5.06.2010

Apple iPad Wi-Fi + 3G





Size and weight1



Height:
9.56 inches (242.8 mm)
Width:
7.47 inches (189.7 mm)
Depth:
0.5 inch (13.4 mm)
Weight:
1.5 pounds (0.68 kg) Wi-Fi model;
1.6 pounds (0.73 kg) Wi-Fi + 3G model


Display

  • 9.7-inch (diagonal) LED-backlit glossy widescreen Multi-Touch display with IPS technology
  • 1024-by-768-pixel resolution at 132 pixels per inch (ppi)
  • Fingerprint-resistant oleophobic coating
  • Support for display of multiple languages and characters simultaneously

Wireless and cellular

Wi-Fi model
  • Wi-Fi (802.11a/b/g/n)
  • Bluetooth 2.1 + EDR technology
Wi-Fi + 3G model
  • UMTS/HSDPA (850, 1900, 2100 MHz)
  • GSM/EDGE (850, 900, 1800, 1900 MHz)
  • Data only2
  • Wi-Fi (802.11a/b/g/n)
  • Bluetooth 2.1 + EDR technology

Location

  • Wi-Fi
  • Digital compass
  • Assisted GPS (Wi-Fi + 3G model)
  • Cellular (Wi-Fi + 3G model)

In the box

  • iPad
  • Dock Connector to USB Cable
  • 10W USB Power Adapter
  • Documentation

Environmental Status Report

4.21.2010

Straight Talk reinvents how to own a mobile phone

 Straight Talk is designed to do exactly what it says: provide everything most people need in a cell phone, without a contract. As the name implies, the programs are simple and straightforward.

Phones: Straight Talk Phones
Straight Talk has a global relationship with major manufacturers such as Motorola, Samsung and LG. Therefore, we are able to bring the highest quality phones and features to customers at the best prices. Our MOTORAZR™ V3a model needs no introduction. It’s the most popular cell phone ever made, with camera, web and many other key features. The Motorola W385 is a great performer, also with camera and mobile web access. The LG200CM color flip phone provides more basic access at a lower price, but with all the features most people need.
Straight Talk is a service of TracFone Wireless Inc., America’s largest no-contract cell phone provider in the U.S., with over 14.4 million subscribers, TracFone Wireless has been the undisputed leader in no-contract wireless since its founding in 1996. TracFone Wireless is a subsidiary of América Móvil S.A.B. de C.V. ("AMX") (BMV: AMX; NYSE: AMX; Nasdaq: AMOV; LATIBEX: XAMXL)

4.19.2010

Why So Few Women in Silicon Valley

The NewYork Times

Women Out of the Loop in Silicon Valley

Women own 40 percent of the private businesses in the United States, according to the Center for Women’s Business Research. But they create only 8 percent of the venture-backed tech start-ups, according to Astia, a nonprofit group that advises female entrepreneurs.

That disparity reaches beyond entrepreneurs. Women account for just 6 percent of the chief executives of the top 100 tech companies, and 22 percent of the software engineers at tech companies over all, according to the National Center for Women and Information Technology. And among venture capitalists, the population of financiers who control the purse strings for a majority of tech start-ups, just 14 percent are women, the National Venture Capital Association says.

That reality is even more complex when race is factored into the mix. Small percentages of workers in information technology are African-American, Asian or Hispanic, and that number is even smaller for women.

WOMEN now outnumber men at elite colleges, law schools, medical schools and in the overall work force. Yet a stark imbalance of the sexes persists in the high-tech world, where change typically happens at breakneck speed.

The latest Web start-ups — for socializing, gaming and shopping — often attract more women than men as users. And many products from tech giants are aimed at women. But when Apple unveiled its new mobile computing device, it called it the iPad — a name that made many women wince with visions of feminine hygiene products.

The Next Key Trend: Unified Networking

BlackBerry 9700 Bold Unlocked Smartphone with 3 MP Camera, Bluetooth, 3G, Wi-Fi, and MicroSd Slot --International Version with no Warranty (charcoal)
Sprint Convergence
BlackBerry Mobile Voice System logo
Check out how BlackBerry 9700 Bold and MVS can work for you and your mobile workers. Sprint's strategy for a fully integrated converged network includes solution portfolios for Transport, Mobility, Collaboration, and Management. Each provides the scalability needed for a reliable, cost-effective foundation for unified communications by merging your wireless and wireline networks over Sprint's Global IP core. And each offers strategic benefits — with flexibility now and in the future.  h3cnetworks.com

 Network World

Perhaps of necessity, wireless LANs have mostly followed what we today call the overlay model - that is, the WLAN has been planned, configured, installed, managed, and used as a service apart from the underlying wired LAN that enables it. There has always been a well-established and ongoing supportive role played by the wired LAN, in the form of the interconnection of access points, controllers, location and application appliances, and all of the boxes and pieces required to get and keep a WLAN on the air. But we still fundamentally have two separate networks, which has always made little sense to me.

Sure, with wireless LANs constantly evolving (and only a hint of a slowdown here in the air today), it in fact made sense to many network managers to keep the two nets separate, event though users are migrating to the wireless LAN for default and even primary access, and even though two networks cost more (often a lot more) to operate than one. And it was that cost element that got me to thinking quite some time ago that a unified approach minimizing the boundaries between wire and wireless to the greatest degree possible would be the right way to go.


But what to unify? At the very least, we need to replace two management consoles with one. We need to unify all management, security, and related databases. We need to provision user services uniformly irrespective of access. We need to streamline help desk, training, and other support. But we might also want to unify other elements of a given solution. I had a conversation with the wireless team at 3Com (now part of HP) late last year where they described their implementation of unified networking, one of the most complete on the market today. They even go so far as to implement the same OS on all of their products, ensuring uniformity, commonality of services, and, they argue, efficiency and ultimate performance as well.

The debate rages on. So, two things: the 3Com meeting motivated our latest White Paper on Unified Networking, discussing this opportunity in much more detail, which you can find here. And second, if you're at next week's INTEROP conference in Las Vegas.   Mobile Business Conference

You'll be hearing a lot about unified networking this is major trend, one that finally closes the gap between wire and wireless with profound technical and cost benefits.

Top 5 Chip Stocks Focus On LEDs, Networks, Wireless

The Neatest Little Guide to Stock Market Investing
Investors Business Daily

The top 5 chip industry companies are:

28. Atheros Communications (ATHR) . The maker of Wi-Fi and other chips is set to report its latest financial results after the close of regular trading today — and the numbers could be huge. Analysts polled by Thomson Reuters expect per-share profit minus items of 51 cents, up 750% from just 6 cents in the year-ago quarter. Sales are expected to jump 129% to $210.2 million. The stock cleared a cup-with-handle last month.

64. Marvell Technology Group (MRVL) . The maker of networking, wireless and other chips is the only one of these five that is just returning to the IBD 100 after an absence. The other four have been staples of the list for quite a few weeks. In its most recent quarter, it reported EPS minus items of 40 cents, up 700% from 5 cents a year ago. The MainStay Large Cap Growth Fund is among those that have added to their Marvell holdings of late.
3. Aixtron (AIXG) . The company makes equipment used to make LED, or light-emitting diode, chips. LED is fast gaining steam as a green lighting alternative, and LED chips are used in many different types of computer and cell phone displays. UBS initiated coverage this month with a buy rating.

30. NetLogic Microsystems (NETL) . The maker of so-called knowledge-based chips, which accelerate computer networking traffic, recently completed a 6.7-million-share secondary offering, with most of the shares sold by the company, at $28.85. (It’s trading above 31 even after a tough day so far today.) This includes an 883,000-share over-allotment that underwriters exercised.

61. Cree (CREE) . One of the leading makers of LEDs was upgraded to buy from hold by Morgan Joseph last week. It reports tomorrow and, like Atheros, is expected to post big numbers. Analysts polled by Thomson Reuters expect EPS ex items of 44 cents, up 238% from a year ago. Sales are seen rising 70% to $223.3 million. Its year-over-year EPS percentage growth for the four quarters of 2009 was 30%, 100%, 100% and 90%, respectively.

4.05.2010

Inexpensive Radius Server Gives Wireless Networks The Security They Need


Many small businesses have considered connecting computers and other devices to their corporate network via wireless (WiFi) connections, and a brave few have actually done so. Many of these early networks required that wireless devices be Many small businesses have considered connecting computers and other devices to their corporate network via wireless (WiFi) connections, and a brave few have actually done so. Many of these early networks required that wireless devices be carefully placed within the building so that the wireless signal reached all intended recipients. Typically, these networks lacked adequate security features, which left them vulnerable to information and resource theft by unauthorized persons. These two problems have now been largely solved, meaning that it may be time for more small businesses to look into the potential advantages a wireless network can offer.

Wireless Networking Basics

Building a wireless network requires two distinct types of hardware components, wireless access points, and wireless access cards. The wireless access point is a device, which is attached to an existing computer network via a standard Ethernet cable. It has an antenna on it, which allows it to broadcast and receive signals from PCs and other devices. Each device wishing to communicate with the access point needs a wireless access card, which also contains an antenna. The current wireless standard, called 802.11g, allows for up to 54 megabits of data per second to be transmitted between the desired access point and the access card. While not quite as fast as wired networks, which typically run at 100 megabits to 1000 megabits per second, wireless networks offer more flexibility, and can be less expensive to install. This is especially true for older buildings where installing cable can become cost prohibitive.

Cutting Corners

Wireless networks use radio frequency waves to transmit information, and thus they are susceptible to being blocked by walls and other obstructions in a building. These obstructions can cause “dead zones” where the radio waves are unable to reach their intended recipients. Microwave ovens and other radio frequency emitting devices can also wreak havoc on wireless signals. The solution is to place your wireless access points strategically around your building so that interference is minimized. When the distance from a wireless access point to the wireless device is more than a few dozen meters, wireless repeaters can be installed to boost the signal. These repeaters can also be placed so that the wireless signals can be accessible from all corners of the building.

Wireless Network Security Solved

Installing a simple wireless network is pretty straightforward, but installing a secure wireless network can be substantially more difficult. However, an Ann Arbor company called Interlink Networks now offers their LucidLink products, which make installing comprehensive wireless network security a snap. Before LucidLink became available, an organization wishing to lock down their wireless network would need to hire expensive network security consultants to install and manage the wireless portion of the network. LucidLink packages all of this expertise into a software add-on that is so easy to use that even a small company’s office manager can easily take control over who is accessing the company network via wireless. It goes above and beyond simple address authentication (standard with most wireless routers), and implements what is called a RADIUS server. RADIUS servers are what large organizations spend thousands of dollars installing and maintaining in order to secure their large (1000+ node) wireless networks. Until now, installing a RADIUS server was out of the price range for all but the largest companies. In contrast, LucidLink’s product can be purchased for as little as $99 for a 3 user Home Office Edition, $449 for a 10 user version, and goes up to $3995 for a 250 user version.

Summary

While there are still issues with making sure that all areas of a building are covered, the current WiFi standard (802.11g) has a more powerful signal, meaning less emphasis needs to be placed on the locations of attached devices. However, it is still recommended that a professional site survey be done to verify that all required areas of the building can be reached by the wireless signal. Meanwhile, Interlink Networks has finally solved the security problem at a price that is affordable for small and medium sized business.
  Placed within the building so that the wireless signal reached all intended recipients. Typically, these networks lacked adequate security features, which left them vulnerable to information and resource theft by unauthorized persons. These two problems have now been largely solved, meaning that it may be time for more small businesses to look into the potential advantages a wireless network can offer.

Wireless Security – What You Should Know


Wireless networking is one of the simplest ways that a person can access networks and the Internet. With the advent of wireless networking, even people and areas who cannot invest in heavy infrastructure for internet connections, etc have been able to procure at least the basic internet connectivity. Wireless networks are basically used by people who are always on the move, and therefore cannot use the Internet in a wired atmosphere. Therefore, wireless networking is mostly seen in laptops and mobile internet devices like GPRS enabled cell and smart phones.
Hacking Exposed Wireless, Second Edition
However, wireless networking faces its biggest issue – wireless security. Because the machines and the devices that are used to access a wireless network are ambiguous, no wireless network is cent percent safe today. Also, wireless networks suffer from the ignorance of the wireless network users, both at the corporate levels as well as the personal usage level.
One of the most common problems that wireless networking experiences is unauthorized access. This happens simply because most companies and organizations keep their networks accessible without any password or security. This allows almost anyone to latch onto their network, not knowing either the problems that are created out of this action, nor knowing that they are on a proprietary network.

If your company or your organization has a wireless environment, it is very necessary that the environment is secure. Any wireless network can be hacked and it can have serious ramifications for the network and the company. For one, the company can lose some of its critical and secretive data if a person is able to hack into their computers through their network. Also, the hacker can install a virus in all the computers of the network, so that the productivity of the company or organization is lowered.
One of the first actions that a wireless network owner should take is to add the authentication aspect to the wireless network. With this, anyone who wishes to use the wireless network would have to authenticate themselves, before they can use the network.
Also, you would have to make a strong password that allows anyone to access your wireless network. There are several tools that are available online, which you can use to make a strong password. You can make a password that goes till even ten alphabets. Digits should be made compulsory when it comes to making passwords.
These are just some of the aspects that you have to keep in mind while ramping up your wireless security.

300,000 iPads sold on day 1


Apple today announced that it sold over 300,000 iPads in the US as of midnight Saturday, April 3. These sales included deliveries of pre-ordered iPads to customers, deliveries to channel partners and sales at Apple Retail Stores. Apple also announced that iPad users downloaded over one million apps from Apple’s App Store and over 250,000 ebooks from its iBookstore during the first day.
Apple CEO Steve Jobs also gave us a hint as to how the iPad might influence future iTunes spending:
“It feels great to have the iPad launched into the world-it’s going to be a game changer,” said Steve Jobs, Apple’s CEO. “iPad users, on average, downloaded more than three apps and close to one book within hours of unpacking their new iPad.”

Wi-Fi on the iPad


(ZyXEL ANT1106 802.11b/g/n Omni-Directional High-Gain Antenna)ZyXEL ANT1106 802.11b/g/n Omni-Directional High-Gain Antenna

So you Apple released was on Saturday: It's marvelous--certainly the best computing device ever produced of its size or nature. The iPad handles 802.11a/b/g/n with 2.4 and 5 GHz support for the appropriate standards. 
The flavor that adds 3G and a GPS receiver is due "in late April," according to Apple. With the no-contract deal Apple snagged for 3G use with AT&T, I'm curious to see what non-US carriers agree to as 3G iPads are launched in other countries.

4.04.2010

WI FI HACKERS!


It’s an invasion with a twist: People who think they are signing on to the Internet through a wireless hotspot might actually be connecting to a look-alike network, created by a malicious user who can steal sensitive information, said Geoff Bickers, a special agent for the FBI’s Los Angeles cyber squad.
It is not clear how many people have been victimized, and few suspects have been charged with Wi-Fi hacking. But Bickers said that over the last couple of years, these hacking techniques have become increasingly common, and are often undetectable. The risk is especially high at cafes, hotels and airports, busy places with heavy turnover of laptop users, authorities said.
“Wireless is a convenience, that’s why people use it,” Bickers said. “There’s an axiom in the computer world that convenience is the enemy of security. People don’t use wireless because they want to be secure. They use wireless because it’s easy.”
For Mark Loveless, just one letter separated security from scam.
Logging on to his hotel’s free wireless Internet in San Francisco last month, Loveless had two networks to choose between on his laptop screen — same name, one beginning with a lowercase letter, one with a capital. He chose the latter and, as he had done earlier that day, connected. But this time, a screen popped up asking for his log-in and password.
Loveless, a 46-year-old security analyst from Texas, immediately disconnected. A former hacker, he knew an attack when he saw one, he said.
Hacking For Dummies
Most Internet users do not.
About 14.3 million American households use wireless Internet, and this figure is projected to grow to nearly 49 million households by 2010, according to JupiterResearch, which specializes in business and technology market research.
“There’s literally probably millions of laptops in the U.S. that are configured to join networks named Linksys or D-Link when they are available,” said Corey O’Donnell, vice president of marketing for Authentium, a company that provides security software. “So if I’m a hacker, it’s as easy as setting up a network with one of those names and waiting for the fish to come.”
Linksys and D-Link are two of the many commercial brands of wireless routers, products that allow a user to connect to the Internet using radio frequency.
As the field of wireless connectivity expands, so too does a hacker’s playground. More than 300 municipalities across the country are planning or already operating Wi-Fi service.
Los Angeles Mayor Antonio Villaraigosa last month announced plans for citywide Wi-Fi in 2009. USC already offers free wireless, and by the end of March, Los Angeles International Airport will officially offer wireless at all its terminals under a new contract with T-Mobile.
Some airlines already offer Wi-Fi at LAX. “There are no signs for any service at all, so if any passenger is accessing a free wireless service … they should be cautious,” said Nancy Castles, an airport spokeswoman.
A survey at Chicago’s O’Hare Airport by Authentium revealed 76 peer-to-peer networks, or access points that are connected to via another user’s computer, with 27 of them advertising access to free Wi-Fi — a trademarked term for the technical specifications of wireless local area network operation. The company also found that three of the networks had fake or misleading addresses, one sign the hotspots could be hackers.
“At a busy place like O’Hare, in one hour a bad guy could get 20 laptops to connect to his network and steal the users’ account information,” said Ray Dickenson, vice president of product management at Authentium, who conducted the survey last September.
Corporate networks are sometimes the most vulnerable, as employers push for a more mobile workforce without always educating its users on the security risks of wireless Internet.
Many workers rely on corporate firewalls in the office and an automatic default network setting that links them to their corporate networks. Outside the office, the firewall is no longer in place. That means the computer is unprotected. Once hackers have “got a toehold in a network, it’s pretty much game over,” Bickers said.
Most laptops are configured to search for open wireless points and common wireless names, whether or not the user is trying to get online. That leaves people open to hacking.
In two new attacks, called “evil twin” and “man in the middle,” hackers create Wi-Fi access points titled whatever they like, such as “Free Airport Wireless” or an established, commercial name.
In the “evil twin” attack, the user turns on a laptop, which may automatically try to connect. When it does, it is connecting to a fake access point, or “evil twin,” and the hacker gets into personal files, steals passwords or plants a virus.
The hacker can become a “man in the middle” when he funnels the user’s Internet connection through this false access point to a true wireless connection. The unsuspecting Wi-Fi surfer may then proceed to enter credit card information, access e-mail or reveal other sensitive data that can be tracked by the hacker. Meanwhile, the session appears ordinary to the user.
Although the FBI has been aware of this kind of attack for about five years, its use has increased in the last couple of years and is being seen as a “huge threat,” Bickers said.
“The actual tools you need, the software, the hardware, etc., to mount this sort of attack has become insanely easy to acquire,” Bickers said. “You need a laptop, wireless radio and the ability to download a free tool and run it. It literally is child’s play.”
The creation of the access point itself is not generally considered criminal; it’s what happens next — tracking people’s Internet use — that can cross the line.
These hacking techniques are considered to be “tantamount to a computer intrusion and illegal interception of wireless communication that can be prosecuted under federal law,” Bickers said.
But computer evidence and statistics are hard to come by, said Arif Alikhan, a former federal prosecutor and former chief of the cyber and intellectual property crimes section for the U.S. attorney’s office in Los Angeles. People can unwittingly compromise their computers in a multitude of ways, and often there’s no trace.
“You can tell how many burglaries occur because you’re victimized, and someone knows they’re victimized,” Alikhan said. “People don’t always know if someone is using their wireless network, and it’s very difficult to tell unless you trace back every single connection…. It happens more than I think we all realize.”
The U.S. attorney’s office will not comment on pending investigations; however, wireless hacking cases are relatively new, and few if any current cases involve “evil twin” or “man in the middle” attacks, law enforcement authorities said.
“This is a classic case of law and law enforcement being a little behind the technological curve,” Bickers said.
Other types of wireless-related Internet hacking cases have recently popped up across the country.
Nicholas Tombros was found guilty in 2004, under the federal Can-Spam Act, of “war-spamming.” He drove around the Venice Beach area with his laptop and used unprotected wireless access points to send spam. He could receive up to three years in federal prison at his sentencing next month.
He is the only defendant who has been charged in a case involving wireless hacking by the Greater Los Angeles section of the U.S. Department of Justice’s cyber and intellectual property crimes division since it was established in October 2001, according to Assistant U.S. Atty. Wesley L. Hsu, deputy chief of the section.
“They are technically difficult cases…. They’re difficult cases to put together, so law enforcement is having to sort of catch up,” Hsu said.
On Sept. 30, Gov. Arnold Schwarzenegger signed into law the Wi-Fi User Protection Bill, which aims to block unauthorized sharing of open Wi-Fi networks and inform users of the dangers of unsecured networks. Starting in October, warnings and tips will be required on all wireless home-networking equipment sold in California.
The law specifically addresses “piggybacking” — or the use of another person’s wireless network to access the Internet — a problem that security experts say has been a concern for years.

Linksys WVC54GCA Webcam 640×480 802.11G Wireless Internet Home Monitoring Camera


The Linksys Compact Wireless-G Internet Video Camera sends live video through the Internet to a web browser anywhere in the world This compact, self-contained unit lets you keep track of your home, your kids, your workplace -- whatever is important to you. Unlike standard "web cams" that require an attached PC, the Internet Video Camera contains its own web server, so it can connect directly to a network, either over Wireless-G (802.11g) networking, or over 10/100 Ethernet cable. Choose either MPEG-4 or Motion JPEG video compression for a high-quality, high-framerate, up to 640x480 video stream.

Brother HL-2170W 23ppm Laser Printer with Wireless and Wired Network Interfaces


Versatile and Professional
This monochrome laser printer not only warms up in less than 10 seconds and prints up to 23 pages per minute to give you near-instant access to important reports, documents, and annual family letters when you need them, it also includes a manual bypass feeder for professional printing on envelopes and letterhead. The high-quality resolution (up to 2400 x 600 dpi) of this personal black-and-white laser printer reflects the time and care that you put into each document, while giving you the benefits of low cost per page laser output. The printer also includes 32 MB memory, and a 250-sheet capacity tray that can conveniently accommodate standard, legal, and custom-sized paper.
Built-In Wired and Wireless Networking 
Perfect for family or home offices, the HL-2170W gives you the option to connect the printer via USB, Ethernet, or 802.11b/g wireless networking. Brother makes wireless setup a snap; for users with wireless access points that support SecureEasySetup, Wi-Fi Protected Setup, or AOSS, you can automatically configure your wireless settings by simply pressing a button on your router.
Ergonomic and Energy Efficient
The Brother HL-2140 17.9-by-18.7-by-14.2-inch efficient design features a toner save mode for extended toner life as well as sleep mode. Easy to set up and a breeze to use, this printer is compatible with both Mac and Windows operating systems, and includes an animated user-friendly tutorial to help answer common support and maintenance questions.
Environmentally Friendly Design
For added peace of mind, this machine is Energy Star compliant, which means it helps save the environment while saving you money. (Energy Star is a joint program of the U.S. Environmental Protection Agency and the U.S. Department of Energy promoting energy efficiency).
This personal laser printer is backed by a one-year limited manufacturer's warranty.
What's in the Box
HL-2170W laser printer, starter toner cartridge and instruction kit.

Share your home broadband connection across multiple devices.



Network Know-How: An Essential Guide for the Accidental Admin

One option is to use the disk that came with the router. Most vendors ship a CD in the packaging that contains a program that will locate the router and set things up automatically for you. I recommend you use it if you do not understand much about networking as it will really simplify everything and give you exact instructions on what to do for your make and model of router.
If this is not an option you will likely need to log in to your router via your browser. There will be an instruction booklet showing you how to plug your computer and modem into the router. The modem’s network cable will plug into the socket labeled “WAN.” Your computer will plug into one of the numbered sockets. I like to physically connect the computer and router for this part because it’s easier to use wires for this setup than attempt to connect via wireless.
Once everything is plugged in, look in your routers manual for the default settings. There will be a default user name and password listed, as well as a default IP address. The address is usually 192.168.1.1. You will enter this into your Web browser with the http:// in front, and you should be prompted for a user name and password. Enter these and it will take you to the administration screen.
The first thing you will want to do is set a new router password. This is the password that lets you into the router administration panel. It is not related to wireless or network settings. There should be a link to set a password either in the menu, or perhaps as part of the basic settings page. As every brand of router has slightly different menus, you may have to hunt a little bit for these settings. When in doubt, read the instruction manual or refer to the documentation link in the administration page.
In the basic settings menu you’ll find many different options. For most of these settings, you will want to use the default settings. The exception is if you use DSL and have to enter a login and password to enable your Internet connection. You will want to enter that information.
I would also recommend that you leave any of the IP address settings as default. There are certain IP address subnets that are blocked off for private network use. These include the 192.168.x.x addresses, as well as 10.x.x.x addresses. You will likely see the 192.168.1.1 listed here as a gateway address. You will probably also see a subnet mask field. If your gateway IP is 192.168.1.1, your subnet mask should be defaulted to 255.255.255.0. A subnet mask is basically used to determine which network a device belongs to.
In addition, you will also want to make sure that the router is acting as a DHCP server. What this means is that it will be assigning IP addresses automatically to any device that you attempt to connect to the network. Usually there will be fields to enter the starting address for the DHCP. if your gateway is 192.168.1.1, your starting address will likely be 192.168.1.2.

Cisco Plumbs Home Wireless Market With New Routers


Cisco Systems Inc. said it will begin selling a new line of home-market wireless routers that the networking giant is touting for its modest design, ease of use and potential for widespread appeal.
Cisco-Linksys E3000 High-Performance Wireless-N RouterThe vendor is offering its fresh brand of consumer routers, called the Valet, in two versions at different functionality and price points.
Cisco also added to its roster of home-focused wireless routers with four new units under the Linksys E-Series banner.
Cisco differentiated the Valet and Linksys offerings in part based on technical complexity, positioning the E-series as suitably powerful for its core audience of technology-minded users, while still retaining the simplicity that consumers require.
The basic Valet model is aimed at the small- to medium sized home market containing primarily wireless devices, and is priced at $99.99. The Valet Plus unit is aimed at medium- to large-sized homes containing a mix of wireless and wired devices, and is priced at $149.99.
The Valet Connector, priced at $79.99, upgrades older computers to wireless and is offered as a complementary device to the Valet routers.
Cisco said that the Valet routers are available now at Amazon.com, Staples and at the Cisco web site. Retailers Best Buy, Target, Wal-Mart and others ultimately will sell the units, Cisco said.
The introduction of the Valet routers marks a departure in Cisco’s strategy for the home wireless market as the vendor previously has sold consumer-oriented routers only under its Linksys brand.
New Linksys consumer routers
Cisco’s new Linksys E-series consists of four routers ranging in price from $79.99 to $179.99 and includes the Cisco Connect software. Officials said that the E-series allows users to customize and control their wireless network settings to match their preferences.
An entry level model, called the E1000 Wireless-N router, priced at $79.99, connects devices at transfer speeds up to 300 Mbps, uses Faster Ethernet ports, and is aimed at general wireless Internet use; the E2000 Advanced Wireless-N model, priced at $119.99, includes four Gigabit Ethernet ports, features dual band technology, and is aimed at connecting computers, gaming consoles, HDTVs and Blu-Ray players.
In addition, the E2100L Advanced Wireless-N router with Linux OS, also priced at $119.99, uses the Linux operating system for network customization, features four Fast Ethernet ports and built-in UPnP AV Media Server to stream media content to an Xbox 360, PS3 or other device. At the top of the line is the E3000 High Performance Wireless-N router, dual band, priced at $179.99, and containing all the high performance features of the other models.
A high-performance, Wireless-N USB adapter, priced at $69.99, also is available.
The E-series models are available at the same outlets as the Valet line and at the Cisco web site.
In unwrapping the Valet and Linksys E-series routers, Cisco officials pointed to increased consumer demand for wireless products, offering up statistics from researcher International Data Corp. that slightly more than 30 percent of U.S. homes are set up for wireless use, along with data from ABI Research on the heft of the market, specifically that some 264 million wireless-enabled products--including mobile phones, gaming systems and music players, shipped worldwide last year.

802.11n: Lessons Learned - Part 1


Since early 2008, Xirrus has deployed over 1,000 802.11n Wi-Fi networks for universities, K-12
school districts, enterprises, hospitals, conventions centers, and other customers. During the
design and implementation of these networks, Xirrus has gained a wealth of experience and
knowledge in 802.11n technology and what it takes to successfully install and operate high
performance, resilient 802.11n networks.
This White Paper outlines key lessons Xirrus has learned from our 802.11n deployment
experience. Every network is different, but as our experience has shown, following several key
guidelines will help optimize new 802.11n networks to achieve maximum performance and
robustness towards the ultimate goal of using wireless to replace wired networks.
Network Design
Proper planning is crucial prior to deploying 802.11n networks. Appropriate planning is a good
idea with any 802.11 network, but it is especially important with new 802.11n networks because:
1. 802.11n will be used more often as the primary network connection compared with
802.11abg
2. 802.11n has more flexibility and configuration options than legacy Wi-Fi, so network
designs must take into account end-user needs in order to optimize performance and
robustness.
There are five key parameters to look at for a proper 802.11n network design, as reviewed in the
sections below.
Site Survey
Executing an active site survey prior to deploying Wi-Fi equipment (whether a Xirrus Array or
other AP) is important because it lets the network administrator know exactly where equipment
needs to be placed prior to deploying. With an active site survey, real equipment is taken on site
and used to determine the best placement prior to pulling cables and drilling walls for the actual
installation. Rather than doing an active site survey some Wi-Fi vendors and network designers
merely guess at the location of APs by looking at floor plans and assuming that the RF
propagation of all buildings is the same. Active site surveys are always important with Wi-Fi, but
they are especially important with 802.11n networks for the following reasons.
D-Link DIR-655 Extreme N Wireless RouterMIMO
To improve throughput, 802.11n networks use Multiple Input Multiple Output (MIMO). MIMO
increases overall throughput by using multiple antennas and signals to send the traffic. With
MIMO, rather than having a single high-powered stream carrying the data traffic, there are 2 or 3
lower powered streams carrying the data traffic. In general, MIMO increases network and station
performance, however because of MIMO 802.11n penetration, characteristics are more
dependent on the environment; MIMO can be affected by wall and other objects differently than
standard transmission techniques. Before deploying an 802.11n network, it is imperative to see
how 802.11n radios will behave in the current environment and not assume that the RF
propagation will be the same as existing 802.11abg networks.

 Lesson Learned: Because of MIMO, 802.11n RF propagation can be
significantly different than with traditional 802.11abg networks. An active site
survey should always be done to tests the RF characteristics of the
environment prior to deployment.
Dual-band Coverage
A discussed in the RF Design section later in this White Paper, operating 802.11n in the 5GHz
band is a key requirement to fully realizing the benefits of 802.11n. When doing a site survey, it is
imperative that readings be taken for both 2.4GHz and 5GHz. In most environments, 2.4GHz will
propagate further than 5GHz. If 5GHz is to be used in 802.11n networks (as is highly
recommended), the survey should take readings in both bands and both should be seen from all
areas to be covered.
The diagrams below show the results of a standard survey for 802.11n. As can be seen, the
coverage characteristics of 2.4GHz and 5GHz are different, with 2.4GHz providing coverage
where 5GHz does not. Adjusting equipment location or adding additional equipment may be
necessary to provide full 5GHz band coverage, and hence realize the benefits of 802.11n’s high
performance.

2.4GHz Coverage 5GHz Coverage

 Lesson Learned: When doing site surveys, look at both 5GHz and 2.4GHz
bands. 802.11n can operate in both bands and to fully realize its benefits, both
bands should be supported throughout the entire network.

Multiple Radios
Another consideration when doing a site survey is ensuring that multiple radios are available at a
sufficient RSSI level (Xirrus recommends -72dBm or greater for most applications) from every
area to be covered by the Wi-Fi network. For a resilient, dynamic connection there should be
multiple radios from which a station can choose in case one of the radios is heavily utilized or if
one of the radios goes down. The table below shows the signal readings from a sight survey of
an actual Xirrus customer survey. As one can see, multiple 2GHz and 5GHz channels can be
seen with strong signal coverage (-72dBm or higher).

4.01.2010

Configuring Your Wireless Network

Setting up a wireless network used to be very complicated and beyond most non technical people. Today, however, as long as you have the right tools, setting up and configuring your wireless network is a breeze.

Plugging everything in is an important part of setting up your wireless network, but believe it or not, that's not the end of it. The next step in the process is configuring your wireless network, and sometimes that can be easier said than done. There are a number of things that can stand in your way, so let's discuss some of them, and when the time comes, you should be able to move past them with relative ease.

First of all there are the wireless network drivers. A wireless network installation is going to require drivers, so if your wireless network PC card did not come with those drivers, you will need to search the internet. Luckily you won't have to look very far, because for the most part the original manufacturer's website will have these drivers. The only time that this will not be true is in the event that you somehow have a legacy network card and the original manufacturer has discontinued both the hardware and the drivers. In this case you will have to dig a bit deeper. For example you might need to seek out a third party driver website. Either way you should be able to find what you need so long as you look hard enough.

If you want to connect more than one network, then you might consider using a wireless network bridge so that you can see the other network and share files with it. This will come in handy if for some reason you have decided to set up a print server on another network. You can probably already see the potential benefits of this, so it would be wise to begin researching the way in which your current operating system handles bridges.

If you want to take full advantage of your wireless network, then a wireless network PC card would be a great idea. There are many laptops that have a card built in, but sometimes these cards do not live up to their name. It would be best to have a PCMCIA card in your laptop because these types of cards typically have a much longer range and transmit a more powerful signal to the router. These are normally much preferred over USB cards, but in time, providing that USB cards become more powerful, the PCMCIA card may fade into the past like the floppy drive and zip drive before it.

Wireless network configuration does not have to be difficult, and as long as you have all the right wireless network tools and equipment, you should find that the process is relatively painless, even to the computer novice. So go forth and find a way to set up your wireless network. Soon enough you will be surfing the net and sharing your files faster and easier than ever before.