Table of Contents




Title:Technology Today August  2003
by Robert Sanborn

Wireless networking works great. For the most part. As standards settle and technology improves, you will find wireless networks working seamlessly and worry free but you still have some things to work on and decide before you install one.

Wireless networking has gotten both more confusing and more settled with the final adoption of the wireless standard 802.11g which allows for up to 54mbps data networking speeds. It is still slower than the traditional wired lan 100mbps networking you get with traditional Category 5 but for most of what we do, it will certainly be fast enough. If you think about what most of us do with wireless networks, it is to get on the internet and do email, any of the wireless standards will do just fine because even 5mbps is fast enough for that simply because of the limitations of the broadband access you have. What you need to think about is the other things you will do with your networking. If you want access to other computers files and printers, again, the slower networking will work just fine. Where it gets interesting is if you want to do file transfer or data backup on your wireless network. The problem here becomes the size of the data you want to transfer across the wireless network. Backing up your documents for example, again, takes little bandwidth because text files and spreadsheets really don’t take up much space. But, if you want to backup your entire disk, your pictures, or other large files, you want the largest amount of bandwidth you can get your hands on. Now backing up your computer takes another column and a half and hopefully, you already have a plan in place because if you try to backup a 10 gigabyte hard drive’s worth of data across a network, you better plan on spending all night doing it.

Right now, the 10mbps standard 802.11b which is the most common, gives you a good mix of easy access to computers and networks and a reasonable performance for copying data files all at a reasonable price. Again, as long as you don’t have much to transfer on a regular basis and what I consider much would be less than a couple of hundred megabytes of data to transfer, then you should be ok.  If you need the higher performance of the network, then look at the 802.11g wireless standard that is coming out today. While most companies have the hardware, look for the prices to come down quickly as more is introduced.

What I haven’t talked about yet is the fact that there is also another wireless standard out there called the 802.11a. In a nutshell, here are the differences. “b” is the basic standard at 10mbps in the most common 2.4gigahertz radio spectrum range. “g” is the new 54mbps standard in the same radio spectrum range. “a” is another new standard that while being a 54mbps speed network, uses a different, little used, and unregulated radio spectrum of 5 megahertz.  My inclination is to stick with either “b” or the “g” standards. Here is a web site that has a great chart on these: http://www.linksys.com/edu/wirelessstandards.asp.  By the way, Linksys has some great information pages to tell you more about these networks, security, and installation.

Pricing for these networks is getting pretty good and as long as you stick with good quality hardware, you will do fine. The problem is if you start mixing hardware companies you may have problems with the setup partly because a company like Linksys, for example, while they have a great wizard program to set things up for you, uses what they call a pass phrase to generate a code for the wireless encryption. If you use someone else’s hardware on one of your notebooks for example, you might have to figure out what it translated to and manually enter it.

Data security and intrusion protection should also be high on your list of requirements when looking at wireless. If your wireless system is connecting you at a broadband network, you should be sure it contains some hardware firewall features. Those firewall features should include SPI which is Stateful Packet Inspection to check each packet coming and going; NAT, Network Address Translation routing to hide the computers behind the firewall to the rest of the internet, and Denial of Service (DOS) attack protection.  If your hardware box doesn’t include these, you should also consider including a software firewall application on each of the computers attached to your wireless system. And as to software firewalls, I don’t include the built in Windows XP software, it is too weak. Go with a good company like Zone Labs Zone Alarm firewall program.  For the hardware firewall wireless router, my favorite right now is the Linksys BEFW11S4 model that connects your wireless network to a broadband network and has 4 ports onboard for locally situated computers. If you want to step up to the “g” standard, go with the Linksys WRT54G. You will note that these don’t have the full firewall security that other networks have and so you should run the firewall software as well.

The good news about security, is that wireless networks have their own type of security to keep your wireless network free from prying computers hanging out outside your door. What you need to remember if you are using a wireless broadband router is that you have two different security needs. One is to keep people from the broadband world from hacking into your network, and the second is to keep people from the wireless world away as well.  So here is what you need to look at from the wireless side.

The first thing to do is to change the password on the router.  This is a basic item that will keep unauthorized people from changing the settings on your wireless network.

Next is to change the SSID name. This is the name, similar to a work group name in a normal network, that the network calls out to each wireless computer and if you don’t change the name, the defaults are easy to find.

If you have a router or access point to go to, then make sure you are in what they call infrastructure mode rather than ad-hoc which is used to go from a single computer to another. The “infrastructure” mode tells the notebook or remote computer that it is looking for a network as opposed to another computer sitting out there. 

To keep other computers from listening in, disable the broadcast mode in the router so that it doesn’t constantly send out a signal letting anyone know that it is there.  That way, you have to know the SSID of the router in order to connect and if you use a name not easy to guess, then it makes it more difficult for people to tap in.

The next security measure is to enable the WEP (Wired Equivalent Privacy) which is the encryption between the router and the computers talking to it. Even if someone was able to guess the SSID, if you have WEP encryption enabled, they still can’t get into your network. The good news is that there is another encryption standard coming called the WAP which will be even more tighter. 

Finally, what you can do to keep unwanted computers out of your network is to enter in the MAC addresses into the router’s permitted access listing thus enabling the MAC address filtering to only allow those computers who are on the list.

Once each of these are in place, your wireless side of the network is safe from the outside world.

Lastly, the problem you may have next will be if you decide to go to another wireless network like you would find in a Starbucks or at a hotel. Those will have different requirements and you will need to setup your notebook’s wireless connection unit differently.

Short Takes

Want to see what PC World thinks are the best hardware and software products of 2003?  Then hop over to their review at: http://www.pcworld.com/reviews/article/0,aid,110653,tk,sbx,00.asp 

You will find some interesting things and some surprises there and knowing one of the reviewer quite well, you will certainly find some things there to disagree with but having looked at much of what they talk about, I do have to agree with a lot of the winners.  Some really good choices there. 

One of the neatest tools that I saw at the last computer show that I still use a bunch is the DiskOnKey device that I picked up. What I have is a 128mb flash memory device that has a USB connector on it. An easy size to use, it is less than 4 inches long and about an inch wide and half an inch thick. Since they are the creators, you need to pick one up from one of their partners like HP, IBM, and Iomega. Other companies making a similar product include Fujitsu, the Memorex USB Thumb Drive (256MB $90); Lexar Media has their USB JumpDrive Pro2.0 (256MB for $110, 1Gig $315). Which every you get, be sure you get the USB 2.0 version as if you have that on your computer, you will see a much higher throughput in your data transfer in and out. 

Want to know what Consumer Reports thinks is the best anti-spam software out there? Their August 2003 issue rates Stata Labs SAProxy as the top one to get. Best of all, it is free. It was the highest rated in scoring and effectiveness. www.bloomba.com.  

Industrial Design Excellence Awards 2003 (IDEA) 

The IDEA is a contest sponsored by Business Week magazine, www.businessweek.com and judged by the Industrial Designer Society of America and this year, they really picked an interesting bunch of products.  They select everything from the neatest and coolest new car, the BMW Mini Cooper, to a new Dutch Boy paint can, to naturally, a bunch of computer products. They gave out 122 medals out of a total of 1279 products. Logitech, www.Logitech.com walked away with six medals including the Logitech Pocket Digital Camera, a really slick $99 1.3 megapixel digital camera. Palm won with their Zire Handheld Computer and Apple with their Powerbook G4 17 inch notebook. Other computer products winning gold include Logitech’s Mobile Cordless and FlexLoop headsets for digital phones to IBM’s Thinkpad Exploration ergonomically designed line of notebook computers. Take a look at the site because you will see some really interesting products and designs for a really wide range of items. 

To look at all the winning entries, go to the IDEA web site at: http://www.idsa.org/whatis/seewhat/idea2003/idea2003.htm 


Robert Sanborn is an Independent Personal Computer Consultant and a contributing writer for PC Lifeline and contributing editor for the Indy PC News. Reach him through the net at indypcnews@indy.rr.com

Last Update:06/26/2007


Copyright © 1999 - 2012 PC Lifeline