Tuesday, June 22, 2010

WiFi Wireless Fidelity_Part-2

Wi-Fi Alliance logoImage via Wikipedia

In the early 1992 Australia's Commonwealth Scientific and Industrial Research Organization (CSIRO) obtained a model/patent in Australia for wireless data transfer technology. In late 1996, Australia obtained another patent for the same technology in the USA. IEEE 802.11 uses the mathematical formula in the model. In the mid 2000 Australia's Commonwealth Scientific and Industrial Research Organization (CSIRO) established the world's first wireless local area network (WLAN) internet connection.

In April 17th-20th, 2009, fourteen tech companies including major market share holder like Intel, Microsoft, HP, Dell, decided to issue CSIRO two hundred and fifty million dollar for their Wi-Fi model/patent development.

EU influences overall in deploying of wireless phone system, but the USA leads in Wi-Fi technology moderately because it leads in notebook pc usage. In mid July 2005, there were nearly seventy thousands Wi-Fi networks worldwide, most of in the USA, followed by the UK and Germany. The USA and EU have about eighty percent of the worldwide Wi-Fi service holder. Tactics are in progress in urban areas of the USA to afford cost free public Wi-Fi network. Even with these numerous numbers and more expansion, the extent of actual Wi-Fi usage is much less than expected. A research company Jupiter Research found that only fifty percent of people have used Wi-Fi and only six percent in an open place.

Enhanced by Zemanta

WiFi Wireless Fidelity_Part-1

Wi-Fi Signal logoImage via Wikipedia

Wi-Fi supports both single-carrier direct-sequence spread spectrum radio technology (a portion of the larger family spread spectrum systems) and multi-carrier orthogonal frequency-division multiplexing radio technology. The deregulation of convinced radio-frequencies for unlicensed spread spectrum employment enabled the expansion of Wi-Fi products, IEEE 802.11 just the once contestant HRF (Home Radio Frequency), Bluetooth, and lots of other products like a few types of cordless telephones.
In the USA, the Federal Communication Commission (FCC) pioneer of unlicensed spread spectrum presented in rules implemented on 9th, May, 1985.
Many countries just after implemented these FCC standards, enabling apply of this technology almost all key countries. The FCC plan was offered by Michael Marcus of the FCC personnel in 1980 and the consequent authoritarian action took half a decade. It was portion of a broader suggestion to permit civil use of spread spectrum technology and was denied at the time by majority equipment manufacturers and most of the radio system operators.
IEEE 802.11 (Wi-Fi) technology started in a 1985 under the U.S. Federal Communications Commission that released numerous bands of the radio spectrum for unlicensed utilization.
Enhanced by Zemanta

Friday, June 11, 2010

Mobile VPN

Virtual Private Network site to site and from ...Image via Wikipedia

Concept of Virtual Private Networks

Concept of Virtual Private Networks predates data networking. The term is used by the traditional phone companies to refer to services offered to various entities. In some cases it is as simple as a leased line facility. In others it is a complete outsourced network that is carved out of the “public network” for an entity’s exclusive use.

A virtual network essentially a connection that appears to the users as a dedicated end to end connection. It is not important for the user to know actual route by the data. In fact the route will often change during the course of session. In order to make the network private (in an IP environment) other services must be implemented.

To ensure privacy several things must happen. The user must be verified to be eligible to use the VPN. This is accomplished through the use of RADIUS servers and share certificate methods. The data must be protected or made private. This is accomplished through various tunneling techniques.

With a private network, user expects a certain level of service. This requires the ability to implement Quality of Service schemes. While this can be accomplished, it becomes more complex in an IP environment with varied paths and providers. In a Mobile IP environment it is further complicated by mobility and roaming issues.

Enhanced by Zemanta