1.18.2010

Wireless Broadband


How quickly things change. Last year, broadband was the thing. Now that's history: wireless broadband is where it's at. And it's hardly surprising. Wireless connection - and a fast wireless Internet connection in particular - is fabulously convenient. Move your PCs to wherever you want them without worrying about trailing network cables everywhere; make Voice-over IP calls from the bathroom; surf from the sofa; stream music around your house wherever you want it.

Text "Haiti" to 90999 to donate to the Red Cross for Haiti relief. 100% of your $10 donation passes through.

The last time we looked at how to set up a wireless network, there were several qualifications, problems and caveats. Many new wireless devices simply didn't work properly out of the box - if at all - and Windows XP's wireless configuration boxes had the unfortunate habit of leading you round in circles.

All this is changing, though. And while the nature of radio waves is that you may occasionally suffer connection problems, things have moved apace in the last year. The advent of MIMO devices, which provide greater range and speed by using the radio waves that bounce off obstacles, is a huge step forward for the reliability of connections. And Windows XP Service Pack 2's much-improved wireless network support means there's really very little effort required to get yourself up and running.

There's one thing you should be aware of, though: security. You need to secure your new wireless network as soon as possible. The newest and safest encryption system, WPA, is a doddle to implement and extremely secure if you follow our walkthrough and setup tips. The word 'encryption' puts people off because it sounds complicated, but it's vital to secure your network from people leeching your connection, stealing your bandwidth and potentially gaining access to everything on your PC. An unsecured wireless connection is the equivalent of an open front door - it's a direct route to everything on your hard disk.

THE ESSENTIALS

While networking has become easier since the launch of Windows XP and its more or less self-configuring network connections, it can still be a topic couched in obscure jargon, which it's worth getting a passing knowledge of.

Routers

When people talk about wireless routers these days, they're talking about a wireless access point and router combined. The access point part allows your wireless PCs and devices to connect together; the router part allows those wireless devices to talk to wired devices and, crucially, gain access to your broadband connection. If your broadband is ADSL, you'll need a wireless ADSL router; if you have a Telewest or ntl subscription, which came with a cable modem featuring an Ethernet output, you need a wireless cable/DSL router. You can also get away with a cable/DSL router if your ADSL modem has an Ethernet port. There's some confusing terminology surrounding products too. Wireless routers are sometimes referred to as wireless gateways, switches or hubs - they're the same thing mostly.

Ethernet

Practically every PC motherboard these days has an Ethernet networking port with a maximum speed of 100Mb/sec (Fast Ethernet) or 1,000Mb/sec (Gigabit Ethernet). A wireless router will usually sport five Ethernet ports: one for the WAN (wide area network) connection, which connects to your cable or DSL modem supplied by your broadband ISP, and four for the LAN (local area network) side. You don't need to use these if you're going for a purely wireless setup, but they allow you to connect wired devices for one unified network, and it's useful to be able to connect with a wired connection for initial setup of your wireless security.

Network addresses

All modern networks, from your home LAN up to the Internet, now use the TCP/IP (Transfer Control Protocol/Internet Protocol) system to communicate; it's almost made all other network protocols obsolete. TCP/IP is a packet-switched networking system. This means data is divided up and sent from transmitter to receiver in small chunks. These packets of information can travel via different routes around the network and need to be routed to the correct destination. This is why the single most important concept in a TCP/IP network is the IP address. Every network adaptor - wired or wireless - on a network must be assigned a unique IP address for that network, so that data packets can find their way to the correct destination. Without exception, all wireless routers will by default handle that automatically via DHCP (dynamic host configuration protocol). The DHCP server in the router doles out an IP address to every wireless PC or device that tries to connect to it.

Gateways and DNS servers

As well as giving a wireless device an IP address, it also informs the device of three important bits of information it needs to communicate: the address of a gateway, the address of a DNS server and a subnet mask. The first two allow the device to communicate with the Net. A gateway is simply the IP address of the device that can route data to and from an external network; in the case of a home router, that external network is the Internet. So in the majority of cases, the gateway address is in fact the router's own IP address; it then acts as a broker, forwarding requests for web pages back and forth via a process known as NAT (network address translation).

A DNS (domain name system) server is one that a PC uses to translate 'friendly' web addresses (www.pcpro.co.uk, for example) into numerical IP addresses by which it can request web pages. The subnet mask is often the cause of confusion; it's a way of separating network subsegments. You don't need to worry about it, however - it's only of relevance to corporate-scale networks and doesn't impinge on getting your wireless network up and running.

Incidentally, NAT also acts as a safeguard in conjunction with any hardware firewall the router may have, since it means that external PCs on the Net can't get direct access to any given PC on your internal wireless network. This is in contrast to USB modems commonly supplied by ISPs, which place your PC onto the Internet directly and are an invitation to hackers.

Mac address

A second type of address you'll probably encounter is known as the MAC (media access control) address. Every standard Ethernet network device, including Wi-Fi access points and adaptors, has a unique hardware MAC address assigned to it at manufacture. For the end user, this is useful, because it allows MAC address-based security to restrict access to a wireless network.

NEW TECHNOLOGY

In the beginning - at least as far as consumers and small businesses were concerned - there was 802.11b, the first popularly adopted Wi-Fi standard. It offers a maximum theoretical throughput of 11Mb/sec, but in practice you're highly unlikely to achieve anything exceeding 5Mb/sec. Then came 802.11g to give a maximum theoretical throughput of 54Mb/sec, but again it's near impossible to achieve even a third of that in practice. But that isn't the only problem - variations in positioning and range make an enormous and unpredictable difference in the speed and reliability of both 11b and 11g wireless networks. This is particularly true in Europe as opposed to the US, where houses tend to be made of wood with thinner walls more easily penetrated by radio waves. Put joists, metal-reinforced concrete and so forth in its way and the results are unpredictable.

The standard issue

The solution may well lie in MIMO (multiple input, multiple output) technology. This forms part of the as-yet unratified standard 802.11n, which is set to replace 11b and 11g. MIMO splits one incoming data stream into multiple lower-rate streams, transmitting simultaneously via two or more aerials on the same channel. It improves both range and transmission speed by relying on a phenomenon known as multipath, where signals arrive at different times because of reflections. That's usually considered a problem, but here it effectively creates virtual radio channels along which more than one stream of data can be fed on the same frequency. Receiving the differing signals on multiple aerials, the two data streams can be reconstructed. Current WLAN MIMO technology has a maximum theoretical speed of 108Mb/sec - twice as fast as 802.11g and more than enough to cater for multiple users streaming multi-media files around a large house. MIMO offers higher speeds over longer range than conventional WLAN, so you'll be able to connect from further away without needing to spend extra on wireless bridges or repeaters.

You'll need to spend more on the router itself, though. Not just because a pre-N router such as the Belkin costs around £75 to the £40 of a typical 802.11g router, but because you'll also need to buy matching PC Cards (or USB adaptors) to upgrade the wireless radios in your notebook or PC.

Apart from the inevitably high cost of buying a new technology, the chief drawback of MIMO is that until it's ratified by the IEEE the way in which it's implemented by manufacturers will be proprietary. This means there's no guarantee MIMO products from different manufacturers will work together at 108Mb/sec; it's more likely that everything will slow to standard 802.11g speeds. But having been using MIMO products - in particular, Belkin's Pre-N router and network card - for the last couple of months, we're big fans of the technology. Range and, more importantly, reliability of the connection are hugely improved.

Transfer big files, fast

Four months ago, we tested 15 wireless routers in a group test and saw clearly the benefits of MIMO technology over standard 802.11g. Although the MIMO-based routers were generally faster than 802.11g routers at close range, the real difference came when we moved our test notebook further away from the router: while many routers struggled to make a connection, the MIMO routers kept transferring at 9Mb/sec. At close range, the Belkin hit almost 17Mb/sec, so even a 100MB file transferred in less than a minute. We've included the full group test on the cover disc this month (click on the Editorial tab).

Streaming DVDs

Media streaming is one of the big selling points of home wireless networking; devices such as the Sonos Digital Music System spread audio around the house. The bandwidth demands of streaming MP3 audio are pretty modest; the standard data rate is just 128Kb/sec (or, to put it another way, less than 0.2Mb/sec). But video is a different matter, and high-quality DVD- Video in MPEG2 format is different again.

There are various systems and proprietary setups on the market that claim to transmit video over a standard 802.11g connection, and this they certainly do. What they can't do, however, is transmit DVD- Video in its original form without reducing its quality or its resolution. There are no magic solutions to the problem of bandwidth - a system either has enough for a given application or it must strip out some information in order to transmit a given data stream. The minimum bit rate for DVD-Video is 4Mb/sec and can extend up to almost 10Mb/sec for short, high-quality movies. This is only the bitrate required for the raw data - transmitting it over the network adds the significant data overhead of network communication protocols and error correction.

Despite the claims of many 802.11g products of 'turbo' modes giving more than 100Mb/sec, we've yet to encounter an 11g product fast enough to stream raw DVDs simply by sharing the DVD-ROM drive in Windows over the network. With MIMO, though, it's a different story. We've had a lot of success using Belkin's Pre-N router and accompanying network card to stream DVDs flawlessly from one PC to another - simply by sharing the DVD drive using standard Windows file sharing - at a separation of about 10m, with a partition wall in line of sight. The trouble is, there still isn't enough spare bandwidth available to be able to guarantee this will work for you, so buying a Pre-N setup purely to stream DVDs might result in disappointment.

SECURITY

As we've already pointed out, you must secure your wireless network as soon as possible after getting it up and running. There are three aspects to wireless security. In order of importance, these are encryption, stealth and access restriction.

Encryption

Encryption is the most important simply because if you use encryption properly the other two are unlikely to matter - your network should be safe from abuse.

There are two standards for encryption over Wi-Fi: WEP (wired equivalent protocol) and WPA (Wi-Fi protected access). WEP is the older of the two, and WPA has come about because WEP simply isn't secure enough. A fundamental flaw in its implementation - to do with the way it appends an extra section on the end of your chosen encryption key - means that over a moderately busy network a snooper can break WEP in a matter of hours.

Until recently, using WPA instead of WEP wasn't easy, since many devices didn't support it, plus comprehensive built-in Windows XP support only came with Service Pack 2. But that's changed now, and we'd advise anyone using WEP to change to WPA immediately. It's easier to set up too; whereas WEP needs a specific-length, impossible-to-remember hexadecimal key, WPA generates its keys from a password that can be anything from eight to 64 characters in length, using any normal characters including spaces. You can generate a long but easy-to-remember passphrase, simplifying things if you're setting up several PCs with wireless connections.

Remember that any encryption system is only as good as its passwords, and that applies equally to WPA. Short or easy-to-guess passphrases are a gift to hackers so, unlike a PIN, a four-digit number is basically useless. A hacker has no limit to the number of passphrases he can try, so yours has to be long and obscure enough that an automated passphrase generator won't guess it.

As well as short numbers, certain things you might think are clever should also be avoided. So, for instance, you might think 'darthvader' is a good one, but in fact every hacker has a dictionary list containing millions of well-known passwords like that. So, 'wallaceandgromit' is out, as is 'frodobaggins'.

Instead, you want a couple of random words, some numbers and some odd characters. For instance, 'cheese672 badger123?' is strong and highly unlikely to be broken by a dictionary attack. A unique sentence - not a well-known quote like 'Ross has a boiler in the living room' - is good too.

Stealth

By default, all access points come pre-configured with a standard name known as an SSID (service set identifier), which the access point merrily broadcasts to all and sundry, allowing clients to see that there's an access point to connect to. This is very useful in Starbucks, but the last thing you want in your home setup. So you should do two things: first, change the default SSID; and second, hide it by instructing the router not to broadcast its presence.

This makes it much more difficult for anyone to find and start attacking your setup. It's as easy as pie and simply requires you to think of a name and check the 'hide SSID' option, which your router will invariably have in its web-based configuration.

Access restriction

This is the most tedious aspect of wireless security to set up, but if you're paranoid MAC-address-based access control is one more obstacle in the path of a determined hacker. As we mentioned earlier, every Ethernet device has a unique MAC address which is unique for that device. By setting up a table of the MAC addresses of your wireless devices in the router, you can restrict access to only those devices - any device with an unknown MAC address will be refused a connection. The drawback is that you have to manually enter the MAC address of every device you want to connect, but that's only a problem if you frequently have new hardware or you want guest devices to connect to your network with the minimum of fuss. Some routers also allow you to flip this idea on its head and specifically deny access to MAC addresses you specify and allow all others. This can be useful if you suspect a particular PC on your network has been infected by a virus - by specifically denying it access to the wireless network until you're sure the infection has been cleaned, you reduce the risk of the virus spreading without having to physically remove the wireless adaptor.

Detecting unauthorised access

If you suspect someone's stealing your bandwidth by connecting without your consent, it can be difficult to verify. The best thing to do is go into your router's web-based configuration system and check the client DHCP list. This is the list of network adaptors currently assigned an address on the router. If you're using only one computer (or, more specifically, one network adaptor), there should be only one IP address listed, and it should correspond to the host name and MAC address of your PC. If there's more than one and you haven't forgotten about any other wireless devices you have, such as printers or media-streaming audio gadgets, someone else is probably connected.

Looking at the DHCP list isn't foolproof, though: if the person stealing your bandwidth has had the presence of mind to manually configure an IP address it won't show up in the DHCP list. But many routers also have a log-file feature, some of which show all clients making a connection - this should be foolproof if you can be bothered to wade through it. If it does seem that someone's piggybacking, note the MAC address and block it, then change your SSID and encryption keys, and also change to WPA if you're using only WEP.

Don't get too paranoid, though: if you've followed these instructions and WPA is properly set up, there's little chance of anyone breaking into your system. Enjoy your wireless freedom.

1.15.2010

Ubuntu Security

The Windows Mindset

If you are coming from a Windows background you are used to terms like antivirus, spyware, and firewalls. Linux is different and these are not as important.

Viruses

The fact of the matter is: viruses/worms take advantage of flaws or holes in the code. There are no significant Linux viruses "in the wild". Linux boxes are no less targets than any other OS.

Do not believe the suggestion that the Linux community is complacent or "behind the times" in terms of viruses, or any other security issue. Linux developers have not "ignored" viruses, rather the OS is built to be highly resistant to them and since the code is "Open" there are literally thousands of eyes watching .

For the most part, Linux anti-virus programs scan for Windows viruses which do not run on Linux.


Reasons AGAINST antivirus on Ubuntu:
  1. They scan primarily for Windows viruses.
  2. There is a high rate of false positives.
  3. Isolation/inoculation is poor.
  4. And currently there are no known active Linux viruses (so there is essentially nothing to detect).

Reasons FOR antivirus on Ubuntu:
  • You are running a file or mail server with Windows clients.
  • You wish to scan files before transferring them, by email, flash drive, etc., to a Windows machine.

Running antivirus can make some sense if you are intending to "protect" Windows users, however, for a variety of reasons, it is best if Windows users learn to protect themselves.

Note: There have been many documented cases in Windows and Linux that a buffer overflow in an antivirus product has been an attack vector!

If you would like to run an antivirus program on Ubuntu you have several choices :

Comments on wine

Discussions about running Windows viruses on wine crop up from time to time and it is possible to run some Windows viruses on wine.

See these links :

Take the same precautions with wine as you would with Windows. Do not install untrusted applications from untrusted sources.

Windows viruses will be confined to ~/.wine and they do not have permission to change system files. This means to remove them you simply:

Code:
rm -rf ~/.wine
Please take care, this command deletes everything in your wine directory including all data and all applications.

You then need to restore your wine directory from a known good backup (you do keep backups ?).


Firewall

GUFW (gui)

UFW - Desktops

UFW - Servers

Ubuntu includes a firewall, iptables, but by default nothing is engaged. This is reasonable as a default Ubuntu install opens zero ports to the outside world, so a firewall is redundant. However, installing "server software" will cause ports to open, so some people like to use a firewall as a catch-all layer to find mistakes in their configuration.

Another use for firewalls is for the administrator to forcibly impose network policies on the user.Also, a periodic audit of the system for open ports is a good practice. Running the "nmap" command from another machine, or using one of many online port scanners:

http://nmap-online.com/
https://www.grc.com/x/ne.dll?bh0bkyd2

Remember, what you care about are open ports. Closed ports and stealth ports are equally secure, in that they are inaccessible to the public.

Iptables references :

The "problem" with iptables is that it is not particularly friendly to new users. Fortunately, there are several more user friendly interfaces available to allow you to manipulate your firewall (UFW, Firestarter, and Guarddog) :


A source of confusion sometimes occurs when users feel the need to be running firestarter/Guarddog for their firewall to be active. This is untrue ! Keep in mind that these applications are not firewalls, but rather configuration tools for ip tables. These applications should be run only to configure your firewall. Once configured, IP tables (the actual firewall) is active (at boot) without having to run firestarter/guarddog. firestarter will monitor traffic, but it runs as root and there are better monitoring programs, so configure you firewall, shut down firestarter/grauddog, and let IP tables do the rest


Browser / Spyware : Java/Flash/Ad-ware/Trackers/Cookies

This is where most users will have the most risk.
We all want Java/Flash, but our Internet browser opens us to attacks.

  1. Deny all cookies and add trusted sites, allowing only for session.
  2. Install NoScript. Again block all and add trusted sites to a white list.
  3. Install Safe History
  4. Adblocking : I block with a hosts file rather then Adblock Plus or Adblock Filterset.G because a hosts file protects more then just firefox.



See this link for additional information : How to Secure Firefox


The Ubuntu Mindset


Permissions and Encryption

The first layer of defense is file permissions. Permissions are used to set access and thus protect both system and user files.

Basic permissions
FilePermissions

See also umask at the bottom of that link. The umask value can be set in ~/.bashrc.

To set a "private home", as a user,
Code:
chmod 700 $HOME

How to's:

Running Server(s)

Common servers include NFS, Samba, FTP, SSH, VNC, RDP, and HTTP. Desktops become Servers if server software is installed.

Questions to ask yourself include:
  1. What port(s) or services does this software provide?
  2. Who will be able to connect to this? (i.e. is it restricted to a range of IP addresses Password protected?)
  3. What level of access will the visitor have to the system? (i.e. does the server run under a restricted user, or the root account? What can this restricted user do in a worst case scenario?)
  4. Does this service expose any additional information that's useful to a hacker? (i.e. does it allow users to transmit their passwords in cleartext? Does it have a 'statistics' view that reveals logged-in users, ip addresses, network configuration, or other potentially helpful information?)
  5. What is the security history of this software? Does it have a history of vulnerability and patch after patch? Or has it had a relatively unmarred history?

Examples :

SSH
VNC
Apache


Forensics


What to do when you think you have been cracked :
  1. Power off.
  2. Disconnect/disable your Internet connectivity.
  3. Now take a deep breath, re-boot, and read the logs. Ask for help if needed, but you really need to confirm that your system has been compromised.
  4. If you have been compromised, and have the time and interest, boot a live CD and image your hard drive. This image can then be used for forensic analysis.
  5. Re-install. Unfortunately, there is no way to trust a compromised system.
  6. When you install, be sure to install off line, use a stronger password, and research intrusion detection.

Intrusion References
CERT® Coordination Center (CERT/CC)
CERT® Coordination Center ~ Intruder Detection Checklist


My goodness ...


Further Reading:

Ubuntu wiki ~ Security page

Ubuntu wiki ~ Installing Security Tools

UDSF Security Analysis Tools

The Big Ol' Ubuntu Security Resource

Locking Down Ubuntu

Ubuntu geek ~ Security category

Security references Topics include Basics, firewall, Intrusion detection, Chroot, Forensics/Recovery, and Securing networked services.


Changing poison into medicine,
Nam-myoho-renge-kyo
 Technicowl
A person with ubuntu is open and available to others, affirming of others, does not feel threatened that others are able and good, for he or she has a proper self-assurance that comes from knowing that he or she belongs in a greater whole and is diminished when others are humiliated or diminished, when others are tortured or oppressed. ~ Archbishop Desmond Tutu, 1999

1.13.2010

Haiti's Other Earthquake

Restavek and Child Slavery: Haiti's Other Earthquake

Haiti holds a romantic and tragic place in the historical imagination -- a nation birthed by a successful slave rebellion, it was the first to abolish slavery in the Western hemisphere and briefly served as a beacon of hope for American abolitionists. However, it never realized its promise, for reasons that scholars and analysts can debate ad infinitum.

Perhaps most egregiously, its grinding poverty is so pervasive that an estimated 300,000 children have been given up by their parents to become restavèks -- a creole term for children sent to become house servants to wealthier Haitians. According to human rights workers and survivors of the child-slavery system, these children are forced to work long hours, are often kept out of school, are barely fed and clothed, and are routinely abused physically, emotionally and sexually.


Now, professional recruiters have made the situation even worse by making a business out of the longstanding informal practice. Last June, a United Nations expert on contemporary forms of slavery, Gulnara Shahinian, visited Haiti at the invitation of the government and issued a report that included the recommendations summarized below:

Since it is still struggling to recover from devastating storms in 2008 and will now be focusing effort on earthquake rescue, relief and repair, it's not likely that Haiti will have the resources to enact the reforms advocated by the UN, so private efforts such as Cadet's take on greater significance. Other high-profile philanthropic efforts include Haitian American musician Wyclef Jean's Yele Foundation. In 2008, Jean spoke to Al Jazeerah about his efforts to combat Haiti's food crisis:
Jean also sprang into action about the earthquake via Twitter,tweeting a way to contribute to the relief effort via text message.

Jean's efforts to combat poverty in Haiti are complemented by the work of other philanthropists, including former Pres. Bill Clinton, who serves as the UN special envoy to Haiti. He toured the island in March, 2009 with UN Secretary Ban Ki-Moon to survey efforts by his foundation and other organizations to expand education and nutrition programs. Clinton has been upbeat about Haiti's future, saying it...
"...offers unique opportunities for public and private investment to improve health and education in ways that will be good for Haitians and all their partners in our interdependent world."

Now that the earthquake has delivered to the country what Mr. Ban has called "catastrophic" and Haitian President Rene Preval has called "unimaginable," considerably more effort will be required to ensure that those investments are made and the benefits trickle down to the poorest Haitians so that they will be able to feed and care for their own children. Ultimately, only economic development and sustained human rights activism will finally allow the island to realize the dream that its founders fought so desperately to achieve more than 200 years ago.

How to help - Haiti- Charitable Organizations

A list of charitable organizations active in the nation


msnbc.com
updated 11:11 p.m. CT, Tues., Jan. 12, 2010

The U.S. State Department Operations Center said Americans seeking information about family members in Haiti should call 1-888-407-4747. Due to heavy volume, some callers may receive a recording. "Our embassy is still in the early stages of contacting American citizens through our Warden Network," the U.S. State Department said in a statement. "Communications are very difficult within Haiti at this time."

For those interesting in helping immediately, simply text "HAITI" to "90999" and a donation of $10 will be given automatically to the Red Cross to help with relief efforts, charged to your cell phone bill

1.12.2010

Toshiba Satellite E205 with Intel 802.11n Wireless Display Technology



The E205 will be available for $999 on Best Buy’s site on January 12, (TODAY) and will appear in retail stores several days later.



The coolest feature of the E205? With the push of a button you can beem wirelessly whatever you're watching then stream 720p video from the notebook to (like Hulu) to your big-screen TV, courtesy of Intel’s new Wireless Display technology. The video is carried over 802.11n to the Netgear box, and is then converted to a wired HDMI signal. Best Buy bundles a special box from Netgear that acts as a wireless receiver and plugs into your HDTV via HDMI.

 

1.11.2010

Wi-Fi Alliance

 The Wi-Fi Alliance is a global, non-profit industry trade association formed in 1999 to certify interoperability of Wireless Local Area Network products based on the IEEE 802.11 standard and amendments with more than 200 member companies devoted to promoting the growth of WLANs. Certification programs ensure the interoperability WLAN products from different manufacturers, with the objective of enhancing the wireless user experience.


Wi-Fi Alliance Certification Programs address: Wi-Fi products based on IEEE radio standards 802.11a/b/g/n Wi-Fi Protected Access certification , wireless network security(WPA, WPA2 and WPS for personal and enterprise deployments), authentication mechanisms used to validate the identity of network devices (EAP), and support for multimedia content over Wi-Fi networks (WMM and WMM Power Save. (WPS) Wi-Fi Protected Setup certification.

1.10.2010

802.11n is Ratified - Cisco Celebrates with New Lower Prices


The Industry's Favorite 802.11n AP Now at a Fraction of the Cost
Your users want a wireless network that can provide 7x more video and 9x the speed. Your business needs the investment protection that comes with the fastest-growing and most widely deployed 802.11n technology. You want the confidence that comes from deploying a ratified standard, but for a low price.

Cisco is leading the market transition toward 802.11n and for a limited time only, we're offering an exclusive deal that removes the barriers to adoption of the industry's most powerful wireless technology.
Take advantage of the 11n Acceleration Kit, which includes:
» Learn more about Cisco 802.11n
» Learn more about Scalable Wireless Performance
Accelerate your adoption of 802.11n technology by taking advantage of this exclusive deal.
1-877-330-3409
When calling, use code:
"Celebrate"
Register for the
11n Acceleration Kit promotion.
Register Now https://apps.cisco.com/gdrp/coiga/showsurvey.do?surveyCode=5016&keyCode=184584_5

1.09.2010

Wireless Networking

Wireless Networking Is the New Cellular.


Remember back in the day when we had a brick Motorola cellular phone. My mom had one in the car so she could call me to come pick her up from the post office. Anyone over 29 will remember.




I remember the time because at the time I was a telecommunications specialist in the
 army with a green brick phone at my disposal during field exercises.

 I also remember thinking this cell phone is eventually going to replace my home phone. In 2001 I reduced my home plan down to (no kidding) $23.00 dollars a month basic service and used my cell phone as my house phone. I should have invested in stocks. Motorola stock went up and like most people I never saw that coming.

Like cell phones just about everything connected to a network will eventually be wireless. It won't be long before network servers and high throughput devices go wireless.

We are seeing devices that transmit Hi-Def TV and DVD signal from AV receiver to a monitor. Wireless networking technology has changed the face of enterprise, small-to-medium, and SOHO Biz and personal networking.

CWNA Certified Wireless Network Administrator Official Study Guide: Exam PW0-104 (CWNP Official Study Guides)Now is the time to capitalize on the opportunities that wireless networking
 brings to Information Technology careers. The Certified Wireless Network
 Administrator-CWNA certification is the first step in the Certified Wireless
 Network Professional-CWNP line of certifications and is focused on
 administering an enterprise 802.11 WLAN. CWNA includes topics such as
 802.11 standards, security, management, protocol analysis, QoS, site
 surveying,  and radio frequency.




Instek GSP-827 Spectrum AnalyzerAdditional certifications focus more intensely on security, protocol analysis, Instek GSP-827 Spectrum Analyzer $4, 2300.00
  • Frequency Range: 9kHz~2.7GHz
  • Input Range: -100dBm~+20dBm
  • Average Noise Floor: -130dBm/Hz
  • Power Measurements: ACPR/OCBW/CH Power
  • Split Window: Simultaneous Measurements in Two Separate Frequency Spans
QoS, design, advanced surveying, VoWiFi, location tracking, and RF spectrum management.

1.03.2010

Dell XPS 8000 Discontinued? What The Hell Dell?

Nook e-reader gains new appeal as 'rooted' wireless tablet

Appeal as unhacked e-book reader also strong judging by faithful user raves. http://bit.ly/63qGBa



Barnes and Noble NOOK ebook readerNook devotees, including wants the Nook despite negative reviews, mainly because it has many features not always available on competing devices including Wi-Fi, a replaceable battery, the open Android OS, and one that reads the ePub format.

1.02.2010

Information Technology Jobs In America: Corporate and Government




http://www.computerworld.com/s/article/9139190/Salary_Survey_2009
Information Technology Jobs in America: Corporate & Government Career Guide (Information Technology Jobs in America: Corporate & Government)
The information technology industry continues to grow in the U.S. and globally. Information Technology Jobs in America: Corporate & Government Career Guide shows where the jobs are, in the U.S. IT Services Sector and in U.S. Federal and State and Municipal government agencies and departments. The book covers new territory – not a technical guide – this career guide goes beyond, to show Americans the largest source of jobs in the U.S. in this growing industry. Section I Good News – Companies Keep Hiring as Demand Grows. Why ‘Outsourcing’ May Lose Its Power as a Scare Word. Shifting Occupations in the Industry. More Managing - Less Programming. Tech Jobs with Government Are Lively Stable, Secure, and Well-Paid. Salaries show a Higher Paid Class of Employees. Experience Is an Acceptable Substitute for Education. Core Skills Include Business-Process Understanding.
Section II Explains how to make contact with this special sector for IT jobs, IT service providers, and how to build a career in the IT services sector.
Section III Explains Technology in Government, public unionism for emerging technology jobs and the desirable salaries of these emerging technology titles. The authors describe the technological developments that make technology in government possible. They define the modified processes that now call for staff in Relational Databases, Web Portal Development, Infrastructure Development and Maintenance, Network Computing, Data Security, e-Government, and e-Commerce.

Section IV "What Jobs Are Available in Federal, State and City Government," brings to the forefront the thousands of information technology jobs that exist in all 101 Federal agencies, and in U.S. State and Municipal government agencies and departments. Detailed Tables show current Information Technology Job Titles for Federal and State and City information technology jobs, Salaries, 5-year Salary Projections, and Estimated Pensions. Financial facts explain why, in today’s global economy, an IT career in government is a desirable choice.

Section V Provides a Step-by-Step guide to "Completing the Application & Hiring Process" for an information technology job in both the Federal and State and City government personnel hiring systems. It explains why a Civil Service Exam is not required in most cases; why experience is an acceptable substitute for education in most government jobs, how to fill out an Experience and Education paper or Knowledge-Skills and Abilities Statement, and Factors for Job Class Salary Ranking and Candidate Ranking. Appendices include Sample Federal IT Job Announcements, and Sample State & City IT Job Descriptions with Qualifications Required, and Required Application Forms.

Section VI Provides Analytical Articles on Today’s Tech Jobs: C++ Computer . Java and JavaScript . Visual Basic . Sun Solaris, Unix, Linux, Network Tech Jobs . Oracle, SQL, FoxPro, Sybase, Database Management . Software Programmer; Software Engineer . Network Programmer, Network Systems . Telecommunications . Web Developer . IT Procurement, IT Training, Project Management and more.


1.01.2010

2010 Predictions: What's on Deck for Cameras?




Flip Video camcorders  From Cisco. Simple, pocketable, and sharing-friendly video cameras.. Here's how 2009's major camera trends will continue in 2010's Consumer Electronics Show announcements...or so we think.
Fujifilm FinePix F70 EXR 10X-optical-zoom lens adaptable EXR sensor in a 0.9-inch-thick frame, making it one of the most versatile pocket cameras currently available
camcorder, the excellent Kodak Zi8.



12.23.2009

Day of reckoning for startups, consolidation of network security appliances

VCs get out of the security game? "We're going to see some shakeups. It might very well be the year that a lot of venture capital firms try to recoup some of their investments," Kindervag said. "So you'll see a lot of VC-backed companies merging together or being bought by larger companies. I think a lot of [them] have run out of cash, and there's not much of an appetite to pour more money into some of these things."


Super network security devices: Kindervag said 2010 could bring a new generation of network security appliances that do -- well -- just about everything. "If there is any hot technology for next year, it will probably be security devices that are uber-intelligent and extremely fast – a cross between unified threat management and what some people are calling next-generation firewall architectures. These will be devices where a tremendous amount of intelligence is applied to the packet, all the way up to Layer 7, in near real time at any speed, whether it is a 10 Gb core or better. That's where everything is moving to – this consolidation of multiple technologies which will just be features on more robust security gateways. So you can turn on the firewall feature, you can turn on the IPS feature. They will all be embedded into this codebase and they will all be able to function within a single clock cycle.

VoIP and unified communications security awareness: Enterprises will play catch up with securing newly installed IP telephony and collaboration technologies that were deployed without a proper network security vetting, Kindervag said. "There's all this new stuff and we haven't implemented it securely. We've implemented it in an ad hoc way, and we need to secure it. This is something that hasn't happened before," he said. "It used to be you had to go through a long process to determine whether something is secure and then implement it. Now we're looking at whether it's secure long after it's been in general usage. Everything changed so quickly, with the rise of social networking and Web 2.0 that the demand from the user side was so great and it couldn't be controlled by a small group of 'paranoid' security types."

Cisco-EMC-VMware, oh my! And more options for virtualization, automation, mobility, and video management

Cisco-EMC-VMware: Cisco's alliance with EMC and VMware to form the Virtual Computing Coalition, announced in November, signified "the next step of how Cisco is going to try to move into the computing marketplace more aggressively," Frey said. The coalition's products marked "the first time a complete turnkey modular solution has come from someone other than the major systems vendors," said Frey, who predicted that it would propel a simpler network management environment.

Virtualization management gets easier: Application-based vendors will continue to add support for and recognize more virtualized infrastructure, Frey said, lowering capital expenses and deployment times for enterprises. "Everything's going virtual," he said. "I know this is not new, but especially in the second half of next year … all the management tool [vendors will be] either adding support for virtual components … or recognizing virtual components."

Mobility: Wireless LAN is here to stay, and not all enterprises are prepared. "There's no slowing the pace of growth in the use of mobile endpoints, and a number of times they're showing up as the preferred end client." "The challenge around this is the more and more people want to use those as their primary computing device, you've got a whole new set of challenges for measuring and [securing] the user experience."

Video on the network: Cisco's acquisition of Tandberg will translate into "a lot more aggressive deployment of video conferencing," Frey said. "Cisco does this for a reason -- it requires a lot bigger network. You need more bandwidth." Many enterprises have yet to embrace video conferencing and won't have their networks prepared for the rush, he added. "It will be sort of like voice over IP in its first years of existence." . "Once they started to roll [VoIP] out over their entire organizations, they realized how many skeletons they had in the proverbial wiring closet." If enterprises aren't prepared, he said, they can expect 10 times the wiring challenges they faced with VoIP.

HP-3Com affects prices, rise of the two-tiered data center network

HP-3Com shakeup will drive down prices: The merger between HP and 3Com will push up HP ProCurve far enough to be nipping at Cisco's heels, with Juniper Networks picking up the rear. "We'll now have a market where there are a number of large viable competitors."  "We're going to see a lot more competition, and for folks who do a good job doing competitive sourcing with pricing, they will save a lot of money."

From three to two: "We will see networks evolve," Skorupa said. "Today, typically they're built in three tiers -- core, aggregate and edge -- and the new networks being built will collapse." In an effort to simplify network management, ease troubleshooting and lower costs, networks will fall back to two tiers.

Wireless LAN predictions: Cheaper access points, more robust and reliable networks

802.11n prices will drop: "We saw a beginning to that in 2009 with Aruba, Aerohive and Meraki all having a little more pricing competition," DeBeasi said. "We're going to continue to see that. And the silicon vendors, their next-generation silicon will be lower power, lower cost."

WLAN vendors strive to make wireless more robust, reliable: Every vendor will continue to introduce techniques aimed at making wireless networks more reliable and robust, DeBeasi said. "The throughput [of 802.11n] is better, but can [enterprises] depend on it? There are lots of techniques that vendors are adding." Current techniques from vendors include beamforming, airtime fairness and bandwidth steering. "We're going to see improvements in beamforming [and other techniques] in 2010," he said.
Expect 1x1 MIMO, 4x4 MIMO and everything between: DeBeasi said most of the 802.11n products on the market so far have utilized 3x3 or 2x3 MIMO (multiple input, multiple output). He expects vendors to offer a full range of receiver and transmitter arrays in 2010. "I think we'll see some 1x1 products, lower-power and lower-cost products. The throughput will be lower, too, of course. I think the iPhone might come out with a 1x1 802.11n capability this year. And at the high end, we'll probably begin to see, near the end of the year, 4x4 MIMO in enterprise access points to offer better throughput."

OSI Reference Model


OSI divides telecommunication into seven layers. The layers are in two groups. The upper four layers are used whenever a message passes from or to a user. The lower three layers are used when any message passes through the host computer. Messages intended for this computer pass to the upper layers. Messages destined for some other host are not passed up to the upper layers but are forwarded to another host. The seven layers are:

Layer 7: The application layer ...This is the layer at which communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. (This layer is not the application itself, although some applications may perform application layer functions.)

Layer 6: The presentation layer ...This is a layer, usually part of an operating system, that converts incoming and outgoing data from one presentation format to another (for example, from a text stream into a popup window with the newly arrived text). Sometimes called the syntax layer.

Layer 5: The session layer ...This layer sets up, coordinates, and terminates conversations, exchanges, and dialogs between the applications at each end. It deals with session and connection coordination.

Layer 4: The transport layer ...This layer manages the end-to-end control (for example, determining whether all packets have arrived) and error-checking. It ensures complete data transfer.

Layer 3: The network layer ...This layer handles the routing of the data (sending it in the right direction to the right destination on outgoing transmissions and receiving incoming transmissions at the packet level). The network layer does routing and forwarding.

Layer 2: The data-link layer ...This layer provides synchronization for the physical level and does bit-stuffing for strings of 1's in excess of 5. It furnishes transmission protocol knowledge and management.

Layer 1: The physical layer ...This layer conveys the bit stream through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier.

Open Systems Interconnection ( OSI ) is a standard reference model for communication between two end users in a network. The model is used in developing products and understanding networks.

The Data-Link Layer | OSI

Layer 2 refers to the Data Link layer of the commonly-referenced multilayered communication model, Open Systems Interconnection (OSI). The Data Link layer is concerned with moving data across the physical links in the network. In a network, the switch is a device that redirects data messages at the layer 2 level, using the destination Media Access Control (MAC) address to determine where to direct the message.

The Data-Link layer contains two sublayers that are described in the IEEE-802 LAN standards:

* Media Access Control (MAC) sublayer
* Logical Link Control (LLC) sublayer

The Data Link layer ensures that an initial connection has been set up, divides output data into data frames, and handles the acknowledgements from a receiver that the data arrived successfully. It also ensures that incoming data has been received successfully by analyzing bit patterns at special places in the frames.The OSI seven-layer model – What is a layer?

* The Application Layer (Layer 7)
* The Presentation Layer (Layer 6)
* The Session Layer (Layer 5)
* The Transport Layer (Layer 4)
* The Network Layer (Layer 3)
* The Data Link Layer (Layer 2)
* The Physical Layer (Layer 1)
* Putting all the layers together

40 Gigabit Ethernet data center switches, a Layer 2 comeback

40 Gigabit Ethernet in the data center: Virtualization will drive innovation in the data center, and vendors will offer enterprise customers 40 Gigabit Ethernet. "[Virtualization] really hasn't impacted the network yet, but it's starting to," Kerravala said. "It'll push along 10 [Gigabit Ethernet adoption] and I think we'll see 40 [Gigabit Ethernet] products next year."

Diving back into Layer 2: Most enterprises are using native Ethernet, but Kerravala said virtualization will spur a return to TCP/IP. "From a virtualization standpoint, it's faster to do things at Layer 2," he said. "I think you'll see vendors spend a lot of time marketing TCP/IP as the primary protocol…. In some ways, it's 'Back to the Future.'"

WAN optimization: Layers 4 through 7 will also gain continued attention for wide-area network optimization products, Kerravala said, with F5 Networks and Riverbed as the market leaders. "The more reliant companies become on their network," he said, "the more important it is the networks be able to handle the different types of applications."

12.22.2009

Certified Wireless Network Administrator: Demo

watch demo

Channel Planning with 802.11n and DFS

This video covers the challenges of channel bonding and whether DFS (Dynamic Frequency Selection) channels should be used.

Kubuntu



What is Kubuntu?
Kubuntu is a free, user-friendly operating system based on the KDE Software Compilation and on the award winning Ubuntu operating system. With a biannual release cycle and at least 18 months of free security updates for each release, it is the secure, stable computing environment you've been waiting for. Ubuntu 9.10 and Kubuntu 9.10, 4-disks DVD Set Includes "Introduction to Linux" video-DVD, Linux Training Library and printed Quick Reference Card of Linux commands, 64-bit SetTake the tour or hear what our users have to say.

There are now three ways for you to get Ubuntu. Just choose the delivery option that works best for you:
Download now - Download the Ubuntu, Edubuntu or Kubuntu CD installer to your computer now.
Please note: the CD Installer is nearly 700M. If you don't have a fast internet connection you may want to consider requesting a CD.
Buy on CD or DVD - Buy a CD or DVD with Ubuntu, Edubuntu or Kubuntu, or a large number of CDs from a distributor near you. If you are in North America you can get Ubuntu and Kubuntu on DVD from Amazon.com.
Request a free CD- Request a free Ubuntu, Edubuntu or Kubuntu CD from Canonical.
  • Delivery typically takes 6-10 weeks
  • Use each CD as many times as you like - you are free to use it on as many computers as you wish and to pass on to others
  • Learn more by visiting the Shipit Questions page.

Sony Blu-ray Disc Wi-Fi enabled model

The Sony BDP-S560 not only delivers terrific high-definition images, but also excels at upconverting DVDs, too. And it does so in a Wi-Fi enabled model. But this model ($300, as of December 14, 2009) lacks the streaming media extras that competing Blu-ray Disc players offer.

The BDP-S560 was most impressive in our black-and-white Good Night and Good Luck test. Even water glasses sitting on a banquet table popped with clarity and brilliance. It did almost as well in color movies, with a nice feel of dimensionality in the Mission: Impossible III test. Only in the animated Cars did it disappoint, where a sense of flatness earned it a rating of only Good.

The player earned ratings of Very Goods down the line in our two DVD tests. In the Return of the King test, the colors looked less saturated than those from the reference Sony PlayStation 3 player, but more pleasing and realistic.

802.11n Technology

Driven by 802.11n Technology, Worldwide Wireless LAN Semiconductor Market Will Experience Double-Digit Growth Through 2012, IDC Predicts

The worldwide wireless LAN (WLAN) semiconductor market is expected to pass the $4 billion mark by 2012 with a compound annual growth rate (CAGR) of 22.8%. While PCs will remain the largest application segment for WLAN semiconductors, mobile phone applications will grow at a CAGR of 49.3% and become the second-largest category for WLAN semiconductor revenue by 2012. IDC expects the MIMO-enhanced 802.11n technology to be the next growth driver for this market as the higher throughput and range provide a great opportunity for new applications and usage models.

"The need for connectivity and connected mobile clients continues to fuel the WLAN semiconductor market," said Ajit Deosthali, research manager for Short Range Wireless Semiconductors at IDC. "WLAN adoption is set to grow beyond notebook PC and into the mobile phone and consumer electronics devices."

Among other key findings are the following:

* WiFi is set to take off in mobile handsets with dual-mode phones that provide both conventional cellular and WLAN connectivity

* Connectivity is the fastest-growing segment for semiconductor companies, with WLAN leading the way. Mobile handsets and mobile internet devices will lead integration of WiFi radio with other radio technologies such as Bluetooth, FM, and GPS for personal area networks.AIRLINK MIMO RX 802.11G ROUTER UP TO 2500 FEET




12.20.2009

The Fine Points of Optional Wi-Fi 802.11n Certification

The Wi-Fi Alliance explains four optional 802.11n elements for future certification: The Wi-Fi trade group has over the last 10 years kept together the notion that every device with Wi-Fi on the label should work at the greatest point of agreement with one another. This has continued in spite of new elements and enhancements to the 802.11 family of standards, including 802.11n.

The recent news that the IEEE had approved 802.11n within the 802.11 Working Group, and ratification was likely a few months away, led the Wi-Fi Alliance to explain its roadmap for adding more steps to the certification process. When the Wi-Fi group certifies a device, it runs it through tests that are supposed to ensure that the equipment responds in a standard manner. (The group also does plugfests in which equipment makers bring lots of gear together outside of lab conditions.)

When the word hit, the alliance identified four optional areas of certification that it would add. I knew about some of these areas, but I spoke with the group today to clarify what this meant for both equipment makers and end users. The Wi-Fi Alliance said it would offer tests for coexistence in 2.4 GHz, space-time block coding, transmit MPDU, and three spatial streams. Scratching your head? After 8 years of covering Wi-Fi, I admit I was in that position over a couple of those.

Coexistence has to do with the use of double-wide channels--40 MHz instead of the roughly 20 MHz regular channels--in both 2.4 and 5 GHz bands. 500mw "N" Waterproof Marine high power Long Range 802.11a,b,g,N USB CPE Alfa Wireless network Wifi Adaptor Access Point with 2.4 foot N Female 5.4GHz 15dBi Omni AntennaThe 5 GHz band isn't a problem, because 20 MHz channels don't overlap; Wi-Fi selectable channels in 5 GHz are staggered by intervals of 4 band channels (5 MHz each), such as 36, 40, 44, and 48. In 2.4 GHz, channels are staggered only by a single 5 MHz band channel, meaning that the use of 40 MHz will nearly always conflict with other existing networks.

Ennis said that 2.4 GHz coexistence terms weren't fully settled until recently, even though manufacturers have built in some methods of using 40 MHz in 2.4 GHz. The Wi-Fi Alliance discouarged the use; Apple, for one, doesn't allow its gear to use wide channels in 2.4 GHz.

In the new testing regime, "not everybody is required to support 40 MHz operation--but if they do support 40 MHz operation, they must go through the testing that we've defined," Ennis said.

The mechanisms that require an access point backing off to 20 MHz channels are so broad and severe that it's unlikely you could use a wide channel in any environment in which other Wi-Fi networks operate. Still, Ennis says, it may be of use in enteprise situations, or with future gear that's all 802.11n with these modes enabled that can be more respectful of each other automatically.

Space-time block coding. This term makes my head hurt every time I read it. I go off to the Web and read up on the principle, and it's above my paygrade. All wireless communication has to allot slots in some fashion--through contention or scheduling--for bits to go through. That's the basis of all wireless standards.

What STBC does is extend that beyond time into the domain of space. An access point can, through some complicated encoding, send different information simultaneously using multiple spatial streams so that receivers (stations in Wi-Fi parlance) that have single-spatial stream receivers can separately but at the same time decode their unique package.

The utility of this complicated feature is that we're likely to start seeing lots of single-stream N devices.

Chipmakers are most likely now delivering quantities of these lower-powered, cheaper 802.11n chips that can't offer two streams--and thus double the bandwidth--as laptop and desktop 802.11n modules can. With STBC, an access point can utilize the full available 802.11n bandwidth by splitting it spatially between two devices instead of halving bandwidth by speaking to a single-stream device solely.

Ennis noted that STBC also improves the signal-to-noise ratio, which makes faster rates and farther distances possible. "I think this is going to be a popular optional feature," he said.

D-Link DIR-655 Extreme N Wireless RouterAggregation MPDUs (MAC Protocol Data Units). While sounding obscure, this is yet another way by which 802.11n can eke out improved speeds. For long sequences of data, aggregation MPDUs lets a Wi-Fi system create a long frame, reducing all the overhead required to send a packet. (Every packet has origin and destination information, a preamble, and other data that adds overhead.)

For video, for instance, Ennis says that this kind of aggregation can improve throughput, although probably not by double-digit percentages. "It's not as dramatic an improvement as say using more spatial streams, or using 40 MHz channels," he said.

Currently, the Wi-Fi Alliance tests aggregation only if a manufacturer's access point sends these aggregated frames; it checks that a station can properly receive such frames, which can be interpreted under earlier 802.11n drafts. The new optional certification tests for aggregated frames sent by both stations and access points. (If included, it must be tested.)

Three spatial streams. This last one is quite simple. The Wi-Fi Alliance can now test for devices that send three streams of data across space up from two streams of data. Ultimately, we should see devices that can handle four, with a maximum raw symbol rate of 600 Mbps with wide channels in 5 GHz.

Those are the technical bits. The a/b/g/draft n labeling can only go so far and there should be more news on that front soon.TP-Link TL-WR941ND - Wireless router + 4-port switch - Ethernet, Fast Ethernet, 802.11b, 802.11g, 802.11n (draft 2.0) external

IEEE Ratifies 802.11n

The IEEE Standards Board has formally ratified the 802.11n standard (802.11n-2009, to be extraordinarily specific). It took seven years and involved 400 members from 20 countries. Somebody deserves a vacation.

Successor standards committee's are already underway, of course, but it's likely years before we see products based on 802.11ac (6 GHz and below) and 802.11ad (60 GHz), both of which aim for speeds of 1 Gbps and faster.

Somebody go put masking tape over the word "draft" on all those Wi-Fi boxes.Linksys by Cisco WRT400N Dual-Band Wireless-N Router

As far as any firmware revisions based on tweaky late changes to the spec, it's unlikely. From what I can tell from colleagues and the Wi-Fi Alliance, it's much more likely that newer devices will add features than current devices will see (or require) firmware changes.

On 7-August-2009, I wrote up the four major additional features coming to the Wi-Fi certification process, some of which were dependent on the late-stage draft changes in 802.11n. See "The Fine Points of Optional Wi-Fi 802.11n Certification."

The four new certification elements mostly, but not entirely, related to improving raw speed or net throughput.

ARUBA NETWORKS WINS MOBILE STAR AWARDS FOR WIRELESS LAN MANAGEMENT

AirWave Wireless Management Suite and Virtual Branch Networking Solution Win Superstar Awards, While the RAP-2 Remote Access Point Grabs a Shining Star

Aruba, a global leader in 802.11n wireless LANs and secure mobility solutions, announced that it has been awarded three awards as part of the eighth annual Mobile Star Awards(TM) program. The program promotes the top mobile products and deployments across a broad range of categories including applications, enterprise software, and wireless network products. Superstar awards, the highest honor, were conferred upon Aruba's AirWave Wireless Management Suite (AWMS) and Virtual Branch Networking (VBN) solutions. Aruba's RAP-2 Remote Access Point received a Shining Star award.

AWMS is the only network management software to deliver full visibility and control over multi-vendor wireless networks. A single, easy-to-use console provides a window into all aspects of network operation, simplifying the work of network engineers, Help Desk staff, IT managers, and security analysts. The suite includes four primary components:

* AirWave Management Platform (AMP)
* VisualRF(TM) Location and Mapping Module
+9dB 15" 3x WiFi Booster Antenna for Aruba Networks AP 70
* RAPIDS(TM) Rogue Detection Module
* AirWave Master Console & Failover Servers

AirWave OnDemand, a cloud-based enterprise-class network management service, is the newest extension of the AWMS product line. Using sophisticated tools previously available only to large organizations with large budgets, AirWave OnDemand allows even the smallest organization to efficiently manage, monitor, and control its network.

The VBN solution dramatically simplifies the complexity and cost of deploying a remote solution at branches with one to many users. Complex configuration, management, software updates authentication, intrusion detection, and remote site connectivity tasks are handled by powerful data center-based Aruba controllers. Centralizing these services in the controllers enables the branch office equipment to be greatly simplified and cost reduced. The virtualized functions are transport-independent, so any wide-area network -- including inexpensive cable, DSL, and 3G cellular -- can be used to connect branches offices.

The RAP-2, a component of VBN, securely connects remote users with enterprise network services and applications. Featuring authenticated wired and Wi-Fi access, and with a list price of just $99, the RAP-2 is a very economical solution for branch offices and fixed teleworkers.

"'Go Mobile' readers are among the industry's most savvy mobile business users, so Mobile Star Awards winners can claim they are the users' choice," says Jon Covington, MobileVillage founder and president. "Winners are chosen by real users based on real results, not hype. New mobile services competed on an equal footing with well-established solutions, and both nominees and winners are the new leaders to watch."

Mobile Star winners are chosen by subscribers to Go Mobile(R), MobileVillage's free newsletter about mobile technology from news Web sites such as Cnet, Engadget, Gizmodo, PC Magazine, Computerworld, and AppScout.