Wireless Networking

16K

Solutions

20

Articles & Videos

19K

Contributors

Wireless networking is anything related to the transfer of data between two (or more) devices without the use of a physical connection, ranging from getting advice on a new Bluetooth headset to configuring sophisticated enterprise level networks.

Share tech news, updates, or what's on your mind.

Sign up to Post

Riverbed Technology's webinar discusses networking for the cloud era with simplified SD-WAN cloud connectivity.
3
Retailers - Is your network secure?
Retailers - Is your network secure?

With the prevalence of social media & networking tools, for retailers, reputation is critical. Have you considered the impact your network security could have in your customer's experience? Learn more in our Retail Security Resource Kit Today!

Need WiFi?
Often, there are perfectly good networks that don't have WiFi capability - and there's a need to add it. 
- Perhaps you have an Ethernet port into a network but no WiFi nearby.
- Perhaps you have a powerline extender and no WiFi at the far end.
- And you still want all the computers an devices on the same network LAN subnet.
This calls for an Access Point.
But maybe you already have what you need or don't have the wherewithal to buy and configure an access point.

Add WiFi with a Simple / Commodity Wireless Router 
Perhaps you have a perfectly good WiFi-capable router around.  Maybe it was replaced when the latest ISP modem was installed with its own WiFi.  With the idea that a picture is worth a thousand words, we drew this narrated diagram to help show how to add WiFi with simple commodity wireless routers - and without the complication of a lot of networking knowledge.  

Wireless-Router-as-a-Simple-Switch-a.pdf
0
 
LVL 26

Author Comment

by:Fred Marshall
Comment Utility
The original has the figure shown when it's opened.  Here I only see a link???
0
Sennheiser
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
1
Sennheiser
For Sennheiser, comfort, quality and security are high priority areas. This paper addresses the security of Bluetooth technology and the supplementary security that Sennheiser’s Contact Center and Office (CC&O) headsets provide.
 
2
Sennheiser
DECT technology has become a popular standard for wireless voice communication. DECT devices are not likely to be affected by other electronic devices and signals because they operate in a separate frequency-band.
1
In this article we have discussed about the OS X EI Capitan and how to fix Wi-Fi issue in OS X El Capitan. We have explained how to delete system level preferences and create a new Wi-Fi location to resolve Wi-Fi issue.
1
Using in-flight Wi-Fi when you travel? Business travelers beware! In-flight Wi-Fi networks could rip the door right off your digital privacy portal. That’s no joke either, as it might also provide a convenient entrance for bad threat actors.
3
 
LVL 6

Author Comment

by:Teksquisite
Comment Utility
Good grief the submit button was way at the bottom!
0
 

Expert Comment

by:SINC_dmack
Comment Utility
The connection between a smart phone and an email server should always be SSL encrypted.  It doesn't matter if the wifi connection is insecure, as the 2048-bit (or higher) level of encryption used by the mail server's SSL certificate is more than sufficient to keep hackers out.  If a hacker was able to intercept Steven Petrow's email and/or mail server credentials, it is because the mail server itself was inadequately secured, such as if it was a legacy unencrypted POP3-based server.  

The onus for that lapse lies with whoever is responsible for determining what is acceptable for the mail server's configuration, and on the user for relying on such an insecure method for using email.  All of the major free email providers (Gmail, Yahoo, Hotmail) provide encrypted connections, and so do properly-configured Microsoft Exchange servers.  But people using fly-by-night "100 mailboxes for $20 per month" or whatever services may well not have any encryption.  Where people can really run into problems is if they use insecure email services AND use the same password for other services.  For example, if Steven Petrow had used the same credentials for his email and for his credit card website, a hacker who got the email credentials could have sniffed his wifi traffic to see what credit card website Steven went to, and then attempted to use those credentials there.  But since the credit card website would be SSL encrypted, if Steven had used different credentials for email and the credit card website, then the hacker would have, at best, just been able to see that Steven was going to a credit card website, but not intercepted his credentials or any data sent or received to that website.

Sure, a VPN will alleviate the problem of having an insecure email server (and it's never a bad idea to have an extra layer of encryption), but who is going to start up a VPN every time they want their phone to check their email?  Pretty much nobody.  Rather than advise people to take a bunch of steps that ought to be unnecessary, suggest that they ensure that any services they access over the internet are properly SSL-encrypted.
0
This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
9
Working settings for French ISP Orange "Prêt à Surfer" SIM cards for data connections only. Can't be found anywhere else !
1
Tired of waiting for your show or movie to load?  Are buffering issues a constant problem with your internet connection?  Check this article out to see if these simple adjustments are the solution for you.
12
 

Expert Comment

by:bozo1701
Comment Utility
Reducing the quality of the picture is not really a solution. The hard line seems the only viable option today for HD video streaming. Cheers
0
 
LVL 16

Author Comment

by:Kyle Santos
Comment Utility
Reducing the quality of the picture is not really a solution. The hard line seems the only viable option today for HD video streaming. Cheers
Agreed.  But for folks like me who are in a canyon, on tower relayed internet, its been helpful and I don't notice a drastic difference in quality. :)
0
Creating Instructional Tutorials  
Creating Instructional Tutorials  

For Any Use & On Any Platform

Contextual Guidance at the moment of need helps your employees/users adopt software o& achieve even the most complex tasks instantly. Boost knowledge retention, software adoption & employee engagement with easy solution.

Today sees the launch of a new case study, focusing on BYOD technologies we have been working with for some time now.  But with the advent of 802.11ac wireless technologies and the story behind our landmark developments, we would like to share this case study with you.

The Challenge

Technology is a vital component to boosting the opportunities for learning and teaching across the schools. Having run a number of laptop programmes for students, the schools were finding this approach to computer provision more and more inadequate. For students in particular, the preference was to allow them internet access for their own devices, on school premises. With a significant number of pupils boarding at the three schools, this could also have a positive impact on pupil welfare.

"We found the laptop programmes were simply unsuitable. The pupils ended up using devices they didn’t like, or weren’t familiar with and in the absence of internet for pupils own devices, we were inadvertently forcing them to use things like mobile hotspots, which seemed counterproductive. We could see that opening the network up and permitting the use of pupils own devices, would satisfy both requirements" explains Adrian McGarry, Director of ICT at Licensed Trade Charity.

Pursuing this approach, would essentially mean a Bring-Your-Own-Device (BYOD) policy would be adopted by each school. To make such an approach work, Wi-Fi access would need to be consistent across each school campus. In …
0
This article is a step by step guide on how to create a basic PTP link using Ubiquiti airOS devices. This guide can be used on the following Ubiquiti AirMAX devices. Nanostation, Bullets, AirBridge, Nanobeam, NanoBridge to name a few. Please review all the AirMAX device here.. I will be focusing on the selected part of the diagram below for this guide using two Ubiquiti Nanostation M2's. You can use this setup to create a link between office buildings up to 50miles (depending on the device) 

 
1.png

The factory default IP address for the device is 192.168.1.20 and the subnet mask is 255.255.255.0 (/24) open internet explorer and connect to 192.168.1.20 if you are using one of the latest firmware versions you will be redirected to https and you will see privacy error page
Note: You either need to be in the same IP address range or you would need to change your IP configuration on your PC to static Please follow the quickstart guide from ubiquiti to get the device connected to your PC..

Lets get started.
  • Click on Advanced and then on Proceed to..

2.png
3.png

Next you will need to enter in the default Username and Password “ubnt” for both.. In this guide I will be using Complaince Test for Country please select your appropaite region..

 
4.png

The next screen that appears is the Main Screen. On this screen you will see all your active connections to your device, firmware version, MAC address
2
 
LVL 16

Author Comment

by:Dirk Mare
Comment Utility
Thank You
0
 
LVL 8

Expert Comment

by:Temody
Comment Utility
you are welcome
I am interesting in Ubiquiti and mikrotik Devices do you ?
0
Multi-source agreements are important because they set standards that all manufacturers should follow to ensure that devices are compatible with multiple vendors. The multi-source agreement (MSA) is an agreement that establishes how multiple vendors co-exist in a competitive market for interoperable products. Every designer should be familiar with MSAs and how they affect their designs.

Why are Transceiver MSA Standards Important? 
Optical transceiver devices are some of the most popular devices available. The documentation will define the characteristics of any type of optical transceiver system. MSAs are important because they give consumers piece of mind that transceiver devices will have a basic level of operability. 

With standards, consumers have more freedom in the choices they make. Sure, some products are superior to others, but the basic functionality and operability of all transceiver devices will be the same with these devices. This will allow people to compete and gain a share of the market without creating a design that’s completely different from all other devices. 

Standards force suppliers to be efficient and creative to find ways to drive costs down and offer customers more for their money. However, many companies have tried to find loopholes around the value around the MSAs. For instance, some people have tried to write unique code into the undefined memory of EEPROM of each SFP/SFP+. 

Typically, when transceivers are inserted into the …
1
With the purchase of CloudCommand by Comcast customers are left in a bind as subscriptions expire and render the AP's disabled. The following will explain how to flash your Ubiquiti AP's with CloudCommand firmware back to Ubiquiti firmware.

HOWTO: Flashing Ubiquiti AP Update
‎To flash the firmware, you'll need a 3.3v capable Serial to TTL cable. This document will show you how to flash the firmware and identify pinouts if not labeled.
Note: You CANNOT use a USB to RS-232 cable! That type is the wrong polarity and it outputs high-voltage (+/- 10V) and could destroy your AP! Also: do NOT connect the power wire to anything!

Connect your USB to TTL adapter to your PC (make a note what com port it is assigned), and now we'll connect the other end to the header inside. This is a 4 pin connector. You only should connect 3 wires, GND (black), TX (green), and RX (white).
 
So far all ubiquiti’s I’ve looked at have this pin configuration.
 
pinning.jpg
You will need PuTTY terminal emulator and Tftpd. Connect a network cable to the AP but do not plug it in to the power injector yet.  Plug the network port of the power injector to your laptop and configure your laptop to 192.168.1.254. You should already have your firmware.bin file copied in to the tftpd folder. It can be found in the C:\Users\%USERNAME%\Ubiquiti UniFi\dl\firmware\BZ2\3.2.1.2601 folder after installing the ubiquiti controller.  Configure Tftpd as a client as shown below.
tftpd.png
1
 
LVL 38

Administrative Comment

by:lherrou
Comment Utility
Congratulations! Your article has been recognized as being of excellent quality, and has been awarded the Experts Exchange Approved designation.
0
In this article I will describe how to setup a Cisco WLC 5508 to work with Apple's Bonjour protocol across VLANs.  I will also discuss using screen mirroring and Airplay on an AppleTV v3.  This article covers the wireless network only and requires multicast to be functional on your wired network.

As Bonjour is a link local protocol (it's TTL is set to 0) it will not cross layer 3 boundaries on a network even if multicast routing is configured.  To get around this problem and traverse VLANs/Subnets we will configure an AVAHI Gateway on Ubuntu Server.

From wikipedia we find a good Definition "Bonjour is Apple's implementation of Zero configuration networking (Zeroconf), a group of technologies that includes service discovery, address assignment, and hostname resolution. Bonjour locates devices such as printers, other computers, and the services that those devices offer on a local network using multicast Domain Name System (mDNS) service records."

Prerequisites:
1. Cisco WLC
2. WLAN setup able to communicate with wired network
3. Virtual or Physical Ubuntu Server
4. Multicast functioning on wired network
5. APs NOT running in FlexConnect mode

Example Configuration:
1. WLC 5508 with 7.0.116.0 firmware
2. VLAN 10 - Wired Network 1
3. VLAN 20 - Wired Network 2
4. VLAN 12 - Wireless Network 1
5. VLAN 22 - Wireless Network 2
6. Ubuntu Server 12.10
7. AppleTV v3

1. Configure Multicast on WLC 5508
1

1. MAC Filtering


MAC filtering is like handing a list of names to a doorman. If someone comes to the door and mentions a name, this name is checked by the doorman on his list and granted or denied access by this.

This means that if someone mentions the name of someone on the list (for example a name overheard while waiting in line for the door) he/she get's in.

In wireless networking, a simple network sniffer will reveal to you any clients associated with an access point, so you would know which "name" to give when visiting the access point and can change the MAC of your network card accordingly.

In short, this "security" would be breached in several seconds depending on how fast the one wanting to access your network can type a new MAC address.

2. Antenna location and/or power adjustments


Some people might tell you that you should make sure the signal only gets to the area you want it to, rather than placing your access point in a place where you have enough coverage for the area you want to have covered and enough signal to cover all of that area.

Lowering the amount of power or placing the antenna in an area where you want to use the signal only causes you issues. Anyone wanting to access the network can always get a bigger antenna and/or a directional antenna to get the amount of signal they want.

Location and output of an access point should be adjusted for maximum coverage and minimum interference, but not as a security mechanism.

3. Disabling SSID broadcasting

12
 
LVL 18

Expert Comment

by:Ravi Agrawal
Comment Utility
May I add here that you need to change your Router's Password too? Though that does not relate to Wireless Security but suppose you hand out the WPA/WPA2 key to anyone for Casual Browsing, you don't want him / her to mess with your Router's Configuration, right?

Ravi.
0
 
LVL 8

Expert Comment

by:engeltje
Comment Utility
Nice piece of work. This I tell about every day.

One more suggestion: WPA can be cracked easily when your password is based on a dictionary word.
W1F1R0UTER is however it consist of numberts and letters, and does not form a word, easy to crack.

One fine trick is using asterisks in your key.

*WIFI*ROUTER* by example is almost uncrackable (for now...)

0
Hopefully this article will help someone who's had the same issues I had.

I have a Dell Wireless 1390 WLAN Mini-Card and Windows 7, and for the past couple of days I was beyond frustrated because my wireless laptop was not able to access the Internet.  It was able to previously, but all of a sudden something happened that caused me not to be able to.

At first I thought it was my router so I rebooted it, even changed it back to it's default settings to no avail.  I was able to connect just fine to the router and get a strong signal, but I just couldn't get on to the Internet.  I took it to work thinking that I would need a new router but when I connected to the work router, the same thing happened again.  The thing is that just a couple days before I was actually able to connect to my work router.  

I ran the Windows diagnose program and it told me that I was having errors with the DNS. The DNS?  WHAT? Usually I get that error if I'm on a work network, not if it's just me in my house with one router.

But anyways.  I searched Google and tried repairing winsock, with all these commands, but nothing worked:

ipconfig /flushdns

ipconfig /release

ipconfig /renew

ipconfig /whatinthehell?

Open in new window


I did notice that I was able to ping by IP address, but not by name.

After more searching around, I finally found out what the problem was.  In my network connections settings, I had a Virtual adapter named:

Microsoft Virtual WiFI Miniport Adapter

I …
0
 
LVL 13

Author Comment

by:cshepfam
Comment Utility
The thing that was frustrating was that I had VMWare installed for about a year and never ran into this problem.  Somehow something changed that caused me to lose Internet connectivity.  As soon as I disabled that Virtual Adapter, everything went back to normal.  
0
 
LVL 32

Expert Comment

by:DrDamnit
Comment Utility
If I remember correctly, I had uninstalled and re-installed or did a repair or something, and that's what caused it.
0
Coaxial cable bending
There are several factors that govern the selection of coaxial cable for your Machine to Machine (M2M) application: the location of cable runs, either indoor or outdoor, inside or outside an enclosure, maximum bending and the maximum length of the individual cable runs. Today I talk about the bending.

Maximum coaxial cable bending
For coaxial cables inside your enclosure, the bending can be critical. If you bend the coaxial cable to hard, then the Voltage Stand Ratio (VSWR) will rise. The VSWR is the parameter that tells you how many of the transmitted radio energy will run back to the generator. The generator will be your GSM module (or any other wireless module). The GSM module will generate a radio wave that will be forwarded to your GSM antenna and from there to GSM base station. Backward the GSM antenna is the generator. The antenna should catch as most as possible radio energy and feed it to the coaxial cable. You can use best GSM module with highest sensitivity and best GSM antenna with optimum antenna efficiency – Worst case a wrong bended coaxial cable will damage your expected result of your wireless M2M application. Please take care and read the specification of the selected coaxial cable. Please also take care, that you never bend the coaxial to hard during your test of your M2M application. You have no chance to …
0

Wireless Networking

16K

Solutions

20

Articles & Videos

19K

Contributors

Wireless networking is anything related to the transfer of data between two (or more) devices without the use of a physical connection, ranging from getting advice on a new Bluetooth headset to configuring sophisticated enterprise level networks.