Wi-Fi, Wireless Technology, Wireless Fidelity, WiFi,Wi-Fi News

Wednesday, November 5, 2008

WiFi News

Atheros thinks 802.11n has potential to replace 802.11g by using Antenna:
Atheros has developed chip that uses just a single Antenna to get out of amazing features of 802.11n without the help multiplexing concept. It seems to improve receiving quality, transmitting rang along with some other characteristics. Atheros plans to go way beyond 802.11n characteristics to meet future design and products.. Read more about Atheros..
illegal downloading at Universitry of North South Wales:
Students are fined A$1000 for downloading illegal contents declared by IT manager at Australian university. For this act of students free Wi-Fi may be turned of and will not be available for use. Read more about illegal content downloaded using free wifi t illegal content downloaded using free wifi .

National baseball team with Wi-Fi in ballpark:
National team of Washington of baseball have installed Wi-Fi 802.11n network enable from Meru to ballpark. That is amazing as this will help players to stay connected with their fans all the time, they can see instant reply to the games, send photos and applications using Wireless networking facility. The entire set will cost around $280,000 for about 200 access points. for now, Wi-Fi is only used to scan tickets wirelessly from different entry points and gates. Read more about Wi-Fi in Ballpark

McDonals is offer Free Wi-Fi service.
In Australia McDonals is going to offer Free Wi-Fi service starting from this december. There are about 720 outlets which would be available to access Wi-Fi for free with the help of partnership with Telstra by March 2009. Learn more about McDonals Free Wi-Fi
IEEE STANDARD introduced 802.11r for faster roaming:
New standard is approved by IEEE for fast roaming that is 802.11r. This will help in improving handoff of connecting devices to the base stations. This standard will help in enhancing quality of service and security for using VoIP over Wireless LAN. It will prevent delays in authentications and handshaking between connections.
Wi-Fi enabled Air flights trend is on:
Aircell is now forth airline to have in-flight Wi-Fi technology. Other three Airlines who have in flight Wi-Fi service available is amercian airline, Delta and virgin america. Aircell have installed Wi-Fi service in most of their planes and they plane to have
wireless service to their all planes.
Researchers have developed Vi-Fi:New methodology is developed by researchers and they called it Vi-Fi. This method will allow maintaining connections with multiple base stations at once using primary access point for traffic.

Coffee Bean & Tea, Provides Free Wi-Fi:
The chain of Coffee Bean & tea leaf have decided to provide free Wi-Fi service installed to all stores owned by company. This chain approximately have 700 stores and out of which company owns 300, that’s a lot of free Wi-Fi.
WiFi- WIRELESS FIDELITY -WIRELESS NETWORKS - Wi-Fi
Wi-Fi is wireless technology which enable connection between two or more devices wirelessly for data sharing puposes.It is wireless networking which is based on IEEE 802.11 standards. it is now being used by millions of people using various devices such as personal computers, laptops, pdas', printers, camera, games, mp3 players etc, more and more gadgets are coming with built in feature of this amazning wireless technology.

Computer usage has dramatically increased in past few years which in result brought immense technology enhancement in every field possible. Technology has reached to its heights but thirst of knowledge is still in race and will always be till end of the world. Wireless communication between computers is certainly one of the most appreciated and used technology globally. In “Computers” Wi-Fi replaced traditional wired networks between two or more computers, it enabled file transferring from server to clients and vice versa possible without wires, networking cards, hubs and other important networking related hardware. Using Wi-Fi internet connection can be shared among computers with minimum usage of hardware, WLAN cards enable feature of wireless networking among devices, wireless routers help to broadcast wireless networking signals in given area.

WiFi is a long-distance, transportable connectivity technology for individual, business or for certain geographical area. Millions of people all over the world use WiF in their homes to converse to anyone on the planet with WiFi connected devices. This technology was make-believe by the Institute of Electrical and Electronic Engineers in 1997. Through wifinotes.com you can take pleasure in the experiencing precisely what is all about wireless networks. Here you can get detailed information about WiFi, how it works, WiFi Security which tools protect your wireless network more etc. Enjoy knowledge of broad selection of W-Fi product such as Desktop Wireless Wi-Fi Cards, Laptop / Notebook Wireless Wi-Fi Cards, Wireless Wi-Fi Routers, Wireless Wi-Fi USB Adapters, and Handhelds and PDAs.

Wifinotes.com comprehended the wifi limitations as security concerns, interference from other devices, and lacking high-quality media streaming, terminologies such as gigahertz, wibro, hotspot, wifi finder, and access point, features, pan including loss of confidentiality, loss of integrity, loss of avaiability, and solution like management solutions, operational solutions, and technical solutions and types of network as you get more about wifi. If you are going to make a wireless network and you are looking for how to do it ? then you are at very right place here you will spend less time and learn more because we are here for those who want a bit more . Now days every one has crazed of wireless network due to services beyond imagination. Here you will find all features of wifi where you can understand how much useful they are for you. Browse each section of website to understand concept of wireless networking.

Wi-Fi is on going technology, every now and then some thing new in wireless technology shows up. Wi-Fi technology is by far the most used technology world wide as every one is realizing growing needs for being wireless which is impacting our daily lives and our businesses. In below section we will talk about latest news related to Wi-Fi from around the world wide.





What is WiFi

WHAT IS WiFi AND WIRELESS NETWORKING

Wireless Fidelity – popularly known as Wi-Fi, developed on IEEE 802.11 standards, is the recent technology advancement in wireless communication. As the name indicates, WI-FI provides wireless access to applications and data across a radio network. WI-FI sets up numerous ways to build up a connection between the transmitter and the receiver such as DSSS, FHSS, IR – Infrared and OFDM. The development on WI-FI technology began in 1997 when the Institute of Electrical and Electronic Engineers (IEEE) introduced the 802.11 technology that carried higher capacities of data across the network. This greatly interested some of major brands across the globe such as the world famous Cisco Systems or 3COM. Initially, the price of Wi-Fi was very high but around in 2002, the IT market witnessed the arrival of a break through product that worked under the new 802.11 g standards. In 2003, IEEE sanctioned the standard and the world saw the creation of affordable Wi-Fi for the masses.


Wi-Fi provides its users with the liberty of connecting to the Internet from any place such as their home, office or a public place without the hassles of plugging in the wires. Wi-Fi is quicker than the conventional modem for accessing information over a large network. With the help of different amplifiers, the users can easily change their location without disruption in their network access. Wi-Fi devices are compliant with each other to grant efficient access of information to the user. Wi-Fi location where the users can connect to the wireless network is called a Wi-Fi hotspot. Through the Wi-Fi hotspot, the users can even enhance their home business as accessing information through Wi-Fi is simple. Accessing a wireless network through a hotspot in some cases is cost-free while in some it may carry additional charges. Many standard Wi-Fi devices such as PCI, miniPCI, USB, Cardbus and PC card, ExpressCard make the Wi-Fi experience convenient and pleasurable for the users. Distance from a wireless network can lessen the signal strength to quite an extent; some devices such as Ermanno Pietrosemoli and EsLaRed of Venezuela Distance are used for amplifying the signal strength of the network. These devices create an embedded system that corresponds with any other node on the Internet.


The market is flooded with various Wi-Fi software tools. Each of these tools is specifically designed for different types of networks, operating systems and usage type. For accessing multiple network platforms, Aircrack-ng is by far the best amongst its counterparts. The preferred Wi-Fi software tools list for Windows users is: KNSGEM II, NetStumbler, OmniPeek, Stumbverter, WiFi Hopper, APTools. Unix users should pick any of the following: Aircrack, Aircrack-ptw, AirSnort, CoWPAtty,Karma . Whereas, Mac users are presented with these options: MacStumble, KisMAC, Kismet. It is imperative for users to pick out a Wi-Fi software tool that is compatible with their computer and its dynamics.


Wi-Fi uses radio networks to transmit data between its users. Such networks are made up of cells that provide coverage across the network. The more the number of cells, the greater and stronger is the coverage on the radio network. The radio technology is a complete package deal as it offers a safe and consistent connectivity. Radio bands such as 2.4GHz and 5GHz depend on wireless hardware such Ethernet protocol and CSMA. Initially, Phase Shift Keying (PSK), a modulation method for conveying data was used, however now it has been replaced with CCK. Wi-Fi uses many spectrums such as FHSS and DSSS. The most popular Wi-Fi technology such as 802.11b operates on the range of 2.40 GHz up to 2.4835 GHz band. This provides a comprehensive platform for operating Bluetooth strategy, cellular phones, and other scientific equipments. While 802.11a technology has the range of 5.725 GHz to 5.850 GHz and provides up to 54 Mbps in speed. 802.11g technology is even better as it covers three non-overlapping channels and allows PBCC. 802.11e technology takes a fair lead by providing excellent streaming quality of video, audio, voice channels etc.

To connect to a Wi-Fi network an adapter card is essential. Additional knowledge about the SSID, infrastructure, and data encryption is also required. The Wi-Fi users don’t have to be concerned with the security issues. The security methods such as MAC ID filtering, Static IP addressing and WEP encryption ensure the user privacy to the maximum.





WiFi Security

WiFi AND WIRELESS NETWORK SECURITY

WiFi Security feature protects your network and gets quick access associated with Win2K, XP. It supports WEP or WPA and gives you real-time interloper alerts you from free blockers and you feel glad when there is no spyware and no adware in your network to spoil your files. Any users get access to the Internet by means of laptop, handhold games, smart cell phones and PDA. The most important thing is it tenders a trouble-free and cheap method to safe and sound your network connection at any hotspot all over the world. WiFi Security examines data and perceives entrance point in real time and identifies the user who wants to spoil your files.

When we talk about WiFi Security then a detail list come in view to make our network more secure. Wifi discover different security tools such as Airsnort pull through encryption keys when adequate packets have been collected. Airfart sense wireless devices and count their signal powers and make it easy for user to understand, AP Radar used to manage the configuration, Boingo Software helpful for you to include thousand of location all over the world. DStumbler offer a complete set for auditing, KisMAC one of the best security weapons, iStumbler used to analyze your dashboard, MacStumbler display information about nearby network, MiniStumbler offering convenience, WirelessMon allows users to check the position of wireless and so on.

WiFi Security Raw Packet confines tools consist of AirPcap facilitate troubleshooting tools such as Wireshark to provide information about protocols and radio signals, ettercap offers active and passive analysis of many protocols, libpcap allow link-layer in Windows environments and it contains driver used to extend the OS. The Wi-Fi interference recognition and preclusion Systems is the most powerful wireless instruction system and provide complete security against policy compliance and threats such as AirTight Networks SpectraGuard Enterprise and Sentry which not only detect the threat also remove and delete it from your system, Manage engine WiFi manage the security tools and check that alls are working or not. It is a big solution of WLAN and Wireless Solutions from WildPackets, it has a unique gift to address wireless network.

The Analyzers of WiFi Security execute a real-time photograph of all WLAN communications and actions these tools always in action to recognize your data and analysis. There is a long list of analyzers such as Javvin Network Packet analyzer ensure the network performance and prevent the network security, Network Chemistry Packetyzer serve the net with Ethereal packet detain and analysis library, NetScout Sniffer Portable venture network relations. The network instruments observer, tamosoft commview for Wi-Fi and wireshark such a great tool to manage and monitor your network security.

Wi-Fi Security for end clients offer a complete control over the entire network from design to development and including AirMagnet StreetWISE offer automatically diagnose, AirPatrol AirSafe will turn off your network if sense any one interrupt in it, AirTight SpectraGuard SAFEdetect classically and make a solution, AirDefense Personal defend the system from the risks that could depiction confidential data and secret dealings and same as AirDefense Personal, Aruba Networks Endpoint Compliance, HotSpotDK, Sana Primary Response Air Cover, and ZENworks USB/Wireless Security provide you a safeguard for your data and transaction. The WiFi networks, robotically sense the necessary WiFi security settings, and caution you about insecure or treacherous networks. keep in mind the following things to make you network secure, don’t put on air your SSID, always enable WPA encryption as an alternative of WEP, Utilize MAC filtering for entrance power and immobilize remote administration.

Wireless Network

WiFi-WIRELESS NETWORKS
Wireless network pass on to any kind of computer network that is cable less and generally linked with a telecommunications and based on IEEE 802.11. Wireless Network can implement between nodes without any wire and remote information transmission system uses the radio waves, at the physical level of the network. There are several benefits of Wireless Network such as file sharing, Internet connection sharing, multi-player games, Internet telephone service, Computer mobility, and No unsightly wires. 802.11 support networking bandwidth and have an array of choices such as 802.11b, 802.11a,802.11g, 802.11n also known as Wi-Fi technologies and designed for precise networking programs. The hardware requirements of a Wireless network are Network adapter, Repeater, Network hub, and Modem.

There are different types of Wireless Networks such as LAN in which radio signals are used instead of wires and transmit data from one Pc to other Pc in the same network as it is Wi-Fi is a wireless network that enables connection to internet with WiFi functionality. it produced radio waves that can be picked up by WiFi receiver and fixed wireless data is also type of LAN that can be connect more then one building with the mean of sharing .The MAN have ability to connect several local area networks and a term WiMax used to represent wireless metropolitan area networks and Mobile devices networks contains Global System for Mobile Communications which is called GSM network and mainly used for cellular phones, Personal Communications Service is a radio band used to set up PCS and D-AMPS is an upgrade version of AMPS.

A Wireless network containing basic setup and to use a wireless network you have to need a networking card and Kernel config require IEEE 802.11 wireless network driver, Hardware Access Layer and ample Rate control algorithm. Wireless to crypto support modules .There are different kind of protocol used in a Wireless network, it has routing protocol such as DSDV, AODV, B.A.T.M.A.N, PWRP, DSR, OLSR, OORP, TORA,HSLS and The Ad-Hoc Configuration Protocol and Proactive Auto configuration. There are different related terms used for wireless network like WEP is a security protocol from IEEE, SSID, Static IP, DHCP, Subnet, LAN, WLAN, MAC, WAP, and Sniffer but the most commonly used term in these days is Wi-Fi such a technology wrapping the world.

Wireless network faces much security threat due to some reason as Spread spectrum used in LAN not very protected because the spreading codes openly therefore companies can intend the 802.11 mechanism and a hacker can easily demolish the security as it is a hacker can still snuffle the SSID. The use of DHCP in wireless network is also helpful for hacker to spoil your files because it automatically assigns IP addresses to users as they become active and hang the system. Generally networking security attack divided into two types which are passive and active .Passive including Eavesdropping, and Traffic analysis and active including Masquerading, Replay, Message modification, Denial-of-service. Loss if integrity and confident also cause of lack of security so it is necessary for all organizations that they make their system more secure even than before as no one can interrupt in it.

IEEE 802.11

WiFi- WIRELESS FIDELITY -WIRELESS NETWORKS-IEEE 802.11- Wi-Fi Standards

IEEE 802.11 is standard use world widely for Wireless Local Area network, WLAN, it stands for Institute of Electrical and Electronics Engineers. In simple words it is standard of communication between computers and wireless devices. The standards were set by IEEE LAN/MAN Standard committee in 5GHZ and 2.4 GHz public spectrum bands.

The IEEE 802.11 is consisting of of numerous mechanism and services that interrelate to present station mobility translucent to the higher layers of the network mass. IEEE 802.11 is a combination of wireless LAN. We can use IEEE 802.11 and WiFi often as interchangeably depends on market demand. It is a basic protocol of any high speed wireless network from 1997 to 2008. There are lots of change occurred in it but the basics “high performance" never change. The frequency of it is from 2.4 GHz to 5 GHz and range is from 100 meter to 5000 meter. It specifies a single medium access control as MAC and three physical layers and offering different service such as Authentication of system, Deauthentication of system, data privacy, MSDU delivery, Association with files and system, Disassociation, Distribution of data, Integration of information, and Reassociation. You can configure a station with IEEE 802.11 in different ways as independent configuration, and infra-structure configuration. The IEEE 802.11 starts from the need to connect more than one computer with each other wirelessly especially where the wire cannot go.

IEEE 802.11 required accepting device to activate in a peer-to-peer fashion within the possibly of overlie same as access control level and data transformation services to allow top layers .There are several physical layer represent signaling methods and interfaces. Solitude and safety of user data is being moved over the wireless media via IEEE 802.11.According to OSI model an IEEE 802.11 protocol having direct frequency, hopping sequence, spread spectrum PHY and infrared PHY. IEEE 802.11 specifies a single medium access sub layers called MAC and physical layers with different specifications. The first is physical layers having two radio and infrared. The physical layer contain Frequency Hopping Spread Spectrum Radio PHY offering 1 Mbit/s with two level and 2 Mbit/s with 4 level, As it is Direct Sequence Spread Spectrum Radio PHY provides DBPSK and DQPSK with 1 and 2 Mbit/s operation, Infrared PHY offer 1 Mbit/s with16-PPM and 2 Mbit/s with –PPM.

These days 802.11a, 802.11b, and 802.11g are mostly in use to create a network home, offices and commercial locations. The architecture of IEEE 802.11 consists of 802.1X for verification, RSN for maintenance track of links, and AES-based CCMP to provide privacy, veracity and basis. IEEE 802.11with the propagation of modems and DSL services makes it reliable. People always desire to set up small networks in their homes to distribute their elevated rate Internet connection. There are many free networks commonly permit anyone within specific range, counting passersby outer, to connect to the Internet. There is also hard work by unpaid helper groups to launch wireless community networks to provide free wireless connectivity to the public. Networking without wire has a talented prospect with 802.11.The dynamic nature of IEEE 802.11 increasing radically in the near future.

BLuetooth - PAN

WIRELESS PERSONAL AREA NETWORK - Bluetooth

Personal area network (PAN) is a computer network designed for communication between computer devices (including telephones and personal digital assistants close to one person). The devices may or may not belong to the person in question. The reach of a PAN is typically a few meters. PANs can be used for communication among the personal devices themselves or for connecting to a higher level network and the Internet.Personal area networks may be wired with computer buses such as USB and FireWire. A wireless personal area network (WPAN) can also be made possible with network technologies such as IrDA and Bluetooth.

A Bluetooth PAN is also called a piconet, and is composed of up to 8 active devices in a master-slave relationship. The first Bluetooth device in the piconet is the master, and all other devices are slaves that communicate with the master. A piconet typically has a range of 10 meters, although ranges of up to 100 meters can be reached under ideal circumstances.

SECURITY THREAT AND REQUIREMENTS OF WIRELESS PAN

Bluetooth offers several benefits and advantages. However, organizations must not only address the security threats associated with Bluetooth before they implement the technologies; they must also measure the vulnerabilities of the devices they allow to participate in the Bluetooth networks. Specifically, agencies need to address security concerns for confidentiality, data integrity, and network availability. Moreover, since Bluetooth devices are more likely to be managed by users that are less security conscious than administrators, they are more likely to contribute to uncontrolled security drifts. This subsection will briefly cover some of the risks to security, i.e., attacks on confidentiality, integrity, and network availability.

Loss Of Confidentiality

Threats to confidentiality involve, first of all, compromised Bluetooth devices. When a Bluetooth device that is part of a piconet becomes compromised (e.g., is in the possession of an unauthorized user), it may still receive information that the malicious user should not access. Moreover, the compromised device may still have network or information privileges, resulting in a compromise of the wider network as well. In the latter case, the compromised device may not only receive normal proprietary traffic but may also request that information as part of a targeted network attack. A trait of Bluetooth that makes this compromise unique is that the Bluetooth network requires device and not the user authentication to access resources. Once the device is authenticated, it is automatically connected to resources without the need for subsequent authentication. (Geoff Huston, the wireless internet)

Loss Of Integrity

Iinfringements of integrity result from the corruption of an organization’s or user’s data. The direct effect is similar to that of a confidentiality, or disclosure, threat: a compromised network. However, integrity threats extend beyond this, involving the alteration, addition, or deletion of information, which is then passed through the network without the user’s or network administrator’s knowledge. Information that is subject to corruption includes files on the network and data on user devices. For example, a malicious user might use an untrusted device, such as a PDA, to access the address book of another PDA or laptop. However, instead of just monitoring the information, as would be the case with a disclosure threat, the malicious user alters the contact information without the owner’s knowledge or may even delete the information completely. If undetected, such attacks could result in the agency or user losing confidence in its data and system. Users should verify that their Bluetooth product does not allow automatic data synchronization to prevent the alteration of any information without the acknowledgement user of that device.

Loss Of Avaiability

Denial of service attacks cause in the loss of network availability for authorized users and devices. Denial of service attacks block authorized user access to system resources and network applications. Besides the typical DoS attacks directed against LANs and Internet services, Bluetooth devices are also susceptible to signal jamming. Bluetooth devices share bandwidth with microwave ovens, cordless phones, and other wireless networks and thus are exposed to interference. Malicious users can interfere with the flow of information by using devices that transmit in the 2.4 GHz ISM band. Disrupting the routing protocol prevents ad hoc network devices from negotiating the network’s dynamic topologies. Remote users may encounter jamming more frequently than on-site users. Remote users must contend with the same interference that users experience in the office. Further, since the remote environment is uncontrolled, remote devices are more likely to be in close immediacy to devices that are intentionally or unintentionally jamming their signals. Another threat associated with ad hoc devices is a battery exhaustion attack. This attack attempts to disable a device by draining its battery. A malicious user continually sends requests to the device asking for data transfers (assuming the user is part of the network topology) or asking the device to create a network. Although this type of attack does not compromise network security, it ultimately prevents the user from gaining access to the network, because the device cannot function. (Juha T. Vainio, May 25, 2000)

SOLUTIONS & SECURITY MEASURES FOR WPAN
Wireless Personal Area Network and other Bluetooth technologies are relatively new standard and have yet to become common in the marketplace. However, solutions and improvements are available to help secure WPAN networks. These measures include management solutions, operational solutions, and technical solutions

Management Solutions.
The first line of protection is to provide a sufficient level of knowledge and understanding for those who will deal with WPAN & Bluetooth enabled devices & networks. Organizations using wireless personal area network technology need to establish and document security policies that address the use of Bluetooth enabled devices and the user’s responsibilities. The policy document should include a list of approved uses for WPAN’s, the type of information that may be transferred in the network, and any disciplinary actions that may result from misuse. The security policy should also specify a proper password usage scheme.

Operational Solutions
Since Bluetooth devices do not register when they join a network, they are invisible to network administrators. Consequently, it is difficult for administrators to apply traditional physical security measures. However, there are some security approaches that can be applied, including establishing spatial distance and securing the gateway Bluetooth devices that connect remote Bluetooth networks or devices. Establishing spatial distance requires setting the power requirements low enough to prevent a device operating on the organizations premises from having sufficient power to be detected outside physical boundaries. This spatial distance in effect creates a more secure boundary. Currently, Bluetooth devices have a useful range of approximately 30 feet. Organizations that require both high levels of security and low levels of security should maintain a secure perimeter so that on site network users can maintain secure connections in their office premises. Agencies with requirements for high levels of security should also restrict unauthorized personnel from using PDAs, laptops, and other electronic devices within the secure perimeter. (Tom karygiannis, Les Owens, Nov 2002)

Technical Solutions
As with WLANs and Bluetooth technical solutions & improvements fall into one of two categories: software security solutions and hardware security solutions. Bluetooth software solutions focus on Personal Identification Number (PIN) and private authentications, while hardware solutions involve the use of the Bluetooth device address and link keys that reside at the link level. Again, it should be noted that hardware solutions, which generally have software components, are into simply as hardware solutions.

ADSL South Africa - Broadband Solutions for The Average JoeList of HotSpots in Australia

WiFi Features

WiFi AND WIRELESS NETWORK FEATURES


Features of “WiFi” Technology

A new aspect in networking


WiFi has brought a new aspect in the ground of networking. The broadcast of data is completed via radio waves and the cost of cables for network lying down.Wi-Fi enable a user to get access to internet anywhere in the given location. Now you can make a network in Hotels, Libraries, colleges, universities, campus, private institutes, and coffee shops and even on a public place to make your business more profitable and connect with their client any time. WiFi makes waves for business with their highly effective cable less media.

Unmatched mobility and elasticity

Wi-Fi, is allowing new intensity of connectivity without giving up functions. Wi-Fi introduced various types of utilities such music streamers that transmit your music to speakers without any wire you can also play music from the remote computer or any other attached to the network. The most important now you can play online radio. Wifi technology system is rather remarkable, you can download songs, send email and transfer files expediently at sky-scraping speed and you can move your computer easily because your WiFi network has no cable to disrupt your work so we can say that it is quite easy, helpful and most of all expedient.

Fortress Technology

WiFi providing secure wireless solutions support the growth and release of a prototype mobile ad hoc wireless network for use in the wireless strategic skirmish.

Support an entire age bracket.

WiFi technology has several advantages it support an entire age bracket and create a connection between components on the same network and have ability to transfer data between the devices and enable different kind of devices such as game, MP3 player, PDA’s and much more!

It's convenient and every where

WiFi is a convenient technology and where the range station exists you are online during travel you can equip with a Wi-Fi network and set up shop anyplace. You will automatically connect with internet if you are near hotspot. These days WiFi exist every where with all its wonders.

More faster and secure

With WiFi you can get high speed of internet because it is very fast than DSL and Cable connection you can establish a Wifi network in small space now you don’t need any professional installation just connect to a power outlet with an Ethernet cord, and start browsing. WiFi security system for Threats makes it more renewable and its tool protect your VPN and secure web page. You can easily configure the device to take better performance. The standard devices, embedded systems and network security make it more powerful.

WiFi with no limitation

You can use a “WiFi” network with no limitation because it can connect you worldwide. You can easily reach to your requirements with WiFi networking applications because the power consumption is very high as compared to other bandwidth. The vision of wireless network is bright with Pre-N products and high qulaity media streaming.

WiFi Limitations

WiFi AND WIRELESS NETWORK LIMITATIONS
WIFI technology supports two types, one is called “infrastructure” other one is “Ad hoc”In ad hoc Wi-Fi network can be connected without central device known as router or access pointAd hoc mode is always preferred over infrastructure mode, however ad hoc networks have following issues
Wi-Fi devices configure on Ad hoc mode offers nominal security against network intruders. Ad hock WiFi configured devices cannot disable SSID broadcast in contrast to infrastructure mode. Network attackers will not required much of effort to prevail in Ad hoc Network
Using Ad hoc mode signals issues can experienced where as using alternative infrastructure mode will provide full strength singles.
Wi-Fi networking standard including 802.11g requires ad hoc mode of communication supports which 11Mbps bandwidth
Wi-Fi devices when configured to infrastructure mode can transfer data up to 54 Mbps, where as using ad hoc mode only 11 mbps can be achieved. Ad hoc mode is considered slower in comparison to infrastructure for this reason.

Security concerns
It is simple to set Wi-Fi network but keeping it secure takes much more effort, Access points of Wi-Fi do not deploy encryption methods. It is required to be done as network is enabled. Secure Wi-Fi network can be easily attacked by hackers to steal private information.Guests who are not potentially harmful can still utilize the network resources and minimize the performance.
Interference from other devices
Wi-Fi transmits data at 2.4 GHz making susceptible to interfere Bluetooth enabled devices, mobile phones, cordless, Microwaves and other communication devices, closer the interfering devices are the poor communication will be and vice versa.
Lacking high-quality media streaming
Today’s fastest Wi-Fi standards are pushed beyond their limit when trying to view high end media.High definition video and audios cannot be viewed flawlessly because of lower transfer rate; things can be much more worst if other clients are accessing the same access points.
Even the fastest current Wi-Fi standards are pushed beyond their limit when trying to handle some of today's high-end media. High-definition audio and video files are timely-delivery-intensive, and typical wireless networks have neither the transfer speeds nor the consistency to transfer them flawlessly. This problem is further compounded if there are multiple devices connected to the same because the bandwidth must be divided between all of the equipment.

Type of Network

WiFi LAN WLAN PAN MAN SAN WAN

There are about eight types of network which are used world wide these days, both in houses and commercially. These networks are used on the bases of their scale and scope, historical reasons, preferences for networking industries, and their design and implementation issues. LAN and WAN are mostly known and used widely. LAN, local area network was first invented for communication between two computers. LAN operates through cables and network cards. Later WLAN, Wireless local area network was formed through LAN concept, there are no wires involved in communication between computers, and Wireless LAN cards are required to connect to wireless network. LAN is the original network out of which other networks are formed according to requirements. They are as follow.

LAN - Local Area Network

WLAN - Wireless Local Area Network

WAN - Wide Area Network

MAN - Metropolitan Area Network

SAN - Storage Area Network, It can also refer with names like System Area Network, Server Area Network, or sometimes Small Area Network

CAN - Campus Area Network, Controller Area Network, and often Cluster Area Network

DAN - Desk Area Network


LAN - Local Area Network

LAN connects networking devices with in short spam of area, i.e. small offices, home, internet cafes etc. LAN uses TCP/IP network protocol for communication between computers. It is often but not always implemented as a single IP subnet. Since LAN is operated in short area so It can be control and administrate by single person or organization.

WAN - Wide Area Network

As “word” Wide implies, WAN, wide area network cover large distance for communication between computers. The Internet it self is the biggest example of Wide area network, WAN, which is covering the entire earth. WAN is distributed collection of geographically LANs. A network connecting device router connects LANs to WANs. WAN used network protocols like ATM, X.25, and Frame Relay for long distance connectivity.

Wireless - Local Area Network

A LAN, local area network based on wireless network technology mostly referred as Wi-Fi. Unlike LAN, in WLAN no wires are used, but radio signals are the medium for communication. Wireless network cards are required to be installed in the systems for accessing any wireless network around. Mostly wireless cards connect to wireless routers for communication among computers or accessing WAN, internet.

MAN - Metropolitan Area Network

This kind of network is not mostly used but it has its own importance for some government bodies and organizations on larger scale. MAN, metropolitan area network falls in middle of LAN and WAN, It covers large span of physical area than LAN but smaller than WAN, such as a city.

CAN - Campus Area Network

Networking spanning with multiple LANs but smaller than a Metropolitan area network, MAN. This kind of network mostly used in relatively large universities or local business offices and buildings.

SAN - Storage Area Network

SAM technology is used for data storage and it has no use for most of the organization but data oriented organizations. Storage area network connects servers to data storage devices by using Fiber channel technology.

SAN - System Area Network

SAN, system area networks are also known as cluster area network and it connects high performance computers with high speed connections in cluster configuration.

WiFi Terminology

WiFi- WIRELESS FIDELITY -WIRELESS NETWORKS -Wi-Fi -Terminology
There are lots terminologies which are require to be known to get the better understanding of what wireless network technology is and how it works. Following are the terms which are involved in Wi-fi and wireless networks.

Gigahertz

Gigahertz is frequency measurement and its unit is GHz. It represents frequencies in the billions of cycles per second range. Giga represents 1 billion and hearts is standard unit used for measuring different frequencies.

GHz is used with wireless communication as radio frequencies and computer performance. GHz refer to clock speed of central procession unit, (CPU). The higher the GHz , or CPU clock is the better the performance of the computer. The lowest clock GHz in Pentium 1 series is 133 which had reached up to 4 GHz along the time.

Whereas in radio communication GHz is refer as bands of electric spectrum. Different band different uses for example, 802.11b/g falls some where between 2.4GHz to 5.0GHz.Latest technologies like Bluetooth, cordless phones, Wi-Fi operates on S-bandsSatellite communication and global possible system (GPS) operates on L-bands. There are other popular bands like Ku, Ka which have different uses.

WiBro

Wibro have nothing to do with Wi-Fi directly, but it can be called extended version of Wi-Fi, Its is known as Wireless broadband. It is developed in south korea and it is latest technology in mobile access of wireless broadband. Wi-Fi operates on 802.11 standards developled by IEEE, WiBro on the other hand operates on 802.16 just as WiMax do. WiBro is specially design for connectivity while on move, where as WiMax is not recommended on move connectivity.

Hotspot

Hotspot is the place where wireless network is available for puplic use. Devices like laptops, handsets, Pdas, Note books etc are mostly installed with Wireless network cards which are designed to connect to Wi-Fi network in surrounding area. The place where wireless network is available to access is called hotspot. HotSpots are mostly available for free at Coffee shops, Public libraries, Public grounds, Universities, Airtports, Railway Stations etc.

WiFi Finder

As name suggests, it portable device to find Wireless network available for public use in certain area. This devices helps to find hotspots so laptop battery do not get waste just for finding Wireless network around. Wi-Fi finder are mostly battery operated device which is about a mouse size. When WiFi find is turn on it stats searching wirless network around if wifi network found it turns on its LED which says network is around and ask if wants to connect to it. If no network is found LED remain turned off. WiFi finders operates on 802.11b/g bands. Different versions of WiFi finders are available in market depending upon the aditonal features, Expensive modules comes with built in antenna which enhance the range and connectioncapabilities. WiFi finder Modules can ranges from 150 feet to 300 feet depending how sophisticated and expensive the module is. Wi-Fi finders once scan the network can be connected to laptops through USB.

Access Point

This is another important term which Wi-fi users mostly heard. Access point is almost like HotSpot. Its is also known as WAP, Wireless access point. WAP device connects wireless communication devices together to form a wireless network. WAP network are mostly connected to wired network and can provide interface between wireless devices with wired devices.

Tuesday, November 4, 2008

WiFi Products

WiFi PRODUCTS - WIRELESS FIDELITY -WIRELESS PRODUCTS


There are several products available now which enable to connect to Wi-Fi Networks around the area. Earlier when WiFi was first started commercially,there were not many devices came built with Wifi network card (Wireless card) which connects to wifi network. But now almost every handset device on mobile comes with Wifi, Laptops comes with built in Wireless connectivity , desktop computers comes along with Wireless connectivity. Following are few products which provide connetivity to Hotspots.

Desktop Wireless Wi-Fi Cards


Desktop wireless wifi cards enable desktop computers to connect to wi-fi network available in the area. Wifi network provides hight speed internet if available and can share files with in the clients in the network. This kind of network is mostly used in Colleges and Universities, libraries etc. WIfi deskop cards are mostly plugged in Mother board on PCI slot. Some mother board comes with built in wifi connectivity

Laptop / Notebook Wireless Wi-Fi Cards

WiFi cards uses in laptops / notebooks to connect to wireless internet around through Wifi network. Most laptops now comes with built in Wifi enable feature. Old model laptops which do not come along with built in wifi wireless card can plug in wifi PCMCI slot card to connect to hotspot

Wireless Wi-Fi Routers

Wireless WiFi routers is used to connect clients( having WiFi cards ) with server. Wifi router is attached to server and configure with IP address or in some cases just with internet connection. Now this IP helps connect clients to the server for High speed internet and file sharing with server and other clients. Routers are mostly used when server is expected to handle multiple clients at given time.

Wireless Wi-Fi USB Adapters

There is easy solution for Desktop / laptop owners who do not have wifi card already into their systems, they can use USB Wifi drive which connects to USB port on systems and performs as WiFi cards. However USB wifi drive comes with relevently lesser data transfer capability and lesser range.




Handhelds and PDAs

Almost all handsets and PDAs manufactures install Wireless netwok card to their products. PDAs(Personal digital assistance) and other mobile devices scanns WiFi network around, if found can connect to network for Surfing and file sharing.