Advert

How to Change a WEP Key

Last edited by . Total of 1 comment in the discussion.

A WEP (Wired Equivalent Privacy) key is a type of security algorithm for wireless devices that protects a computer from hackers and people who are trying to access someone else’s Internet connection. It consists of the numbers 0-9 and the letters A-F and can be 10, 26, or 58 characters long. For devices within the same wireless network to communicate with each other, the user must enter the same WEP key on each device. To make this easier, many devices are equipped with software that converts a regular text-based password Read More

Share on:

802.11n

Last edited by . Total of no comments in the discussion.

Information technology group Wi-Fi Alliance or WFA has been testing a next generation, yet still pre-standard wireless networking program that would define wireless Internet of the future. Much ado has been tackled about the technology called 802.11n. For the average Internet user, who knows not too much about the standards and technicalities of the information technology tools, 802.11n is just another consumer electronics code. For the benefit of all computer users, it would be imperative if basic description and comprehensive yet simplified explanation about the code would be offered to Read More

Share on:

How to Configure a Router

Last edited by . Total of no comments in the discussion.

One of the main disadvantages of connecting to the Internet via wire is that it prevents you from moving around. On the other hand, by setting up and configuring a router, you can move around with your lap top and surf the web more comfortably. Configuring a router is not difficult; however, people may have problems figuring out how to set it up. Configuring a Router When setting up a router, you have to think about location.  Put in a “central” place so that you can get a signal from Read More

Share on:

RSN (Robust Secure Network)

Last edited by . Total of 1 comment in the discussion.

RSN (Robust Secure Network) is a protocol for establishing secure communications over an 802.11 wireless network. RSN (Robust Secure Network) is part of the 802.11i standard. The RSN Protocol Process The RSN protocol functions as follows: The wireless NIC sends a Probe Request. The wireless access point sends a Probe Response with an RSN Information Exchange (IE) frame. The wireless NIC requests authentication via one of the approved methods. The wireless access point provides authentication for the wireless NIC. The wireless NIC sends an Association Request with an RSN Information Read More

Share on:

HSCSD (High Speed Circuit Switched Data)

Last edited by . Total of no comments in the discussion.

Fixed/Mobile Mobile Circuit/Packet Circuit Max Bandwidth 57.6Kb Range Coverage area of host network Frequency Frequency of host network Host Network GSM Definer ETSI (European Telecommunications Standards Institute) URL http://www.etsi.org/ HSCSD (High Speed Circuit Switched Data) is a specification for data transfer over GSM networks. HSCSD utilizes up to four 9.6Kb or 14.4Kb time slots, for a total bandwidth of 38.4Kb or 57.6Kb. 14.4Kb time slots are only available on GSM networks that operate at 1,800MHz. 900Mhz GSM networks are limited to 9.6Kb time slots. Therefore, HSCSD is limited to 38.4Kbps Read More

Share on:

Wireless Mesh Network

Last edited by . Total of no comments in the discussion.

A wireless mesh network relies on radio signals to allow several devices within a coverage area to communicate with each other. Wireless mesh networks are often used in conjunction with other networks in order to give users reliability and stability. This is because wireless mesh networks communicate with each other through any device within the coverage area and automatically restore communication if one device stops working. Wireless mesh networks include everything that other networks do (router/gateway, clients, etc.) but do not necessarily need to connect to the Internet. How Wireless Read More

Share on:

What is Intersymbol Interference?

Last edited by . Total of no comments in the discussion.

Intersymbol interference is a signal distortion in telecommunication. One or more symbols can interfere with other symbols causing noise or a less reliable signal. The main causes of intersymbol interference are multipath propagation or non-linear frequency in channels. This has the effect of a blur or mixture of symbols, which can reduce signal clarity. If intersymbol interference occurs within a system, the receiver output becomes erroneous at the decision device. This is an unfavorable result that should be reduced to the most minimal amount possible. Error rates from intersymbol interference Read More

Share on:

Wireless Antennae

Last edited by . Total of no comments in the discussion.

Wireless networks are great, when they work. A weak wireless signal can mean real trouble. One of the best ways to improve a wireless signal is to replace the antenna on one or both ends of the connection with a better wireless antenna. Types of Wireless Antennae Wireless antennae fall into five general categories: Omni Parabolic or Dish Yagi Patch Sector Omnidirectional Antenna An omnidirectional antenna works equally well in picking up signals from every direction. Omni's make excellent general purpose and mobile antenna's. The longer an omnidirectional antenna is, Read More

Share on:

WiBro

Last edited by . Total of no comments in the discussion.

What is WiBro?  WiBro stands for “Wireless Broadband”. It was developed in South Korea, to allow people to access the Internet from anywhere in the country. On top of that, even if you are in a moving vehicle, you can still access the Internet because the WiBro continues to transmit the signal regardless of whether you are moving or sitting still. Currently, WiBro is covering nearly 85 percent of the country. Similar to the WiMax–an American attempt to create wireless broadband in cities–the WiBro uses the IEEE 802.16 standards. The Read More

Share on:

How to Access a Router

Last edited by . Total of no comments in the discussion.

When setting up your router,  the most important thing you need to do is access the router. You do this because you need to set up the security features and type of Internet connection. Therefore, getting into the router is very important. Accessing the router is like accessing any other website. First, you need to know the router’s default IP address. For example, it might be: 192.168.0.1, 192.168.1.1, etc. If you don’t know what your router’s local IP address is, read the manual and find it there. You can also Read More

Share on: