Software Blogs - BlogCatalog Blog Directory security wireless network: marzo 2010

search motor

LINUX DISTRIBUTIONS

The most known is backtrack versions(3 and 4) i will use backtrack4 another distributions wifiaway,wifislax.,everyone of them its specialase in auditoria of wireless network with a lot of programas like: airodump-wireles network scanner aircrack-its use to crack wep pass wireshark-internet traffic escanner It is a simple 3 examples of 3 programs from linux distributions you ask me how did this work how a hacker can use this to penetrate my wireless network: first one we need to download backtrack4http://www.backtrack-linux.org/ this is the link were you can download any backtrack you wish,try with live cd you can install backtrack into your sistem using a virual machine like VMWARE http://www.vmware.com/ this is the oficial site of vmware you need to download wmware workstation 7 you can use 30 days this program afree if you will subscrib (its free)i will put a video on youtube about how to run backtrack4 in vmware its very simple to do this. The youtube movie its show you how can a hacker crack a wireless network(wep key). The second video its about how can you run backtrack4 in vmware its very simple

SNIFFING PROGRAMS

Once penetrade the network the hacker can use snnifing programs such as cain&abel, wireshark,to see the internet trafic into the network with the final goal to steal your passwords. For now i will present only this two programs: cain&abel-its a complex program how has a sniffing tool and a crack tool. The basic idea in the traffic interceptation is that the attacker is interposed between the router and pc atacked so that traffic passes to the attacker pc first and then go to the router,this is the basic idea.i will put an video on this program,one more thing-i use this program under windows. wireshark-its almoust the same tipe that the first one but in this you will need to process a huge cantitate of data.This one its cames with backtrack4 but also can you use under windows.

WHAT CAN WE DO?

As you can see the tools hackers are diverse and complex as I illustrated above and is only a small part of the multitude of ways that we can be attacked, I think we should show more interest in everything around us and especially to new Wireless technology is the future because I believe that the transmission and receipt of data. How can we defend against these attacks, I have some advice: -If you have a wireless router and its has an wep key to have acces change it into an wpa key(choose a key that is not into the dictionary -phone number f.g) -check if at yor network are conected other pc that you know it If you connect through a public Internet network try to keep on mind that someone can spy on you and he can see what password that you type so dont type important psswords(such paypal pass)

domingo, 14 de marzo de 2010

counter

[URL=http://s06.flagcounter.com/more/qSd1][IMG]http://s06.flagcounter.com/count/qSd1/bg=FFFFFF/txt=000000/border=CCCCCC/columns=3/maxflags=20/viewers=0/labels=0/[/IMG][/URL]

miércoles, 10 de marzo de 2010

domingo, 7 de marzo de 2010

about my hobies-bodybilding-8 things you must do to bild maximum muscle continue

3.Increase your water intake.

Water is an absolutely critical component to the muscle-building process and to overall body health in general. Failing to keep yourself properly hydrated throughout the day will have a negative impact on literally every single process within your entire body!
Most people know that they should be drinking "plenty" of water every day, but how many actually do?
If you really paid close attention to your water intake you'd probably be surprised at how little you actually consume.
What makes proper water intake so amazingly important?
Well for starters, it’s the most abundant element in your body. It is ranked only 2nd to oxygen as being essential to life.
Your body can survive for weeks without food, but without water you'd be dead in just a few days.
Roughly 80% of your body is made up of water; the brain is 85% water and lean muscle tissue is 70% water.
Research has shown that being even slightly dehydrated can decrease strength and physical performance significantly. In fact, merely a 3-4% drop in your body's water levels will lead to a 10-20% decrease in muscle contractions.
Not only will water increase your strength, but it also plays a large role in preventing injuries in the gym. Highly intensive training over a long period of time can put unwanted stress on your joints and connective tissue, and water helps to fight against this stress by lubricating the joints and forming a protective "cushion" around them.
So, just how much water is enough?
To find out how many ounces of water you should be consuming every day, multiply your bodyweight by 0.6. So if you weigh 150 pounds, you should be consuming around 90 ounces of water every day.
150 x 0.6 = 90
I know it sounds like a lot, but if you plan your day out properly it shouldn't be a problem. Keep a water bottle with you at all times and sip from it periodically. Keep water in the places where you spend most of your time: in your car, at work, on your nightstand etc.
Another good method to ensure that you drink enough water is to pre-fill a few 16 ounce bottles at the beginning of the day. This way you can have a visual representation of where your water consumption is at any point in the day.
For the first few days you'll probably find yourself running to the bathroom quite frequently, but your body will soon adapt to the increased water volume and this will no longer be a problem.

4.Keep a detailed record of every workout that you perform.

This muscle-building technique should form the underlying basis for your entire workout plan. When it comes to structuring a proper approach in the gym, this is the most important overall factor, bar none.
Everyone is so obsessed with all of the specific principles in the gym (such as exercise selection, rep ranges, which days to spend in the gym, how many sets to perform etc.) that they fail to see the big picture.
Regardless of what type of approach you are taking in the gym, the underlying factor for success is progression.
Our bodies build muscle because of an adaptive response to the environment. When you go to the gym, you break down your muscle fibers by training with weights. Your body senses this as a potential threat to its survival and will react accordingly by rebuilding the damaged fibers larger and stronger in order to protect against any possible future threat.
Therefore, in order to make continual gains in muscle size and strength, you must focus on progressing in the gym from week to week in order to consistently increase the stress level.
Progression can take 2 main forms:
a) Increasing the amount of weight lifted on a specific exercise. b) Increasing the number of reps performed with a given weight on a given exercise.
If you’re able to improve on at least one of the above factors each week in the gym, your body will be given continual incentive to grow larger and stronger.
If you neglect these factors and enter the gym without a concrete plan in mind, you’ll be ignoring the very foundation of the entire muscle growth process, and your gains will surely stagnate.

5.Be prepared to train HARD!
If you think that building muscle is going to be a walk in the park and that you can simply enter the gym, “go through the motions” and then go home, you are sadly mistaken.
The reality is that if you want to experience any appreciable gains in muscle size and strength, you’re going to have to be prepared to train hard. This is one of the key factors separating those who make modest gains from those who make outstanding gains.
Most people just plain don’t train hard enough!
As soon as the exercise starts to get difficult their spotter jumps in and begins needlessly assisting them, or they simply put the weight down altogether.
BIG mistake!
The gym is a war zone, and if you want to be victorious, you must be willing to endure the battle.
Intense weightlifting is perceived as a threat to your survival, and the body responds to this by increasing the size and strength of the muscles to battle against the threat. Therefore, in order to see the most dramatic response in size and strength, you must push your body as hard as you safely can.
This can be achieved by performing all sets in the gym to the point of concentric muscular failure…
Concentric Muscular Failure: The point at which no further positive repetitions can be performed using proper form despite your greatest efforts.
This is very challenging and will require a lot of mental toughness on your part. I’m not going to sit here and feed you a pack of lies by saying that training for muscle size is an easy task. It’s not!

6.Avoid overtraining by limiting your overall workout volume and by providing your body with sufficient recovery time in between workouts

This is one of the most common and most deadly mistakes that almost all beginners run into. They naturally assume that the more overall work they perform in the gym, the greater their results will be.
Heck, when I was a beginner myself I thought the same thing.
Who can blame us for thinking that?
In almost all aspects of life this basic logic holds true. If you want to perform well on a school test, you need to maximize your studying time. If you want to improve your skills in a specific sport, you need to practice as much as possible.
When it comes to training for muscular size and strength, you can take this basic logic and toss it right out the window, down the street and around the corner!
The key thing to realize is that your muscles will NOT grow larger and stronger if they are stressed beyond the point of recovery. Remember, training with weights is merely an activity that sets the wheels in motion; it “sparks” the muscle growth process and “tells” your body to start building new muscle tissue… But the actual growth process takes place away from the gym while you’re eating and resting.
If you disturb the recovery process, your muscles cannot rebuild themselves.
Overtraining is your number one enemy! Your goal in the gym is to perform the minimum amount of work necessary in order to yield an adaptive response from the body, and not a THING more.
You can avoid overtraining in the following ways…


1) Limit the number of sets that you perform during each workout – You should perform a total of 5-7 sets for large muscle groups (chest, back and thighs) and 2-4 total sets for small muscle groups (shoulders, biceps, triceps, calves and abs). And remember, this is total sets per WORKOUT, not per exercise.
2) Limit the amount of time spent in the gym – Each workout should not last for any more than 1 hour. This time frame comes into play beginning with your first muscle-building set and ends with your final muscle-building set.
3) Limit your training frequency for each muscle group – Each specific muscle group should only be directly stimulated once per week in order to allow for full recovery time. If you’ve been following the “more is better” mentality then you may find it hard to let go of, but believe me, as long as you train hard, you do NOT need to train often or with very many sets and exercises.
In fact, performing too much work in the gym may actually cause your muscles to become smaller and weaker.

7.Stop placing so much of your emphasis on dietary supplements
A supplement is just that… a supplement.
It is there to supplement your diet by filling in the missing gaps and by providing you with greater amounts of specific nutrients that will slightly speed up your progress. Supplements are NOT there to do the work for you and will only play a small role in your overall success in the gym.
Stop falling for the multi-million dollar ads that talk about the latest “revolutionary discovery” that will allow you to build 25 pounds of muscle while you lie on the couch.
As advanced as we’ve become as a society, the basic rules of hard work and dedication still apply. If you want to change your physique, then hard training in the gym and a consistent diet plan is the only true way to get there.
Now, this doesn’t mean that I’m AGAINST the use of supplements; I’m merely against the over-use and over-emphasis of supplements. There are a few good, solid, effective products out there that I do recommend, but only as a small part of your overall approach.

8.Understand that application and consistency is EVERYTHING

You can have the most effective workout schedule possible, the most intelligent diet approach available and the most intimate understanding of muscle growth from every possible angle, but without the inner drive and motivation to succeed you will get nowhere, and very fast.
Just as the famous saying goes…
“Knowing is NOT enough. You must APPLY!”
Those who make the greatest gains in muscular size and strength are the ones who are able to continually and systematically implement the proper techniques on a consistent basis.
Building muscle is a result of the cumulative effect of small steps.
Sure, performing 1 extra rep on your bench press will not make a huge difference to your overall results, and neither will consuming a single meal. However, over the long haul, all of those extra reps you perform and all of those single meals you consume will decide your overall success.
If you work hard and complete all of your muscle-building tasks in a consistent fashion, all of those individual steps will equate to massive gains in overall size and strength.
It is those who are willing to persevere that will succeed.
It is those who are willing to rise above laziness that will end up with the most impressive results.
I mean let's face it, everyone wants to be strong and muscular. If this is the case, why isn't everyone strong and muscular? It's because only certain people have the proper drive and motivation that it takes to get there.
______________________________________________________________________________________________

sábado, 6 de marzo de 2010

about my hobies-bodybilding-8 things you must do to bild maximum muscle

1.Provide your body with a surplus of calories by ensuring that your caloric intake exceeds your caloric expenditure.
In order to build muscle, you must consume more calories than you burn!
This is a basic biological law of muscle growth, and if you fail to consume an adequate number of calories per day you will NOT build muscle, plain and simple.
The work that you perform in the gym is simply the “spark” that sets the muscle growth process into motion. However, the REAL magic takes place when you are out of the gym, resting and eating. This is when your body will use the nutrients that you consume to begin repairing your damaged muscles and increasing their size and strength in preparation for your next workout.
If you don’t provide your body with the raw materials needed to facilitate growth, this process simply cannot take place.
In order to provide your body with the calories necessary to fuel muscle growth and to keep your body in an anabolic, muscle-building state at all times, you should be consuming anywhere from 17-20x your bodyweight in calories every single day. So if you weigh 150 pounds…
150 x 17 = 2550
150 x 20 = 3000
…ThenYou should adjust this number based on…

a) Your Metabolic Rate – Are you naturally thin and have a hard time gaining weight? Or do you seem to put on body fat just by looking at food? Depending on your overall body type you can adjust the number higher or lower.

b) Your Activity Level – Do you play sports or work a physically strenuous job? If so, you’ll need to consume more calories in order to compensate. If you’re fairly sedentary and aren’t very physically active (besides your weight workouts of course), then you probably won’t need as many calories as someone who is more active.

c) Your Goals – Are you aiming to bulk up and build as much overall body mass as you possibly can? If so, you’ll obviously want to consume as many calories as you reasonably can. Are you simply trying to build a little bit of extra muscle and look better overall? If so, then a slight caloric increase is all you’ll need. Based on these 3 factors above you can decide where to place yourself on the caloric range.
Do NOT overlook this aspect of the muscle growth process!
Most trainees are so concerned with their workouts that they highly underestimate the importance of proper nutrition. If anything, nutrition is even MORE important than what you accomplish in the gym.
If you fail to eat properly by not providing your body with an adequate number of calories each day, building muscle will be physically impossible. you should be consuming anywhere from 2550-3000 daily in order to build muscle.

2.Consume the right types of calories from the proper food sources.

The 3 main food groups that you should be concerned with are…
a.High Quality Protein – Protein builds and repairs muscle tissue and is the most important nutrient for those trying to increase their lean mass. Stick to high quality, easily absorbed sources such as lean red meat, poultry, fish, eggs, skim milk, cottage cheese, peanuts/natural peanut butter and whey.
b.High Fiber, Low Glycemic Carbohydrates – Carbohydrates aid in the absorption of protein, provide your muscles and brain with energy throughout the day and also help to maintain an optimal hormonal environment within the body.
Stick to slow-release, low-glycemic sources that will provide you with a steady stream of sugars throughout the day such as oatmeal, yams, certain fruits, brown rice and whole wheat products.
c.healthy Unsaturated Fats – Not all fats will make you fat, and essential fatty acids fit that profile. EFA’s are highly beneficial to the muscle growth process by increasing testosterone levels, improving the metabolism and volumizing the muscle cells. Some good sources of EFA’s include fatty fish, nuts, seeds, avocados and liquids like flaxseed and olive oil.

more tips next day

jueves, 4 de marzo de 2010

Putting a Networked PC in Your Home Theater

sources: that is, devices such as tape decks, AM/FM receivers, phono players,
CD units, DVD players, and other consumer electronics devices that provide
the inputs of the content you listen to and watch through your entertainment
system.
When you think about adding your networked PC or PCs to your entertainment
mix, the PC becomes just another high-quality source device attached
to your A/V system — albeit wirelessly. To connect your PC to your entertainment
system, you must have some special audio/video cards and corresponding
software to enable your PC to “speak stereo.” When the PC is configured
like this, you effectively have a home theater PC (or HTPC, as the cool kids
refer to them). In fact, if you do it right, you can create an HTPC that funnels
audio and video into your system at a higher-quality level than many moderately
priced, stand-alone source components. HTPC can be that good.
You can either buy a ready-to-go HTPC right off the shelf or build one yourself.
We don’t recommend that you build an HTPC unless you have a fair amount
of knowledge about PCs. If that’s the case, have at it. Another obvious point:
It’s much easier to buy a ready-to-go version of an HTPC off the shelf.
What you expect from your home theater PC is quite different from what
David Bowie might expect from his HTPC. Regardless of your needs, however,
a home theater PC should be able to store music and video files, play CDs
and DVDs, let you play video games on the big screen, and tune in to online
music and video content. Thus, it needs ample hard drive space and the
appropriate software (see the following section). Also, your HTPC acts as a
DVR (see the nearby sidebar, “Checking out PC DVRs,” for the lowdown on
PC-based DVRs). In addition, an HTPC can
Store audio (music) files: Now you can easily play your MP3s anywhere
on your wireless network.
Store video clips: Keeping your digital home video tapes handy is quite
the crowd pleaser — you can have your own America’s Funniest Home
Videos show.
Play CDs and DVDs: The ability to play DVDs is essential in a home
theater environment.
Act as a DVR (digital video recorder): This optional (but almost essential,
we think) function uses the HTPC’s hard drive to record television
shows like a TiVo (www.tivo.com).
Let you play video games on the big screen: With the right hardware,
PCs are sometimes even better than gaming consoles (which we cover
in Chapter 11).
Tune in to online music and video content: Grab the good stuff off the
Internet (yes, and pay for it), and then enjoy it on the big screen with
good audio equipment.
Provide a high-quality, progressive video signal to your TV video display:
This is behind-the-curtain stuff. Simply, an HTPC uses special hardware
to display your PC’s video content on a TV. Sure, PCs have built-in
video systems, but most are designed to be displayed only on PC monitors,
not on TVs. To get the highest possible video quality on your bigscreen
HDTV, you need a special video card that can produce a highdefinition,
progressive-scan video signal. (This investment also gives
you better performance on your PC’s monitor, which is never bad.)
Decode and send HDTV content to your high-definition TV display:
HTPCs can provide a cheap way to decode over-the-air HDTV signals
and send them to your home entertainment center’s display. You just
need the right hardware (an HDTV-capable video card and a TV tuner
card). If you have HDTV, this is a cool optional feature of HTPC.
For example, the HP z560 Digital Entertainment Center (www.hp.com, $1,799)
is a full-fledged digital media center PC with onboard 802.11g functionality
and includes Microsoft’s Windows XP Media Center Edition or Windows Vista

A better way: WPA

What’s better about WPA?
More random encryption techniques: WPA has basically been designed
as an answer for all the current weaknesses of WEP, with significantly
increased encryption techniques. One of WEP’s fatal flaws is that because
its encryption isn’t sufficiently random, an observer can more easily find
patterns and break the encryption. WPA’s encryption techniques are
more random — and thus harder to break.
Automatic key changes: WPA also has a huge security advantage in the
fact that it automatically changes the key (although you, as a user, get to
keep using the same password to access the system). So, by the time a
bad guy has figured out your key, your system has already moved on to
a new one.
It’s possible to use an 802.1x system, as described in the sidebar “802.1x:
The corporate solution,” later in this chapter, to provide automatic
key changes for WEP systems. This is not something you would find in
anyone’s home network, but some businesses use it, and it does indeed
minimize the effect of WEP’s fixed keys.
More user friendly: WPA is easier for consumers to use because there’s
no hexadecimal stuff to deal with — just a plain text password. The idea
is to make WPA much easier to deal with than WEP, which takes a bit of
effort to get up and running (depending on how good your access point’s
configuration software is).
The type of WPA (and WPA2) we’re talking about here is often called WPA
Personal or WPA PSK (preshared key). The more complex (and not suitable
for the home) version of WPA/WPA2 that is often used by businesses is WPA
Enterprise. We talk about WPA Enterprise in the sidebar titled “802.1x: The
corporate solution.”

Installing the AP

If you’re connecting your first computer with your ISP, the ISP should have
supplied you with all the information we list in the preceding section except
for the physical address of the network card (which isn’t needed if you aren’t
already connected).
Before you install your wireless gear, buy a 100-foot Ethernet cable. If you’re
installing your AP at a distance farther than that from your router or Internetsharing
PC, get a longer cable. Trust us: This advice comes with having done
this a lot. You need a wired backup to your system to test devices and debug
problems. To do that (unless you want to keep moving your gear around,
which we don’t recommend), you need a long cable. Or two. Anyone with a
home network should have extra cables, just like you have electrical extension
cords around the house. You can get good-quality 100-foot CAT-5e/6
patch cables online at places like Deep Surplus (www.deepsurplus.com) or
a host of other online retailers for around $15.
When you’re ready to do the AP installation, follow these steps:
1. Gather the necessary information for installing the AP (see the preceding
bulleted list) by following these steps:
In Windows XP:
a. Choose Start➪Programs➪Accessories➪Command Prompt.
This step brings up the command prompt window, which is a DOS
screen.
b. Type IPCONFIG /ALL and then press Enter.
The information scrolls down the screen. Use the scroll bar to slide
up to the top and write down the networking information we list
earlier in this chapter (physical address, IP address, default gateway,
subnet mask, DNS servers) and whether DHCP is enabled. You
use this information to configure the AP in Step 4.
In Windows Vista:
a. Choose Start➪Network➪Network and Sharing Center.
The Network and Sharing Center appears, which gives you access
to all network adapters and their properties.
From the Network and Sharing Center, click the View Status link.
A pop-up status window appears with all the information you need.
2. Run the setup software that accompanies the AP or device containing
your AP, like a wireless or Internet gateway.
The software probably starts when you insert its CD-ROM into the CD
drive. In many cases, this software detects your Internet settings, which
makes it much easier to configure the AP for Internet sharing and to configure
the first computer on the network. For example, Figure 6-1 shows
the Linksys Wireless-G Setup Wizard that accompanies the Linksys
WAP54G Wireless-G Access Point, which is a wireless gateway from
Linksys, a division of Cisco Systems, Inc.
If your computer is using Windows Vista, you will see a lot of security
dialog box pop-ups. The enhanced security in Vista asks for your permission
every time the installation software tries to do anything. As long
as you have administration rights on your user account, you can keep
saying yes to these security pop-ups and move through your AP setup.
Be sure to look at the top left of the pop-up window so you know when
you are saying yes to a security warning and when you are saying yes to
the install. Even though Vista dims the rest of the screen when a security
warning pops up, it is confusing with the number of pop-ups you can run
into. Just read the top left of the window and you will always know what
you are working in.
3. When you’re prompted by the setup software to connect the AP unplug the network cable that connects the broadband
modem to your computer’s Ethernet port and plug this cable into the
Ethernet port that’s marked WAN or Modem on your network’s cable
or DSL router or Internet gateway.
If you’re using an Internet or wireless gateway, run a CAT-5e/6 cable from
one of its Ethernet ports to the computer on which you’re running the
setup software. (CAT-5e/6 cable is a standard Ethernet cable or patch
cord with what look like oversized phone jacks on each end. You can
pick one up at any computer store or Radio Shack.)
If you’re using a separate AP and router (in other words, if your AP is not
your router), you need to connect a CAT-5e/6 cable between the AP and
one of the router’s Ethernet ports. Then connect another cable from
another one of the router’s Ethernet ports to the computer on which
you’re running the setup software.
Most new APs try to obtain an IP address automatically and configure
themselves for you by choosing the channel and setting default parameters
for everything else. In most cases, you need to manually
configure the security and some of the other information you
collected in Step 1 (so have that information handy).
4. Record the following access point parameters:
• Service set identifier (SSID)
• Channel — if you’re using an 802.11n draft 2 AP, this should be set
to Auto
• WEP key or WPA2 passphrase (see Chapter 9 for more details on
this subject), if your system doesn’t use WPS
• Router pin, if your system does use WPS (again, see Chapter 9 for
more details on Wi-Fi Protected Setup)
• Admin username and password

The BSSID

BSSs throughout the network. The major advantage of the BSSID is
overlapping network.
In an infrastructure BSS, the BSSID is the MAC address of the wireless
networks brought into existence. To maximize the probability of creating a
unique address, 46 random bits are generated for the BSSID. The
Universal/Local bit for the new BSSID is set to 1, indicating a local address, and
BSSID, they would need to generate an identical random 46 bits.
broadcast BSSID. Frames that
broadcasts are used only when mobile stations try to locate a network by
sending probe requests. In order for probe frames to detect the existence of a
network, they must not be filtered by the BSSID filter. Probe frames are the only
Each BSS is assigned a BSSID, a 48-bit binary identifier that distinguishes it
filtering. Several distinct 802.11 networks may overlap physically, and there is
no reason for one network to receive link-layer broadcasts from a physically
interface in the access point creating the BSS. IBSSs must create BSSIDs for
the Individual/Group bit is set to 0. For two distinct IBSSs to create the same
One BSSID is reserved. The all-1s BSSID is the
use the broadcast BSSID pass through any BSSID filtering in the MAC. BSSID
frames allowed to use the broadcast BSSID.

Abbreviations

μs microseconds
2G second generation (cellular)
3G third generation (cellular)
AC access category
ACK acknowledgement
ADC analog-to-digital converter
ADDBA add block acknowledgement
ADDTS add traffic stream
AGC automatic gain control
AID association identifier
AIFS arbitration inter-frame space
A-MPDU aggregate MAC protocol data unit
A-MSDU aggregate MAC service data unit
AoA angle of arrival
AoD angle of departure
AP access point
APSD automatic power save delivery
A-PSDU aggregate PHY service data unit
AS angular spectrum
ASEL antenna selection
AWGN additive white Gaussian noise
BA block acknowledgement
BAR block acknowledgement request
BCC binary convolution code
BF beamforming
BICM bit interleaved coded modulation
bps bits-per-second
BPSCS coded bits per single carrier for each spatial stream
BPSK binary phase shift keying
BSS basic service set
BSSID BSS identifier
BW bandwidth
CBPS coded bits per symbol
CBPSS coded bits per spatial stream
CBW channel bandwidth
CCA clear channel assessment
CCDF complementary cumulative distribution function
CCK complementary code keying
CFP contention free period
CP contention period
CRC cyclic redundancy code
CS carrier sense
CSD cyclic shift diversity
CSI channel state information
CSMA carrier sense multiple access
CSMA/CA carrier sense multiple access with collision avoidance
CSMA/CD carrier sense multiple access with collision detection
CTS clear to send
CW contention window
DA destination address
DAC digital-to-analog converter
dB decibels
dBc decibels relative to carrier
dBi decibels isotropic relative to an antenna
dBm decibel of measured power referenced to one milliwatt
DBPS data bits per OFDM symbol
dBr dB (relative)
DC direct current
DCF distributed coordination function
DELBA delete block acknowledgement
DIFS DCF inter-frame space
DLS direct link session
DS distribution system
DSL digital subscriber line
DSSS direct sequence spread spectrum
DTIM delivery traffic indication message
DVD digital versatile disc
EDCA enhanced distributed channel access
EIFS extended inter-frame space
ERP enhanced rate PHY
ESS extended service set
ETSI European Telecommunications Standards Institute
EVM error vector magnitude
EWC Enhanced Wireless Consortium
FCC Federal Communications Commission
FCS frame check sequence
FEC forward error correction
FFT fast Fourier transform
FHSS frequency hopped spread spectrum
FS free space
FTP file transfer protocol
GF Greenfield
GF-HT-STF Greenfield High Throughput Short Training field
GHz gigahertz
GI guard interval
GIF graphics interchange format
GPS global positioning system
HC hybrid coordinator
HCCA HCF controlled channel access
HCF hybrid coordination function
HEMM HCCA, EDCA mixed mode
HT high throughput
HTC high throughput control
HT-DATA High Throughput Data field
HT-LTF High Throughput Long Training field
HTSG High Throughput Study Group
HT-SIG High Throughput Signal field
HT-STF High Throughput Short Training field
HTTP hypertext transfer protocol
Hz Hertz
IBSS independent basic service set
IC integrated circuit
IDFT inverse discrete Fourier transform
IEEE Institute of Electrical and Electronic Engineers
IFFT inverse fast Fourier transform
IFS inter-frame space
IP Internet Protocol
IPv6 Internet Protocol version 6
IR infrared
ISI inter-symbol interference
ISM industrial, scientific, and medical
JPEG Joint Photographic Experts Group
kHz kilohertz
km/h kilometers per hour
LAN local area networking
LDPC low density parity check
LLC logical link control
L-LTF Non-HT (Legacy) Long Training field
LNA low noise amplifier
LOS line-of-sight
LSB least significant bit
L-SIG Non-HT (Legacy) Signal field
L-STF Non-HT (Legacy) Short Training field
LTF Long Training field
m meters
MAC medium access control
MAI MRQ or ASEL indication
MAN metropolitan area networking
Mbps megabit per second
MCS modulation and coding scheme
MF mixed format
MFB MCS feedback
MFSI MCS feedback sequence indication
MHz megahertz
MIB management information base
MIMO multiple-input multiple-output
ML maximum likelihood
MMPDU MAC management protocol data unit
MMSE minimum mean-square-error
MPDU MAC protocol data unit
MPEG Moving Picture Experts Group
MRC maximal-ratio combining
MRQ MCS request
Msample/s mega-samples per second
MSB most significant bit
MSDU MAC service data unit
MSE mean-square-error
MSFI MCS feedback sequence identifier
MSI MCS request sequence identifier
NAV network allocation vector
NDP null data packet
NF noise figure
NLOS non-line-of-sight
nsec nanosecond
OBO output back-off
OBSS overlapping BSS
OFDM orthogonal frequency division multiplexing
OSI open systems interconnection
PA power amplifier
PAR project authorization request
PAS power angular spectrum
PC point coordinator
PCF point coordination function
PCO phased coexistence operation
PDU protocol data unit
PER packet error rate
PHY physical layer
PIFS PCF inter-frame space
PLCP physical layer convergence procedure
PPDU PLCP protocol data unit
ppm parts per million
PSD power spectral density
PSDU PLCP service data unit
PSMP power-save multi-poll
PSMP-DTT PSMP downlink transmission time
PSMP-UTT PSMP uplink transmission time
QAM quadrature amplitude modulation
QoS quality of service
QPSK quadrature phase shift keying
R code rate
RA receiver address
RD reverse direction
RDG reverse direction grant
RF radio frequency
RIFS reduced inter-frame space
RMS root-mean-square
RSSI received signal strength indication
RTS request to send
Rx receive
SA source address
SAP service access point
SCP secure copy protocol
SDM spatial division multiplexing
SDU service data unit
SE spatial expansion
SIFS short inter-frame space
SIG Signal field
SIMO single-input, multiple-output
SISO single-input, single-output
SMTP simple mail transfer protocol
SNR signal-to-noise ratio
SOHO small-office, home-office
SS spatial stream
SSC starting sequence control
SSID service set identifier
SSN starting sequence number
STA station
STBC space-time block coding
STF Short Training field
STS space-time stream
SVD singular value decomposition
SYM symbol
TA transmitter address
TBTT target beacon transmission time
TC traffic category
TCLAS traffic classification
TCM trellis coded modulation
TCP transmission control protocol
TDD time division duplexing
TGn Task Group n
TGy Task Group y
TID traffic identifier
TIFF tagged image file format
TRQ training request
TS traffic stream
TSID traffic stream identifier
TSPEC traffic specification
TV television
Tx transmit
TxBF transmit beamforming
TXOP transmit opportunity
TXTIME transmit time
UDP user datagram protocol
USA United States of America
VoIP voice over IP
VPN virtual private network
WEP wired equivalent privacy
WFA Wi-Fi Alliance
WLAN wireless local area network
WM wireless medium
WNG SC Wireless Next Generation Standing Committee
WWiSE world wide spectral efficiency
XOR exclusive-or
ZF zero-forcing
ZIP ZIP file format

miércoles, 3 de marzo de 2010

Installing Wireless Access Points in Windows

We talk about both types of WPA2 in much greater detail in Chapter 9.
WPA2 Enterprise is, frankly, overkill for the home environment and much
more difficult to set up. We recommend that you use WPA2 Personal
instead — it gets you 99 percent of the way there in terms of security
and is much easier to set up and configure.
WEP keys: You should always use some security on your wireless network,
and if your network cannot support WPA, you should use, at minimum,
Wired Equivalent Privacy (WEP) encryption. Only a determined
hacker with the proper equipment and software can crack the key. If you
don’t use WEP or some other form of security, any nosy neighbor with a
laptop, wireless PC Card, and range-extender antenna may be able to see
and access your wireless home network. Whenever you use encryption,
all wireless stations in your house attached to the wireless home network
must use the same key. Sometimes the AP manufacturer assigns a
default WEP key. Always assign a new key to avoid a security breach.
Read Chapter 9 for great background info on WEP and WPA2.
WPS: Wi-Fi Protected Security works with WPA2 and makes it considerably
easier to set up WPA2 security on your network by automating the
process. As we discuss in Chapter 9, you can implement WPS in two
ways:
• PIN code: You can turn on WPA2 by simply entering a PIN code
printed on your Wi-Fi hardware (usually on a label).
• Pushbutton: You can press a button on your Wi-Fi router (a physical
button or a virtual button on a screen on the router). When the
button is pushed, your devices can automatically connect to the
router and automatically configure WPA2 in 2 minutes. Simply push
the button(s) and let things set themselves up with no further
intervention.
Username and password: Configuration software may require that you
enter a password to make changes to the AP setup. The manufacturer
may provide a default username and password (see the user documentation).
Use the default password when you first open the configuration
pages, and then immediately change the password to avoid a security
breach. (Note: This isn’t the same as the WPA2 shared key, which is also
called a password by some user interfaces.) Make sure that you use a
password you can remember and that you don’t have to write down.
Writing down a password is the same as putting a sign on the equipment
that says “Here’s how you hack into me.” If you ever lose the password,
you can always reset a device to its factory configuration and get back
to the point where you took it out of the box.
MAC address: The Media Access Control (MAC) address is the physical
address of the radio in the AP. This number is printed on a label attached
to the device. You may need to know this value for troubleshooting, so
write it down. The AP’s Ethernet (RJ-45) connection to the wired network
also has a MAC address that’s different from the MAC address of the AP’s
radio.
Dynamic or static wide area network (WAN) IP address: If your network
is connected to the Internet, it must have an IP address assigned
by your ISP. Most often, your ISP dynamically assigns this address. Your
router or Internet gateway should be configured to accept an IP address
dynamically assigned by a DHCP server. It’s possible, but unlikely, that
your ISP will require a set (static) IP address.
Local IP address: In addition to a physical address (the MAC address),
the AP also has its own network (IP) address. You need to know this IP
address to access the configuration pages by using a Web browser. Refer
to the product documentation to determine this IP address. In most cases,
the IP address is 192.168.xxx.xxx, where xxx is between 1 and 254. It’s also
possible that an AP could choose a default IP that’s in use by your cable
or DSL router (or a computer that got its IP from the cable or DSL
router’s DHCP server). Either way, if an IP conflict arises, you may have
to keep the AP and cable or DSL routers on separate networks while
configuring the AP
Subnet mask: In most cases, this value is set at the factory to
255.255.255.0. If you’re using an IP addressing scheme of the type
described in the preceding paragraph, 255.255.255.0 is the correct
number to use. This number, together with the IP address, establishes
the subnet on which this AP will reside. Network devices with addresses
on the same subnet can communicate directly without the aid of a
router. You really don’t need to understand how the numbering scheme
works except to know that the AP and all the wireless devices that will
access your wireless network must have the same subnet mask.
PPPoE: Many DSL ISPs still use Point-to-Point Protocol over Ethernet
(PPPoE). The values you need to record are the username (or user ID)
and password. The DSL provider uses PPPoE as a means of identifying and
authorizing users.

Planning Security

Unless you work for the government or handle sensitive data on your computer,
you probably aren’t overly concerned about the privacy of the information
stored on your home network. Usually it’s not an issue anyway because
someone would have to break into your house to access your network. But if
you have a wireless network, the radio signals transmitted by your network
don’t automatically stop at the outside walls of your house. In fact, a neighbor
or even someone driving by on the street in front of your house can use
a computer and a wireless networking adapter to grab information right off
your computer, including deleting your files, inserting viruses, and using your
computer to send spam — unless you take steps to protect your network.
The original security technology for Wi-Fi equipment was Wired Equivalent
Privacy (WEP). Perhaps the most well-publicized aspect of Wi-Fi wireless networking
is the fact that the WEP security feature of Wi-Fi networks can be
hacked (broken into electronically). Hackers have successfully retrieved
secret WEP keys used to encrypt data on Wi-Fi networks. With these keys,
the hacker can decrypt the packets of data transmitted over a wireless network.
Since 2003, the Wi-Fi Alliance has been certifying and promoting a
replacement security technology for WEP: Wi-Fi Protected Access (WPA and
the newer but closely related WPA2). WPA/WPA2 is based on an IEEE standard
effort known as 802.11i (so many 802.11s huh?). This technology, which
makes cracking a network’s encryption key much more difficult, is standard
in most Wi-Fi access points and network adapters available now. As discussed
earlier in this chapter, in the section “Certification and Standards Support,”
look for Wi-Fi Alliance certifications for WPA equipment.
Any Wi-Fi gear that you buy should support the latest security certification —
WPA2. Don’t accept any less and don’t forget to turn on your network’s
security.
See Chapter 9 for a full discussion of how to set up basic security for your
wireless home network.
Other useful security features to look for when buying an AP include
Network Address Translation (NAT), which we discuss earlier in this
chapter
Virtual Private Network (VPN) pass-through that allows wireless network
users secure access to corporate networks
Monitoring software that logs and alerts you to computers from the
Internet attempting to access your network
Logging and blocking utilities that enable you to log content transmitted
over the network as well as to block access to given Web sites

Choosing Wireless Home Networking Equipment

Access Point Selection

• WPA/WPA2 Enterprise: This business-oriented variant of WPA
provides the ability to use a special 802.1x or RADIUS server
(explained in Chapter 9) to manage users on the network. For
the vast majority of wireless home networkers, this capability is
overkill, but it doesn’t hurt to have it (any WPA/WPA2 Enterprise
certified system also supports WPA/WPA2 Personal).
Other certifications: The Wi-Fi Alliance provides a number of other specialized
certifications that not all Wi-Fi certified gear will have earned,
like the following:
• WMM: Wi-Fi Multimedia certification can be found on a growing
number of audio/video and voice Wi-Fi equipment (these items
are discussed in Chapters 12 and 13, respectively). WMM certified
equipment can provide on your wireless LAN some Quality of
Service (QoS), which can give your voice, video, or audio data
priority over other data being sent across your network. We talk
about WMM where appropriate in Chapters 12 and 13.
• WPS: Wi-Fi Protected Setup certification is increasingly common on
new equipment, but still rather new as we write this. WPS, which
we discuss in detail in Chapter 9, is a user-friendly front end to
WPA2 Personal, and allows you to set up network security simply
by pushing buttons (or entering preassigned PIN codes) on your
AP/router and network clients.
• EAP: Extensible Authentication Protocol is part of the WPA
Enterprise/802.1x system used in business wireless LANs — EAP
provides the mechanism for authenticating users (or confirming
that they are who they say they are). A number of different EAP
types can be used with WPA Enterprise — each type can be certified
by the Wi-Fi Alliance. You don’t need to worry about this
unless you’re building a WPA Enterprise security system for your
network.

Servers,Gateways, Routers, and Switches
DHCP servers
To create an easy-to-use home network, your network should have a Dynamic
Host Configuration Protocol (DHCP) server. A DHCP server dynamically assigns
an IP address to each computer or other device on your network. This function
relieves you from having to keep track of all the devices on the network and
assign addresses to each one manually.
Network addresses are necessary for the computers and other devices on
your network to communicate. Because most networks now use a set of protocols
(Transmission Control Protocol/Internet Protocol, or TCP/IP) with
network addresses (Internet Protocol, or IP, addresses), we refer to network
addresses as IP addresses in this book. In fact, the Internet uses the TCP/IP
protocols, and every computer connected to the Internet must be identified
by an IP address.

NAT and broadband routers

A wireless router is a wireless AP that enables multiple computers to share
the same IP address on the Internet. This fact would seem to be a contradiction
because every computer on the Internet needs its own IP address.
The magic that makes an Internet gateway possible is Network Address
Translation (NAT). Most access points you buy now are wireless gateways.
Vendors sometimes call these wireless routers wireless broadband routers or
perhaps wireless cable/DSL routers. What you’re looking for is the word router
somewhere in the name or description of the device itself. Stand-alone access
points (without the router functionality) usually are called just an access
point, so sometimes it’s easier to look for something not called that!
In addition to providing NAT services, the wireless routers used in home
networks also provide the DHCP service. The router communicates with
each computer or other device on your home network via private IP
addresses — the IP addresses assigned by the DHCP server. (See the section
“DHCP servers,” earlier in this chapter.) However, the router uses a single IP
address — the one assigned by your ISP’s DHCP server — in packets of data
intended for the Internet.

Switches

Wireless routers, available from nearly any manufacturer, include from one to
eight Ethernet ports with which you can connect computers or other devices
via Ethernet cables. These routers are not only wireless APs but are also wired
switches that efficiently enable all the computers on your network to communicate
either wirelessly or over Ethernet cables.
Make sure that the switch ports support at least 100BaseT Ethernet — this is
the 100 Mbps variant of Ethernet. You should also ensure that the switch
supports the full-duplex variant of 100BaseT — meaning that it supports 100
Mbps of data in both directions at the same time. If you’re looking for the ultimate
in performance, you should strongly consider paying a bit more for a
router that supports Gigabit Ethernet (1000BaseT)

Planning Security

Any network can be attacked by a persistent hacker, but a well-defended network
discourages most hackers sufficiently to keep your data safe. However,
it’s easier for a hacker to gain access through the air to a wireless network
than to gain physical access to a wired network, making wireless networks,
and even home networks, more vulnerable to attack. Because a Wi-Fi signal
is a radio signal, it keeps going and going and going, like ripples in a pond,
in a weaker and weaker form until it hits something solid enough to stop it.
Anyone with a portable PC, wireless network adapter, and an external antenna
in a van driving by your house, or even a neighbor with this equipment, has a
reasonable chance of accessing your wireless network. (Such skullduggery is
known as war driving.) So, you must plan for security. We give you all the
down-and-dirty details in Chapter 9, but here are some key things to keep
in mind:

Internet security: Any Internet connection — especially always-on broadband
connections, but dial-up connections, too — can be vulnerable to
attacks arriving from the Internet. To keep your PCs safe from the bad
folks (who may be thousands of miles away), you should turn on any firewall
features available in your AP or router. Some fancier APs or routers
include a highly effective kind of firewall (a stateful packet inspection [SPI]
firewall), but even just the basic firewall provided by any NAT router can
be quite effective. You should also consider installing antivirus software
as well as personal firewall software on each PC or Mac on your network
for an extra level of protection.
Airlink security: This is a special need of a wireless home network. Wired
networks can be made secure by what’s known as physical security. That
is, you literally lock your doors and windows, and no one can plug into
your wired network. In the wireless world, physical security is impossible
(you can’t wrangle those radio waves and keep them in the house), so
you need to implement airlink security. You can’t keep the radio waves
from getting out of the house, but you can make it hard for someone to
do anything with them (like read the data they contain). Similarly, you
can use airlink security to keep others from getting onto your access
point and freeloading on your Internet connection. The primary means
of providing airlink security — and advances are on the way — is called
WPA2 (Wi-Fi Protected Access). You absolutely should use WPA2

Choosing a wireless technology

After you know what you’re networking and what will be on your wireless network,
you have to decide how to network wirelessly. As we discuss extensively
in Chapter 2, four main variants of wireless networking technologies
exist: 802.11a, 802.11b, 802.11g and 802.11n (draft standard).
Collectively, all these technologies are usually referred to as Wi-Fi, which isn’t
a generic term, but, rather, refers to a certification of interoperability. The
folks at the Wi-Fi Alliance (www.wi-fi.org) do extensive testing of new wireless
gear to make sure that it works seamlessly with wireless equipment from different
manufacturers. When it works, it gets the Wi-Fi logo on the box, so you
can rest assured that it works in your network.

Wi-Fi certified gear works together — as long as it’s of a compatible type. That
means that any 802.11b, 802.11g, or 802.11n Wi-Fi certified gear works with
any other equipment of that type; similarly, any 802.11a Wi-Fi certified gear
works with any other 802.11a and 5 GHz capable 802.11n gear that has been
certified. (Note that not all 802.11n gear is 5 GHz capable — if a particular
piece of equipment supports this, it will say so and will also be 802.11a certified.)
802.11b and g gear does not work with 802.11a gear, even if it has all
been certified because they work on different radio frequencies and cannot
communicate with each other.
The discussion of wireless technology quickly degenerates into a sea of
acronyms and technospeak. If you need a refresher on this alphabet soup —
or to begin from square one — Chapter 2 is a primer on jargon, abbreviations,
and other nuts-and-bolts issues.
For home users, the three most important practical differences between
802.11a, 802.11b, 802.11g, and 802.11n networks are speed, price, and
compatibility.

802.11b is an older standard that is no longer used these days. You would
be hard pressed to find any 802.11b in your network, and only if you have
been buying legacy equipment at flea markets or electronic junk yards.
802.11g equipment has been the standard in use for a few years. Thanks
to its proliferation, it’s inexpensive but at least four times faster than
802.11b.
802.11a can still be found in some special-use corporate environments,
but it’s no longer used in the home. It is as fast as 802.11g, costs much
more, and has a shorter range.
802.11n is five times faster than 802.11a and 802.11g and is 22 times
faster than 802.11b.
802.11a and 802.11b are not compatible.
802.11a and 802.11g are not compatible.
802.11b and 802.11g are compatible.
802.11n is compatible with all other standards but at the cost of its
higher speed — when you add 802.11a, b, or g gear to an 802.11n network,
you slow down the ultimate throughput or speed of that network.
The 802.11n standard is compatible with all other standards, but not all 802.11n
equipment supports both the 2.4 GHz (802.11b and g) and 5 GHz (802.11a) frequencies
— many support only 2.4 GHz. An AP that includes 802.11n should
work with any other device as well (though not always at the higher 248 Mbps
speed of 802.11n). Thus, you don’t have to look for a multimode AP.
If your primary reason for networking the computers in your house is to
enable Internet sharing, 802.11g is more than fast enough because your
Internet connection probably won’t exceed the 54 Mbps of the 802.11g connection
any time soon — unless you’re one of the lucky few who lives where
fiber-optic Internet services (such as Verizon’s FiOS service) are installed.
Despite the fact that most Internet services are slower than 802.11g, we don’t
recommend that you buy only 802.11g gear. 802.11g is being superseded by
802.11n with full 802.11g compatibility. In fact, you would save only a few
bucks by buying 802.11g gear new. The speed, range, and compatibility of
802.11n are more than worth the increased price tag.
802.11g is the minimum standard around which you should build your network.
If you want to hedge your bets, look for an 802.11n AP that can handle all Wi-
Fi technology standards. Apple, Belkin, NETGEAR, D-Link, and several other
leading manufacturers of wireless home networking equipment already offer
802.11n wireless devices.

Choosing wired or wireless

After you know what you’re networking, you need to choose how to network
it. By that, we mean that you have to decide what to connect to your home’s
network with wires and what you should use wireless networking for. At first
glance, this decision may seem obvious. You would expect us to always recommend
using wireless because this book talks about wireless networks;
however, using both wired and wireless connections can sometimes make
the most sense.
Wireless network devices and wired network devices can be used on the same
network. Both talk to the network and to each other by using a protocol
known as Ethernet. (You should be getting used to that term by now if you
have been reading from the beginning of the book. If not, read through
Chapters 1 and 2 for more information about networking technology.)
The obvious and primary benefit of connecting to a network wirelessly is that
you eliminate wires running all over the place. But, if two devices are sitting
on the same desk or table — or are within a few feet of each other — connecting
them wirelessly may be pointless. You can get Ethernet cables for $5 or
less; an equivalent wireless capability for two devices may top $100 when
everything is said and done. Keep in mind, however, that your computer
must have a wired network adapter installed to be able to make a wired connection
to the network. Fortunately, wired network adapters are dirt cheap
these days. Virtually all new computers come with one installed as a standard
feature (at no additional charge).

Wi-Fi versus Bluetooth

Wi-Fi and Bluetooth are designed to coexist in the network, and although
they certainly have overlapping applications, each has its distinct zones
of advantage.
The biggest differences between Wi-Fi and Bluetooth are
Distance: Bluetooth is lower powered, which means that its signal can
go only short distances (up to 10 meters, or a bit more than 30 feet).
802.11 technologies can cover your home, and in some cases more,
depending on the antenna you use. Some Bluetooth devices operate
under a high-powered scheme (called Class 1 Bluetooth devices), which
can reach up to 100 meters. Most home Bluetooth devices don’t have
this kind of range, mainly because they’re designed to be battery powered,
and the shorter Class 2 range of 10 meters provides a better tradeoff
between battery life and range.
Speed: The latest versions of Wi-Fi can carry data at rates in the hundreds
of megabits per second; the fastest existing Bluetooth implementations
have a maximum data rate of 3 Mbps. So think of Wi-Fi as a networking
technology that can handle high-speed transfers of the biggest files, and
Bluetooth as something designed for lower speed connections (such as
carrying voice or audio signals) or for the transfer or synchronization of
smaller chunks of data (such as transferring pictures from a camera
phone to a PC).
Application: Bluetooth is designed as a replacement for cables: that is, to
get rid of that huge tangle of cables that link your mouse, printer, monitor,
scanner, and other devices on your desk and around your home. In fact,
the first Bluetooth device was a Bluetooth headset, which eliminated that
annoying cable to the telephone that got in the way of typing. Many new
cars are also outfitted with Bluetooth so that you can use your cell phone
in your car, with your car’s stereo speakers and an onboard microphone
serving as your hands-free capability. Pretty neat, huh?
Wi-Fi (802.11a/b/g/n) and Bluetooth are similar in certain respects: They both
enable wireless communication between electronic devices, but they are
more complementary than direct competitors. Wi-Fi technology is most often
used to create a wireless network of personal computers that can be located
anywhere in a home or business. Bluetooth devices usually communicate
with other Bluetooth devices in relatively close proximity.
The easiest way to distinguish Wi-Fi from Bluetooth is to focus on what each
one replaces:
Wi-Fi is wireless Ethernet: Wi-Fi is a wireless version of the Ethernet
communication protocol and is intended to replace networking cable
that would otherwise be run through walls and ceilings to connect
computers in multiple rooms or even on multiple floors of a building.
Bluetooth replaces peripheral cables: Bluetooth wireless technology
operates at short distances — usually about 10 meters — and most
often replaces cables that connect peripheral devices such as a printer,
keyboard, mouse, or personal digital assistant (PDA) to your computer.
Bluetooth replaces IrDA: Bluetooth can also be used to replace another
wireless technology — Infrared Data Association (IrDA) wireless technology
— that’s already found in most laptop computers, PDAs, and even
many printers. Although IR signals are secure and aren’t bothered with
radio frequency (RF) interference, IrDA’s usefulness is hindered by
infrared’s requirement for line-of-sight proximity of devices. Just like the
way your TV’s remote control must be pointed directly at your TV to
work, the infrared ports on two PDAs must be lined up to trade data,
and your laptop has to be “pointing” at the printer to print over the
infrared connection. Because Bluetooth uses radio waves rather than
light waves, line-of-sight proximity isn’t required.
Like Wi-Fi, Bluetooth can offer wireless access to LANs, including Internet
access. Bluetooth devices can potentially access the Public Switched Telephone
Network (PSTN: you know, the phone system) and mobile telephone networks.
Bluetooth is able to thrive alongside Wi-Fi by making possible such innovative
solutions as a hands-free mobile phone headset, print-to-fax, and automatic
PDA, laptop, and cell phone/address book synchronization.

Understanding Wi-Fi channels

Now for a little talk about frequency bands used
by the various Wi-Fi standards. In 1985, the FCC
made changes to the radio spectrum regulation
and assigned three bands designated as the
industrial, scientific, and medical (ISM) bands.
These frequency bands are
902 MHz–928 MHz: A 26 MHz bandwidth
2.4 GHz–2.4835 GHz: An 83.5 MHz bandwidth
5.15–5.35 GHz and 5.725 GHz–5.825 GHz: A
300 MHz bandwidth
The FCC also opened some additional frequencies,
known as Unlicensed National Information
Infrastructure (U-NII), in the lower reaches of
the five GHz frequencies.
The purpose of the FCC change was to encourage
the development and use of wireless networking
technology. The new regulation
permits a user to operate, within certain guidelines,
radio equipment that transmits a signal
within each of these three ISM bands without
obtaining an FCC license.
Wireless networks use radio waves to send
data around the network. 802.11a uses part of
the U-NII frequencies, and IEEE 802.11b and g
use the ISM 2.4 GHz band. 802.11n can use
either band, though not all 802.11n systems do
(many use only the 2.4 GHz band).
An important concept when talking about frequencies
is the idea of overlapping and
nonoverlapping channels. As we discuss in
Chapter 18, signals from other APs can cause
interference and poor performance of your
wireless network. This happens specifically
when the APs’ signals are transmitting on the
same (or sometimes nearby) channels. Recall
that the standards call for a number of channels
within a specified frequency range.
The frequency range of 802.11g, for example, is
between 2.4 GHz and 2.4835 GHz, and it’s broken
up into fourteen equal-sized channels. (Only
eleven can be used in the United States — any
equipment sold for use here allows you to
access only these eleven channels.) The problem
is that these channels are defined in such a
way that many of the channels overlap with one
another — and with 802.11g, there are only
three nonoverlapping channels. Thus, you
wouldn’t want to have channels 10 and 11 operating
side by side because you would get signal
degradation. You want noninterfering, nonoverlapping
channels. So you find that people tend
to use Channels 1, 6, and 11, or something similar.
802.11a doesn’t have this problem because
its eight channels, in the 5 GHz frequency band,
don’t overlap; therefore, you can use contiguous
channels. As with 802.11b and g, however,
you don’t want to be on the same channel.

Wireless Networking Fundamentals

Transmission Control Protocol/Internet Protocol (TCP/IP) is the most common
protocol for transmitting packets around a network. Every computer on a
TCP/IP network must have its own IP address, which is a 32-bit numeric
address that’s written as four groups of numbers separated by periods
(for example, 192.168.1.100). Each number of these four sets of numbers is
known as an octet, which can have a value from 0 to 255. The Internet transmits
packets by using the TCP/IP protocol. When you use the Internet, the
Internet service provider (ISP) — such as AOL, EarthLink, or your cable or
DSL provider — assigns a unique TCP/IP number to your computer. For the
period that your computer is connected, your computer “leases” this unique
address and uses it like a postal address to send and receive information
over the Internet to and from other computers.
A router with the Network Address Translation (NAT) feature also helps to
protect the data on your computers from intruders. The NAT feature acts as
a protection because it hides the real network addresses of networked computers
from computers outside the network. Many WAN routers also have
additional security features that more actively prevent intruders from gaining
unauthorized access to your network through the Internet. This type of protection
is sometimes described generically as a firewall. Good firewall software
usually offers a suite of tools that not only block unauthorized access
but also help you to detect and monitor suspicious computer activity. In
addition, these tools provide you with ways to safely permit computers on
your network to access the Internet.

Internet gateways

These days, you can get a device that really does it all: a wireless Internet gateway.
These devices combine all the features of an access point, a router, and
a broadband modem (typically, cable or DSL, but this could also be a fiberoptic
connection such as Verizon’s FiOS or even another wireless connection).
Some wireless Internet gateways even include a print server (which
enables you to connect a printer directly to the gateway and use it from any
networked PC), a dial-up modem, and even some Ethernet ports for computers
and devices that connect to your network with wires.
For example, the Motorola Netopia MiAVo Series Gateways (www.netopia.com)
include a built-in DSL modem, a router, a wireless access point, and other networking
features such as a firewall and an easy-to-use graphical user interface
(GUI) for configuring and setting up the gateway.
Not many of these devices are on the market; you can’t buy many of them offthe-
shelf, but you can get them directly from your broadband service provider.
The term gateway gets used a lot by different folks with different ideas about
what such a device is. Although our definition is the most common (and, in
our opinion, correct), you may see some vendors selling devices that they
call Internet gateways that don’t have all the functions we describe.

Network infrastructure

Workstations must be electronically interconnected to communicate. The
equipment over which the network traffic (electronic signals) travels
between computers on the network is the network infrastructure.

Network hubs

In a typical office network, a strand of wiring similar to phone cable is run
from each computer to a central location, such as a phone closet, where each
wire is connected to a network hub. The network hub, similar conceptually
to the hub of a wheel, receives signals transmitted by each computer on the
network and sends the signals out to all other computers on the network.
Figure 2-1 illustrates a network with a star-shaped topology (the physical
design of a network). Other network topologies include ring and bus. Home
networks typically use a star topology because it’s the simplest to install and
troubleshoot.

Bridges

A network bridge provides a pathway for network traffic between networks or
segments of networks. A device that connects a wireless network segment to
a wired network segment is a type of network bridge. In larger networks, network
bridges are sometimes used to connect networks on different floors in
the same building or in different buildings. In a wireless home network, the
device that manages the wireless network, the access point, often acts as a
bridge between a wireless segment of the network and a wired segment.
Hubs and switches
Networks transmit data in bundles called packets. Along with the raw information
being transmitted, each packet also contains the network address of
the computer that sent it and the network address of the recipient computer.
Network hubs send packets indiscriminately to all ports of all computers connected
to the hub — which is why you don’t see them much any longer.
A special type of hub called a switched hub examines each packet, determines
the addressee and port, and forwards the packet only to the computer and
port to which it is addressed. Most often, switched hubs are just called
switches. A switch reads the addressee information in each packet and sends
the packet directly to the segment of the network to which the addressee is
connected. Packets that aren’t addressed to a particular network segment are
never transmitted over that segment, and the switch acts as a filter to eliminate
unnecessary network traffic. Switches make more efficient use of the
available transmission bandwidth than standard hubs, and therefore offer
higher aggregate throughput to the devices on the switched network.

Routers

Over a large network and on the Internet, a router is analogous to a superefficient
postal service — it reads the addressee information in each data packet
and communicates with other routers over the network or Internet to determine
the best route for each packet to take. In the home, a home or broadband
router uses a capability called Network Address Translation (NAT) to enable all
the computers on a home network to share a single Internet address on the
cable or DSL network. The home router sits between your broadband modem
and all the computers and networked devices in your house, and directs traffic
to and from devices both within the network and out on the Internet.
So, the local area network in your home connects to the wide area network,
which takes signals out of the home and on to the Internet.

lunes, 1 de marzo de 2010

Signal Loss for Obstacle Types

Appendix E. Signal Loss for Obstacle Types

Appendix E. Signal Loss for Obstacle Types

Obstruction

Additional Loss (dB)

Effective Range

Open space

0

100%

Window (nonmetallic tint)

3

70%

Window (metallic tint)

5–8

50%

Light wall (drywall)

5–8

50%

Medium wall (wood)

10

30%

Heavy wall (15 cm solid core)

15–20

15%

Very heavy wall (30 cm solid core)

20–25

10%

Floor/ceiling (solid core)

15–20

15%

Floor/ceiling (heavy solid core)

20–25

10%

Appendix B. 802.11 Wireless Equipment

Table B.1. 802.11b Client Adapters

Card Name

Interface Type(s)

Power

Antenna Connector

Chipset

1stWave Wavemaxxpro

PCMCIA

100 mW

None

Prism

Actiontec HWC01170-01

PCMCIA

None

Prism 3

3com AirConnect

PCMCIA

30 mW

Dual Lucent

Prism 2.5

AddtronCard

PCMCIA

30 mw

None

IntersilPrism

Belkin F5d6020

PCMCIA

50 mW

None

Prism 2

Belkin F5d6020 Ver.2

PCMCIA 16

50 mW

Yes

Atmel AT76C50A

Buffalo Technology

PCMCIA

30 mw

IntersilPrism w/Aironet MAC controller

Demarc ReliaWave 200mW

PCMCIA

200 mW

RP-MMCX

Prism 2.5

Demarc ReliaWave 100mW

PCMCIA

100 mW

RP-MMCX

Prism 2.5

smartBridges airCard

Wireless PCMCIA

50 mW

Yes

Deliberant WEC-100

Ethernet client/bridge

100 mW

No

Prism 2.5

Dell TrueMobile 1150

PCMCIA/MiniPCI

30 mW

Same as Orinoco

Hermes

DlinkDwl520

PCI

32 mW

Reverse SMA

IntersilPrism 2.5

DlinkDwl520plus

PCI

32 mW

Reverse SMA

TI ncx100

DlinkDwl650Plus

CardBus

TI Chipset

DlinkDwl660

PCI

TI Chipset

Engenius

See entry for Senao

FarallonSkyLink PC-Card

N/A

Unknown

IntersilPrism

IBM High Rate Wireless LAN Card

PCMCIA/ISA (with adapter)

30 mW

Lucent proprietary connector

Hermes

InTalkNokiaCard

PCMCIA/ISA

Intel2011Card

PCMCIA/PCI

30 mW

None

IntersilPrism

LinksysCard WPC11

16-bit PCMCIA

95 mW

No

IntersilPrism

Linksys WPC11

PCMCIA 16

16 mW

No

Prism 2.0

Linksys WPC11 v2.5

PCMCIA 16

40 mW

No

Prism 2.5

Linksys WPC11 v3.0

PCMCIA 16

40 mW

No

Prism 3.0

Linksys WMP11

PCI

35 mW

Reverse SMA connector

Prism 2.5

LinksysWET11

Ethernet bridge/client

80 mW

Reverse SMA connector

Prism

Lucent / Orinoco Gold (Agere)

PCMCIA

30 mW

MC Card

Hermes

Lucent / Orinoco Silver (Agere)

PCMCIA

30 mW

MC Card

Hermes

Lucent WaveACCESS PC24E-H-ET-L

PCMCIA

6 mW

Same as Lucent wireless card

Hermes

NetGate 2511CD PLUS EXT2

PCMCIA

200 mW

2x MMCX external antenna jacks

Prism 2.5

NetGate 2511CD PLUS

PCMCIA

200 mW

No

Prism 2.5

NetGate 2511MP PLUS

Mini PCI

150 mW

2x MMCX antenna jacks

Prism 2.5

NetGear MA101

USB1.1

30 mW

SMA Mod

Atmel AT76C50A

NetGear MA301

PCI

NetGear MA311GE

PCI

Yes

IntersilPrism 2.5

Netgear MA401

PCMCIA

59 mW

None

Linux

NetWaveCard

Nortel Emobility 4121

PCMCIA

100 mW

None

SymbolSpectru

Nortel Emobility 4123

PCI

100 mW

Dual MMCX

SymbolSpectru

Proxim RangeLan-DS 8434-05

16-bit PCMCIA

30 mW

Reverse MMCX

IntersilPrism 2

Proxim RangeLan-DS 8433-05

16-bit PCMCIA

30 mW

Unknown (SSM-?)

IntersilPrism 2

SamsungCard

PCMCIA/ISA

IntersilPrism

Senao/Engenius L-2511 Plus EXT2

PCMCIA Type II 16-bit

250 mW max

Dual female MMCX

Prism 2.5

Senao/Engenius NL-2511 Plus

PCMCIA Type II 16-bit

250 mW max

Internal diversity antenna

Prism 2.5

SMC2602W

PCI

IntersilPrism

SMC 2532W-B 200mW

PCMCIA

200 mW

RP-MMCX-?

Prism 2.5

SMC2632W

PCMCIA

50 mW

None

IntersilPrism

Sony PCWA-C100

16-bit PCMCIA

MC-Card

Hermes

Symbol Spectrum 24

Compact Flash Type 1

100 mW

None

SymbolWireless Networked 4111

PCMCIA

100 mW

Dual MMCX

IntersilPrism 2

SymbolWireless Networked 4121

PCMCIA

100 mW

SymbolWireless Networked 4123

PCI

100 mW

Dual MMCX

IntersilPrism 2

ToshibaWireless

PCMCIA

30 mW

MC-Card (Radiall)

Trendware TEW-201PC

PCMCIA

Trendware TEW-221PC

PCMCIA

Yes

ADMTek ADM8211

Trendware TEW-301PC

PCMCIA

None

U.S. Robotics 2410

PCMCIA

30 mW

None

Prism 2

U.S. Robotics 2415

PCI

30 mW

None

Prism 2

Wave2Net by Ambicom (WL1100B, etc.)

PCMCIA/PCI

50 mW

None

Prism 2

YdiCard

PCMCIA

XircomSwe

Springboard

30 mW

None

ZoomAirCard

PCMCIA/ISA

ZoomAirCard

PCMCIA/PCI

25 mW

4105 with PCI Bridge Card (Elan with TI1440 chip)

ZcomaxCards xi325H/xi626

PCMCIA/PCI

100 mW xi325H1 is the 200mW version


Prism 2

ZcomaxCards xi325HP

PCMCIA

200 mW

IPrism 2.5


Table B.2. 802.11a Client Adapters

Manufacturer/Model

Bus Type

Transmit Power

External Antenna Connector

Chipset

Proxim

Cardbus

40 mW /200 mW

None

Atheros AR5000

Intel

Cardbus

40 mW /200 mW

Atheros AR5000

SMC2735

Cardbus

40 mW /200 mW

None

Atheros AR5000

NetGear

Cardbus


Table B.3. Prism-Based Cards

Manufacturer/ Model

Bus Type

Connector

Rx

Tx

Addtron

PCMCIA

–76 dBm

>13 dBm

Addtron

PCMCIA

Allnet

PCI

SMA

Asanté

PCMCIA

13 dBm

Asus

Compact Flash

None

12–15 dBm

Belkin

PCMCIA

13–20 dBm (50 mW max)

Belkin

PCI

Reverse SMA

Compaq

PCMCIA

None

20 mW typ. / 100 mW max

Compaq

PCI

Reverse threaded SMA

20 dBm max

CellVision

Demarc

PCMCIA

Diversity RP-MMCX

-91 dB

100 mW or 20 dBm

Demarc

PCMCIA

Diversity RP-MMCX

–91 dB

200 mW or 23 dBm

D-Link

PCI

Reverse SMA

D-Link

PCMCIA

Yes, with nice switch

D-Link

PCMCIA

Hackable

–78 or –84 dBm

14 or 17 dBm

D-Link

Compact Flash

Lid snaps off/has socket

–80 to –88 dBm

14 or 18 dBm

Linksys

PCMCIA

14 dBm

Linksys

PCI

RP-SMA

16 dBm

Musenki

PCI

Reverse SMC

–87 dBm

18 dBm

Musenki

PCMCIA

Dual MMCX

–89 dBm

23 dBm (200 mW)

Proxim

PCMCIA

Dual reverse MMCX

–83 dBm

13 dBm

Proxim

PCMCIA

Single unknown connector (SSMB?)

–83 dBm

13 dBm

SMC

PCMCIA

Dual (RP?)-MMCX

–89 dBm

200 mW max (23 dBm)

SMC

PCMCIA

Hackable

–76 dBm

50 mW max (17 dBm)

SMC

PCI

Unknown but strange solder pads on PCI card

–76 dBm

50 mW max (17 dBm)

Teletronics

PCMCIA

Dual reverse MMCX

–83 dBm

15 dBm

Zcomax

PCMCIA

Dual reverse MMCX

–83 dBm

13 dBm

Zcomax

PCMCIA

None

–83 dBm

13 dBm

Zcomax

PCMCIA

Dual MMCX (probably reverse)

Zcomax

PCMCIA

Dual reverse MMCX

–85 dBm

15 dBm

Zcomax

PCMCIA

Dual reverse MMCX

–83 dBm

100 mW

Zcomax

PCMCIA

Dual reverse MMCX

180 mW

ZoomAir

PCMCIA

RP-SMA

14 dBm

 
Locations of visitors to this page
Nuestro blog en
casas madera y blogs
Reprezint Diaspora in recensamantul Bloggerilor Promoveaza-te pe acest blog
by HORAblogs