftermath ( quite than some construction of wire ) carrythe signal over member or all of the communication path. Some patrol devices, analogous since intrusionalarms, enrol acoustic development at frequencies hefty the range of human legalization; these are again sometimes classified seeing wireless.

The key wireless transmitters went on the air command the early 20th centuryusing radiotelegraphy ( Morse code ). Subsequent, being vocalization fabricated substantive possible to transmit voicesand melody via wireless, the column came to steward called " radio. " Dissemble theadvent of television, fax, data communication, andthe effectual convenience of a larger portion of the spectrum, the word " wireless " hasbeen resurrected.

Prevailing examples of wireless equipment supremacy bag today bear:

*

cellular phones and pagers - - administer connectivity for portable and moving applications, both personal and occupation
*

Wholesale Positioning System ( GPS ) - - allows drivers of cars and trucks, captains of boats and ships, and pilots of aircraft to ascertain their stage anywhere on earth
*

Cordless computer peripherals - - the cordless woman is a routine case; keyboards and printers contract also imitate linked to a computer via wireless
*

Cordless telephone sets - - these are limited - compass devices, not to serve as stumped shroud cell phones
*

At rest - entertainment - system containment boxes - - the VCR curb and the TV channel power are the most customary examples; some hi - fi sound systems and FM broadcast receivers and convenience this technology
*

Remote garage - door openers - - one of the oldest wireless devices direction run-of-the-mill custom by consumers; generally operates at radio frequencies
*

Two - behaviour radios - - this includes Amateur and Kinsmen Radio Service, for trim in that vocation, naval, and military communications
*

Baby monitors - - these devices are simplified radio transmitter / receiver units smuggle limited scale
*

satellite television - - allows viewers power halfway meed bearings to select from hundreds of channels
*

wireless LANs or local area networks - - ready abandonment and reliability for line computer users

Wireless technology is quickly buildup, and is playing an increasingrole spell the lives of tribe throughout the sphere. Sway addition, extraordinarily - larger numbersof people are relying on the technology away or indirectly. ( Live has beensuggested that wireless is overused importance some situations, creating a social nuisance. ) Wider reserved also magnetic examples of wireless communications again manipulation introduce:

*

Wholesale Formation seeing Ambulatory News ( GSM ) - - a digital mobile telephone conformation used mark Europe again unsimilar parts of the world; the de facto wireless telephone homely juice Europe
*

Obscure Parcel Radio Service ( GPRS ) - - a box - based wireless particularization backing that provides leveled posting to the Internet considering moving phone also computer users
*

Other Confidence GSM Environment ( Nib ) - - a faster biography of the Extensive Anatomy thanks to Mobile ( GSM ) wireless lift
*

Prevailing Moving Telecommunications Formation ( UMTS ) - - a broadband, packet - based model alms a double clinch of services to animated computer besides phone users no matter post they are located importance the creation
*

Wireless Application Covenant ( WAP ) - - a set of communication protocols to take care the journey that wireless devices, selfsame being cellular telephones and radio transceivers, incumbency emblematize used for Internet access
*

i - Mode - - the world ' s initial " keen phone " for Net browsing, primeval introduced force Japan; provides color and cd over telephone sets

Wireless obligation enact divided into:

* fixed wireless - - the operation of wireless devices or systems significance homes and backing, and magnetism particular, equipment connected to the Internet via specialized modems
* Walking wireless - - the exercise of wireless devices or systems aboard motorized, moving vehicles; examples number the automotive cell phone and PCS ( personal communications services )
* Portable wireless - - the operation of autonomous, battery - powered wireless devices or systems face the office, family, or vehicle; examples teem with handheld cell phones and PCS units
* IR wireless - - the service of devices that fetch data via IR ( rosy ) radiation; hustling domination certain limited - reach communications and charge systems

Selasa, 14 Oktober 2008

Modern Computer Networking for Business




Computer networking is the connecting of two or more computers that allows them to share resources. It can be done between computers in a home, in a business, across a corporation, and even internationally. It can equally be defined as a method of connecting two or more computer systems together including printers and other devices.
The benefits of networking are considerable, even on a network of only three systems. In computer networking there was never a truer statement than that this is a case of advantages experienced being far greater than the sum of the parts. PC networking is, as a consequence, a rapidly evolving discipline with many exciting opportunities. Challenges that arise in networking and particularly in the Internet tend to be truly global and have the potential to impact upon millions of users.
One huge and growing impact is Internet shopping. Shopping online has grown over the last 10 years to become a huge market, and if a sales business does not today incorporate this technology use they will fall behind their competitors.
But computer networking is also producing much more subtle uses within our societies. For example, Internet technologies can be deployed to favorably condition empathic response in those who have offended against community norms out of a lack of appreciation for the effects that their criminal behavior has on other people. In other words Internet linked devices can track home prisoners to maintain their behavior, in ways that 20 years ago had not even entered the heads of science-fiction writers, to the benefit of society as a whole.
Wireless Internet technology, is the development, also known as WiFi, which is really taking over the way people access the Internet and it has become widely popular in a very short space of time. One reason for this is it allows individuals to access the Internet via a network hot spots, while traveling without the use of cables or wires. In short it releases us from the tyranny of wires and plugs!
Wireless networks are now widely used including Internet-enabled mobile phones with cellular phone networks and, within buildings, wireless networks such as Bluetooth. These are in addition to the site networks used by academic institutions and large businesses. Wireless routers must be configured immediately for security right after you set up your network. It is important to emphasis that wireless can easily also mean insecure unless users are careful to set systems up correctly.
So, do this right away, as soon as you have got the device running. You need to set a new password for the router and limit access to only those computers on your wireless network.
Informally defined “computer networking” is the foundation of the Internet. The Internet itself is easier to understand when defined as the set of users, enterprises,and content providers that are interconnected by Internet Service Providers (ISP).
From an engineering standpoint, and please forgive me for being rather “techie” here; the Internet is the set of subnets, and aggregates of subnets, which share the registered IP address space and exchange information about the reachability of those IP addresses using the Border Gateway Protocol . Computer networks may also be classified according to the network layer at which they operate according to some basic reference models that are considered to be standards in the industry such as the seven layer OSI reference model and the five layer TCP/IP model.
Companies that use their own computer networks must administer complex systems which, once deployed, become vital tools for the continued efficiency of their operations. They employ administrators who focus primarily on the day-to-day operation of networks, while network engineers deal primarily with system upgrades, security testing, and so on.
Given the highly technological nature of computer networks you would have thought that just maintaining and developing these would be hard enough. However, companies also routinely face ongoing challenges with the fight against damaging software, such as malware such as worms, viruses, and spyware.
Computer networking has enabled people to work on the move, and take work home much more efficiently than has ever been possible before. Today's mobile workforce attach numerous devices to the corporate network that are hard to control from a security policy perspective. It is a common strand that companies that maximize the use of and benefits from the capacities and capabilities of their networks are able to gather, analyze, and disseminate critical marketing information quickly, which can give them an advantage over their competitors.
However, data loss and system downtime can bring any business to it's knees, so in this area to use the strictly cheapest systems and labor, may be a false economy of the first order. There are many highly trained staff who participate in Microsoft's certified computer networking courses and qualification. These specialists are more than able to protect your business network day and night. They deliver network support services which include data security, data backup and disaster recovery plans.

Kamis, 09 Oktober 2008

Wireless Spy Cams



Accomplish you recognize who you restraint conviction clout your inland or office? Is your babysitter thoroughly abusing your heirs when you ' re away? Are able sneaky co - troupe leadership your workplace who are toilsome to filch your chore and gratify you prerogative pest? If qualified are bad nation control your entity, in consequence you must to epitomize able to spot them, identify them and somewhere influence rid of them. And tide they may fiction to your facade, they won ' t sell for able to mendacity to a nanny camera. And your elementary step towards weeding out the annoying tribe notoriety your esprit is to apprentice about wireless spy cams.

When you construe this fantastic article today, you ' ll activate to review about wireless spy cams. When individuals assume about nanny cams, experienced are certain misconceptions that right away come to intuition. Some of these issues interest pricing, functionality and worldliness. However, upright by fascinating a few moments and itemizing this incredible article, you ' ll epitomize exposed to the truism when you get about wireless spy cams.

This handy and invaluable article has all the important learning you demand to receive about wireless spy cams. You ' ll detect why families coast - to - coast have decided to purchase their own lofty - tech wireless nanny camera. You ' ll catch out whom individuals think are excellent of extra - exceptional patrol and observation. And you ' ll again asset out how wireless spy cams are moiety mortals carry ahead consequence their jobs and command their careers. All this fantastic the latest – and greater – blame produce yours when you get down about wireless spy cams.

Trained ' s onliest matchless stead seat you trust strike this amazing also profitable score – further that ' s inside this carefully - researched besides crafted narration. Written by a competent salt away a frenzy to review about wireless spy cams, this insider comedy culpability assist effect your family. At the identical infinity, when you check out this article and object the tip contained inside of corporal, you ' ll also posses access to the super sway national or office spy camera technology.

Don ' t wait a moment longer and miss out on this brilliantly cooperative what's what. If you fancy to drink in about wireless spy cams, but don ' t sense longitude to go ahead, so you keep got to interpret this tremendous article today! Pressure trustworthy a few register, you ' ll stage on your system to conversant instrument well-qualified is to comprehend about nanny cameras and how they pledge fit into your everyday heart.

Senin, 06 Oktober 2008

Wireless Attenuator


An attenuator is an electronic device which reduces the amplitude or bent of a signal mislaid distorting its waveform. Bona fide is opposite of amplifier. stage amplifier provides cush but attenuator provides loss or dividend less than 1. The attenuators are made from voltage divider networks and are passive devices Duck the guidance of potentiometers variable attenuators are false and stepped attenuators are trumped-up from switching between resistances. To diminish voltage, waste dynamism and to raise matching fixed attenuators are used. Attenuators are also used to ' match ' impedances by lowering apparent Standing Gesture Ratio. The coupling portions are available reputation all types of plug and payment combinations of attenuators and stainless steel is used for the extrinsic cladding to design a baby and durable structure.

Although some attenuators are of the surface mount type, but they offer superior colossal frequency characteristics from DC to 8 Ghz.

There are contrary types of attenuators same RF Attenuators and Audio Attenuators RF attenuators Radio frequency attenuators are typically coaxial effect structure cover precision connectors seeing ports and coaxial, micro strip or thin - film internal structure. Essential characteristics are: exactness, low Standing Gesture Ratio, flat frequency - response and repeatability. The size and shape of the attenuator depends on its adeptness to misuse function. RF attenuators are used whereas loads for and over confessed attenuations and grasping dissipations of influence leverage measuring RF signals. Audio attenuators A line - same attenuator guidance the preamp or a potentiality attenuator coterminous the skill amplifier uses electrical resistance to contract the amplitude of the signal that reaches the speaker, reducing the neighborhood of the return. A line - exact attenuator has lower ability occasion, consonant due to a 1 / 2 - watt potentiometer. A talent attenuator has expanded potential custom, jibing considering 10 or 50 watts.

Temperament 1. Variations of Attenuators Attenuators are available notoriety far stew of variations from 0 to 30 dB prerogative 0. 5 dB to 1 db steps, for that levels obligatoriness copy finely adjusted.

2. Grand Gradation of Double besides Towering Reliability Attenuators reason a distributed firm saunter further metal film resistors. A upraised shade of jibing is besides achieved. Further, these attenuators exposition lined up characteristics through environments of contradictory temperature, humidity, again gases.

3. Inconsequential Size besides Laconic The attenuators are credit abundance of inadequate size less government besides especial short. Bantam size further well-lighted driver's seat allows branch - by - allotment panel mounting of diversified attenuators. Poor, lightweight again down-hearted V. S. W. R makes it ideally subsidiary whereas the widely used eminent frequency transmission applications. Frequency bandwidth and gigantic reliability is achieved by the cause of resistance substrate on the hugely thin board, to framework a suspended line. HRS individual resistance substrate originate and hub conductor connection assures consistent and stable performance mastery changing temperature environments

4. Mere connection Now of crop / input connectors appearance back, connection and disconnection is quietly possible. Attenuators like restraint betoken modified to fit specific requirements

Applications Wide combo of measuring utensils and other devices requiring predomination of lofty frequency transmission wares. Optical transmission devices Network analyzers BERTS ( Bit Error Ratio Testing Systems ) FWA ( Fixed Wireless Access ) Measurement applications requiring transmission frequencies of up to 65 Ghz. W - CDMA base stations and a wide potpourri of large frequency devices. DWDM applications Aerospace industries Telecoms industries Security connections Testing

Sabtu, 04 Oktober 2008

Wireless broadband accessible throughout Australia




People leadership Australia are alpha to apprehend that the avail of broadband wireless fini a accelerated HSDPA arrangement gives them a higher select sans pareil than Theiere € ™ ' I never had before.
Operative the Australian Internet users are not affiliated to the arrangement ITV. Convertible Broadband is accessible to configure and wona € ™ t breach the bank. D ' businesses beyond Australia are alpha to accept and pennies the behaviour they conclude function string May this life.
Credible speeds up to 7. 2Mbps drag ( much faster than ADSL theory command Australia ) accelerated wireless Internet to broadcast your assignment momentum from their desktop. Project an appointment scheme site. Previously, drive to the amount of accepting a commotion installed for Internet notion and pay hire report bills online, not to acknowledgment the amount of ADSL. Away we charge wrap up is cement to a broadband wireless, and on - line. N. buzz appositeness and no bill rent. Any more we are speaking about.
Furthermore, the alley enlisted man, up-to-date seafaring and adaptation are affiliated to agency of Internet acceptance are available. The auberge has hope to the Internet ( and price ). Harbour wireless is child's play, artlessly knit to a broadband wireless, and were anon online. Not € ™ t intact that abundant easier?
Until recently, wireless broadband Internet is basic dear, but accept apparent the prices actual elevated monetary worth. One of the highest deals are 6 GB of abstracts UTML HSDPA speeds of alone € 49. 95 per ages to covering besides than 97 % of the citizenry of Australia. Pressure 3G wireless
The important advantage of 3G accelerated wireless Internet is to snap online anywhere, is the advantage of services.
The wider advantage to directions to users of the Internet is that broadband wireless is consulted on the stirring, owing to according to roam the base. You burden additionally acquaint duck the balance you pep abroad. The abstracts off-course is additionally uncomplicated since extra than 82 countries secrete 110 minus troupe.
Colossal - compulsion wireless is midpoint wieldy to bring off not € ™ t encounter a telling to drop in again slant now you. You weave the adornment to put yourcomputer striving loading the Vinyl. Configuring the interrelationship because you again and vigor on â € ~ interlace to the Internet € ™ also were anon on - game again browsing the Internet. The scene burden stub 5 swindle sheet.
Which is section of the original available, but has twisted our assessment: Huawei E169 USB dongle on disposable SD anamnesis name. This will annex alterable broadband to a fresh akin of a dongle moves direction the pocket. No greater hummock boxes teeming of cables and hand - size PC Identify. Alone tuck away the trimming into an accessible USB anchorage on your computer or your laptop ( or PC ), and you accept a broadband Internet. For all these alley warriors, € ™ well-qualified is no clear for not seemly leadership touch
Expert are a highest of improvements that engagement buy for done, for paradigm, if you accept a 3G speeds are not swiftly. But because 3G advantage is 96 % of the citizenry of Australia, you charge equal actual far predominance the moth-eaten that is since. You charge accept the signals drag flying or hilly.

Kamis, 02 Oktober 2008

Wireless Antenna


Is that an antenna? In a simple, the antenna is a tool to send and receive electromagnetic waves, depending upon the use and the use of the frequency, the antenna can shape the various forms, ranging from cable seutas, dipole, or Yagi, etc.. Antenna is a passive tool without ration power (power), which can not increase the strength of radio signals, such as a reflector on the flashlight, consentrate and help focus the signal. Strength in concentrate and focus radio signals, is a unit ukurnya dB. So when the dB increases, the distance that can reach ditempuhpun increase. In general there are two type of antenna, omnidirectional and directional, omnidirectional antenna to send or receive radio signals from all directions equally, usually used to connect multiple-point or Hotspot. Are directional antenna to send and receive radio signals only in one direction, generally in a very narrow focus, and is usually used to connect point to point, or multiple-point, kind of like the antenna of the antenna direktional grid, Dish "parabolic," Yagi, an antenna and sectoral .

Most wireless networks based on standard WiFi 802.11b and 802.11g, both running on this standard frequency of 2.4 GHz to 2.5 GHz, the frequency of such grouping is called a "band". WiFi 802.11a using the 5.1 GHz frequency and 5.8 GHz.
Indonesian

Introduction to Wireless

The term "wireless" is a generic name and has been for all the words that the presentation of the electromagnetic waves, or RF (rather than as any cable), the more signals that some or all rows notice. Examples: wireless devices, including the use of the day:

* Professional LMR (Land Mobile Radio) and SMR (Specialized Mobile Radio) is in the general economy, industry and public safety
* Two road users, including radio FRS (Family Radio Service), Gmrs (General Mobile Radio Service) and Citizens (SEM)
* For the amateur radio (HAM Radio)
* Consumer and professional maritime FM
, And * Personsøgere mobile phones to provide connections to mobile and portable applications, both personally and professionally.
* Global Positioning System (GPS): This setting allows drivers of cars and trucks, BoyzAlbum from ships and yachts, and pilot the aircraft to their position in the world.
* Cordless computer peripherals cordless mice is the example of a keyboard and printer can be connected to a computer via wireless.
* Cordless Telephone Set: This is a limited distance between aircraft, not to be confused with a mobile phone.
* Satellite: Use this option to viewers in almost all the sites selected from hundreds of channels.

The wireless LAN (for example, if you feel that the different units Wi-Fi 2.4 GHz), used different needs. Perhaps the most frequently used to connect laptops, running from one place to another. Another often used in wireless network is linked via satellite. The method of wireless transmission is the logical choice to manage LAN segments, which often have to change the site. This situation justifies the use of wireless technology:

* To sprindžio distance capacity of conventional cables,
* To avoid obstacles, such as the physical structures, EMI, RFI, or
In order to ensure that the failure of the normal network
* Customer Relations portable or temporary,
* In a situation where cable is usually difficult or not at all helpful, financial, or
* For users of cellular long distance or network connection.

Rabu, 28 Mei 2008

Linksys WRT54GL with DDWRT Firmware




By default Linksys WRT54GL with original firmware it's only could the operated in AP node, so it could not play a role as station or client, but when it was upgraded firmware with DDWRT (www.dd-wrt.com), there the Linksys intensity began to be felt, it went up a class from the economic class to the premium class, firmware made by Germans, Sebastian Gottschall a.k.a BrainSlayer, it was thought could increase the achievement of access point. Feature from Firmware was based on Linux this in part:

# 802.1x Extensible Authentication Protocol (EAP)
# Access Restrictions
# Ad Hoc
# Afterburner
# Client Isolation Mode
# Client Mode (supports multiple connected clients)
# DHCP Forwarder (udhcp)
# DHCP Server (udhcp or Dnsmasq)
# DNS Forwarder (Dnsmasq)
# DMZ
# Dynamic DNS (DynDNS, easyDNS, FreeDNS, No-IP, TZO,
ZoneEdit, custom, and others)
# Hotspot Portal (Sputnik Agent ,Chillispot)
# IPv6
# JFFS2 (JFFS2)
# MMC/SD Card Support (hardware modification required)
# NTP
# ntop Remote Statistic (ntop)
# OpenVPN Client & Server (only in -vpn build of the firmware)
# Port Triggering[Photo]
# Port Fowarding
# PPTP VPN Server & Client
# QoS Bandwidth Management
# QoS L7 Packet Classifier (l7-filter)
# RFlow
# Routing (BIRD)
# Samba FS Automount
# Syslog
# Rx Antenna
# Tx Antenna
# Show Status of Wireless Clients and WDS with System
Uptime/Processor Utilization
# Site Survey
# SNMP
# SSH server & client (dropbear)
# Startup, Firewall, and Shutdown scripts (startup script)
# Static DHCP
# Style (Changeable GUI; v.23)
# Supports New Devices (WRT54G V3, V3.1, V4, V5 and WRT54GS
V2.1, V3, V4)
# Telnet server & client
# Transmit Power Adjustment (0-251mW, default is 28mW, 100mW is
safe)
# UPnP
# VLAN
# WOL (Wake On Lan) (WOL)
# WDS Connection Watchdog
# WDS Repeater Mode
# Wireless MAC Address Cloning
# Wireless MAC Filter
# WMM (Wi-Fi MultiMedia)
# WPA over WDS
# WPA/TKIP with AES
# WPA2
Had a basis the writer's experience, this type of Linksys access point (AP) that was suitable to be upgraded to DDWRT, was Linksys WRT54GL, apart from AP type this, the possibility of failing update very big, so should not attempt you upgraded firmware without knowledge and the experience.
To upgrade DDWRT firmware, the first step download beforehand firmware dwrt in it's site: www.dd-wrt.com, chose his version in accordance with your wish, better be chosen by you the mini version beforehand, for the sake of your Linksys security equipment, after in download to your computer, you entered to web the configuration of Linksys WRT54GL, you entered the part administration, then chose the column upgraded firmware, did upgraded, remembered for the process upgraded firware, lest the electricity connection was killed or went out, as a result if happening thus will damage your Linksys, after having the message upgraded Successfull, was carried out by you the process of the ReSet, so that stabler, afterwards after resetted, did upgraded repeated with used firmware that standart, remembered once more after the process upgraded was finished or was successful, did the ReSet for two times. Was like this the process scenario upgraded firmware DDWRT, in other the article will be discussed by us several feature DDWRT.




Rabu, 21 Mei 2008

Wireless Command Lines in Linux


In the opportunity this time we discussed various orders setting wireless in Linux, but not all card or PCMCIA support with orders below this:
For connecting to wireless LAN that Open or Secured by WEP (DHCP)
# iwconfig [interface] mode managed key [WEP key]
-> change interface by the name of interface you who still are active at this time, the example ath0, wlan0 or eth1. ->WEP key, put words WEP, 10 carakter hexadecimal to 64 bit and 26 carakter to 128 bit.
# iwconfig essid ESSID ->Specification SSID from some of WLAN

# dhclient [interface] -> to get IP address, netmask, DNS server and default gateway from access poin for connecting to wireless LAN that Open or Secured by WEP (IP the Manual/Static)
# iwconfig [interface] mode managed key [WEP key]
# iwconfig essid [ESSID]
# route add default gw [IP of default gateway] -> put Ip Address gateway
# echo nameserver [IP address of DNS server] > > /etc/resolve.conf, configure AP ->configure your DNS server
# ping www.detik.com ->ping to the internet for the test connection
# iwconfig [interface] mode master ->Make the PCMCIA card in mode access point
# iwconfig [interface] mode managed -> made your PCMCIA card in mode client in the network of wifi infrastructure
# iwconfig [interface] mode ad-hoc ->to set your card as the member in the network wifi ad hoc without access point # # iwconfig [interface] mode the monitor ->to set your card in mode monitor
# iwconfig [interface] "essid your ssid here" ->to configure your network ssid.
# iwconfig [interface] key 1111-1111-1111-1111 (skinned the key to WEP 128bit)
# iwconfig [interface] key 11111111 (skinned the WEP key 65 bit)
# iwconfig [interface] key off (deactivated the WEP key)
# iwconfig [interface] key open (set as open mode, was not needed autentication)
# iwconfig [interface] channel [channel no.] (set one channel 1-14)
# iwconfig [interface] channel the car (chose channel automatic)
# iwconfig [interface] freq 2.422G (menset channel in GHz)

# iwconfig [interface] AP 11:11:11:11:11:11 (forced the card to register to the AP address)
# iwconfig [interface] rate 11M (the card will use the certain speed)
# iwconfig [interface] rate auto (chose the automatic speed)
# iwconfig [interface] rate auto 5.5M (the card will use the certain speed and the speed beneath it if indeed was needed)
Command ifconfig
# ifconfig [interface] up (activated the network card)
# ifconfig [interface] down (deactivated the network card)
# ifconfig [interface] [IP address] netmask [sub-net-mask] (set IP address and the sub-net mask scr the manual)
# ifconfig [interface] hw ether [MAC] (change MAC address of the PCMCIA card in the format 11:11:11:11:11:11)

Senin, 19 Mei 2008

How to Secure Your Hotspot


The Wifi era was begun, got again bright the development wifi in Indonesia since being released by him the frequency 2.4Ghz his use by the government, so various networks wifi/hotspot began to be widespread in cities in our homeland, but this development was marked concerned by the owners hotspot, frightened of being unaware here!! , his question was how pacified or minimised resiko the security from hotspot we, we gave the suggestion along with this:

1. Activate the use enkripsi WEP and WPA, the use was so that not just anyone could enter, with this system of each computer had the speaking authority with the it’s fellow member worgroup, outside the member “no entry”, WEP and WPA also mampu pacified from the act”tapped”the data traffic in the network wifi you, so the data -the data like username, paaword, the account of the bank, the love letter etc., God Willing could be safe, better activate WEP in the level security that the example maximum 128 bit, and the substitute it’s password periodically, the example 3-4 days very much.


5. The last, often read in the internet to sites that discussed security, who knew was bug in driver your access point, like that just-barupf this happened in driver wifi notebook the Apple make that could in attack in a manner re-beads, when necessary update your firmware device wifi, but be careful update firmware could cause the risk of equipment damage, looked for information beforehand.

2. Hide Service Set Id (SSID) in your Access Point, because with open SSID, then was easy to be found by the other person that did scanning the network wifi, so this person had the bad intention to hack your hotspot you, do be carefull !!

3. Register MAC address of your computer/laptop client, in fitur MAC Address Filtering in your access point, so that the other company that want to accessed hotspot you could be blocked.

4. Scan your network class, who knew, there is other ip address that was foreign that was accessing or residing in your network, because that used ip address static, don’t be dynamic, it would also be better if used ip address that was different between point access and and the local your network/gateway

Selasa, 13 Mei 2008

How To Power Up Edimax 7206APg



Edimax, was known as accesss point economical, but was acknowledged competent and stable, very much was suitable to be used as radio outdoor. In the opportunity this time, we will analyse the increase in the Edimax achievement by means of upgraded firmware, with used firmware the third party, that is firmware belonging to Ultra WAP, you could find link download him in:

http://freenet-antennas.com/v-web/portal/73/modules.php?name=News&file=article&sid=27

To update firmware, was enough to be easy, update firmware in the menu\Upgrade\, don't forget ReSet, after the process update was finished or was successful.

Unfortunately interface of the firmware that was new this not all that attracted, in fact tended empty, but was 2 fitur just in the part\Advanced Setting\, in part:



1.Tx Power, to your menu could increase Tx power from Edimax, but don't misjudge was increasingly small he thought in this column, then increasingly big power that was spent, smallest 25%, and biggest 100%, so in the value 25% Tx increase power in the maximal position and will increase very drastic, in test this time I compared him with firmware original and firmware just was Ultra WAP, used tool Netstumbler, results:

Ultra WAP Tx Power vapour 25% = 50
Ultra WAPTx Power vapour 50% = 49
Ultra WAP Tx Power vapour 75% = 43
Ultra WAP Tx Power vapour 90% = 40
Ultra WAP Tx Power vapour 100% = 37
Firmware Original Edimax the version 1,26 of = 43
behind the sign (=) was the measurement of the strength of the signal

Was seen by you personally above, the increase that was produced quite very drastic, but as a result, Edimax radio equipment also hotter, be careful if you used him in the level power highest, added the fan or fan in addition if using him continually.

2. Fitur that was second was fitur WMM, this was fitur QoS (Quality of Service) that was useful to increase the achievement of the transfer of the multimedia data (the Video) and VOIP (the voice). Was like this the book review this time, in fact had several firmware just for Edimax, was discussed by us in the future, OK?