Category: Network Management

Cloud routers–the current hot feature for the home network

Increasingly every home-networking equipment vendor is pitching a mid-range or high-end router range that offers “cloud” abilities and features. This kind of feature was simply offered as a remote-access feature but is being marketed under the cloud term, used as a way to make their devices appear to look cool to the customers.

These features are more about simplifying the process of providing authorised users remote access to the control functionality and similar features on these devices and providing this kind of access to someone who is using a smartphone or tablet. It also extends to file access for those of us who connect an external hard disk to these devices to purpose them as network storage.

What benefits does this offer for the home network router

The key feature that is offered for these devices is the ability to allow you to manage them from any Internet connection. This may be about troubleshooting your connection or locking down the Internet connection for rarely-occupied premises like a holiday home or city apartment.

If you connect an external hard disk to your cloud-capable router, you would have the same remote-access functionality as a cloud-capable NAS. This means that you could put and get data while you are on the road using your regular or mobile computing device and an Internet connection.

Some vendors integrate an application-level gateway to their cloud-assisted network services like video surveillance as part of this cloud functionality. This allows you to gain access to these services from the same point of entry as you are provided for your router.

How is this achieved

Like the cloud NAS, this involves the vendor providing a dynamic DNS service to aid in discovery of your router along with the use of SSL and other technologies to create a secure path to your router’s management dashboard.

It is also assisted with a client-side app for the mobile computing platforms so as to provide an integrated operational experience for your smartphone or tablet. This caters for items like access to the notification list, use of the interface style that is distinctive for the platform as well as the ability to get and put files according to what the platform allows.

Vendors who offer other cloud-based services would provide an application-level gateway in the router that ties in with these services and the devices that benefit from them. This is to provide a tight and finished user experience across all of their devices on your network, and is a way to keep you “vendor-loyal”.

Current limitations with this setup and what can be done

As we head towards cloud-capable network devices and add more of these devices to our networks, we will end up with a situation where we have to remember multiple Web addresses and user logins for each of these destinations. The manufacturers like D-Link would exploit this by integrating the cloud functionality for all of their devices or, more likely, devices within certain product ranges so that a user comes in to one entry point to benefit from the cloud functionality for that manufacturer’s device universe.

But the reality is that most of us would create a heterogenous network with devices supplied by different manufacturers and of different product classes. Here, one would have to keep a list of usernames, passwords and Web entry points or install multiple apps on a mobile device to benefit from every device’s cloud functionality.

Similarly, a manufacturer would be interested in evolving their “cloud-side” part of the equation for newer products but could place older products at risk of being shut out. Here, they could maintain the same functionality by keeping the remote access functionality alive and passing stability and security improvements to those of us who maintain the older devices.

Of course, working on systems that are true to industry standards and specifications like TR-069 for remote management can allow for pure interoperability and a future-proof environment. It can also allow for increased flexibility and the ability for third parties to provide the “cloud router” services with their own functionality and branding.

AVM releases HomePlug AV500 access point that is ready for home automation

Article – in German language

Internet per Stromleitung: Anschluss der Powerline an Steckerleisten kann die Leistung beeinflussen | NetzwerkTotal.de

From the horse’s mouth

AVM

Product Page (German language)

My Comments

AVM, known for their premium Fritz!Box routers have launched their latest HomePlug AV500 wireless access point which is a device that I consider important for stone-built European country houses that are “Wi-Fi difficult”. This unit, known as the AVM FritzPowerLine 546E provides a Wi-Fi segment to the dual-stream 802.11n specification for the 2.4GHz band and supports WPS push-button client-device setup as has been talked about in this article concerning WPS in a multi-access-point network.

But it is also ready for the IPv6 home networks which are a reality for anyone using a recent high-end consumer or small-business router and will become common as more countries roll out next-generation broadband.

But the FritzPowerline 546E is one of the few HomePlug access points equipped with a filtered mains outlet which you can plug equipment in to. AVM takes this further by making this socket a switched socket which works with their home-automation software. For that matter, this function is manageable through the device’s Web user interface and provides not just instant remote “on-off” but a time-switch function.

What I see of this device is that it isn’t just like other HomePlug wireless access points but is offering more functionality in a different way. This is especially as the HomePlug powerline network is being considered very clearly in the UK and Europe as a viable no-new-wires network segment.

Firmware updates to be available to fix D-Link router vulnerability

Articles

D-Link to padlock router backdoor by Halloween | PC World Business

D-Link plans firmware update to disable backdoor | The Register

From the horse’s mouth

D-Link

Update On Router Security Issue

My Comments

Recently, the computer press was awash with articles pointing to an exploit in some of the popular D-Link routers. Here, this has a computer on the local network pushing through a malformed URL to the router’s Web management page to bypass the login screen for the router’s management dashboard. This is more vulnerable with improperly-setup Wi-Fi network segments hosted by these routers or computers on the local logical network that are loaded with malware that takes advantage of this vulnerability.

Now D-Link are working towards offering revised firmware that fixes the exploit for each of the router models that are affected by this issue and is releasing this on their product support pages.

But of course, it is important to make sure that the wireless network segment that is part of your home or small-business network is secure with WPA2-Personal security and a random passphrase along with an SSID that doesn’t reflect the make or model of the router. Similarly, it is good practice not to enable remote administrative access on these routers and confine administrative tasks to the local network only.

This is in addition to other good computer housekeeping practices like running anti-malware software on your regular computers and being careful what you click on.

For that matter, I would encourage people to keep the firmware on their routers or other network hardware up-to-date in the same way we would keep operating systems and application software up-to-date.

Feature Article–Setting up a new router

Introduction

Netgear DG834G ADSL2 wireless router

A router that is part of a full broadband service

One task that you will need to know how to do when you set up a small network for your home or business is to set up an Internet router. This may be done when you upgrade to a newer and better router, replace one that has failed or simply set up your new Internet service. You may also have to do this if you move premises and have to deal with a new Internet service provider or want to make sure that the Wi-Fi wireless network works properly.

In a lot of cases where you have a modem-router provided by your Internet Service Provider, you may find that the router is already setup for you or you may face a “wizard-driven” setup interface to help you through the setup routine.

Router Types

Broadband Router

This common type of router has an Ethernet connection and is designed to be connected to a broadband modem, typically provided by your broadband Internet service provider.

It is the type that will become increasingly relevant as more areas enable next-generation broadband and deliver the appropriate modems for the next-generation broadband technology because these will implement an Ethernet connection.

Modem Router

A modem router has an integrated broadband modem and connects directly to the broadband Internet service. This typically describes most equipment that is connected to an ADSL service or is supplied by an increasing number of residential Internet service providers.

Newer high-end modem routers may also have the ability to be connected to an external broadband modem. This is typically to cater for people who switch over to a cable Internet service or upgrade to next-generation broadband or businesses who want a highly-resilient broadband service.

Wireless Router

A router may be referred to as a “wireless router” if it is equipped with an integrated Wi-Fi wireless access point, which most of the routers sold to a lot of households are. These units may be a broadband router or a modem router as described above.

Login Parameters

A home network will typically have up to three sets of login credentials to take care of: the Device Management Password, the Internet Service credentials and the Wi-Fi Network parameters. Most consumer ISPs who supply the router for your network will prepare a card or other aide-memoire document which has these parameters on it and it is a good idea to write out a document that has these details when you set up your home network whether you were supplied with one of these cards in the first place or not.

Device Management Password

This set of credentials contains a device-determined user name and a password as the “keys” to the Web-based setup/management user interface for your router.

Internet Service credentials

This may be of importance to most ADSL services and some cable services, but they are the credentials that are determined by your Internet Service Provider when they provision (set up) your Internet service. They are not needed with most cable, mobile-broadband and next-generation Internet services.

These credentials, where applicable, are usually the same for the duration of your business relationship with your Internet service. Even if you relocate to another location serviced by the same Internet provider, these credentials will stay with you.

Wi-Fi network parameters

They represent the “Service Set ID” (SSID) which is your Wi-Fi network’s “call-sign”, and the WPA2-Personal passphrase for your home network’s Wi-Fi wireless segment if the network has one. They can be determined randomly when you first purchase your router or as part of an initial “WPS” setup routine.

Here, I would prefer to keep these credentials, especially the SSID and the WPA2-Personal passphrase constant even if you upgrade your router or set up a multiple-access-point “Extended Service Set”. If you relocate, you may choose to maintain these credentials or create new credentials for your new location.

The reason is that you avoid having to re-establish Wi-Fi connectivity to all of your portable devices if you upgrade or replace your router.

Primary Connection Classes

WAN connection

This connection, looked after by an integrated broadband modem and/or an Ethernet port that is marked “WAN” or “Internet” provides the link to a larger network that is typically your Internet service.

Multiple WAN connections

An increasing number of high-end routers, especially high-end ADSL modem routers provide two or three WAN connections. One is typically the ADSL modem or an Ethernet port while the other may be another Ethernet port for another modem or a USB peripheral port that allows you to connect a wireless-broadband modem. A lot of the routers that implement this feature will allow you to determine one of the four Ethernet ports as being a LAN port for the local network or an extra WAN connection.

Typically this is either to provide connection to a different medium like next-generation broadband, or you can use it to “gang” two or more Internet services together for increased bandwidth, load-balancing where certain data-transfer activities are sent one broadband connection while others are sent through the other broadband connection; or a fault-tolerant Internet connection where if one of the connections fails, the other connections come in to play.

LAN Connection

These connections represent the logical network or “subnet” that represents all the devices in the home network that want to benefit from the Internet connection and other network resources offered in this network.

This is represented by up to four Ethernet connections and, in most cases, a Wi-Fi wireless segment working at best to the 802.11n standard on either or both the 2.4GHz and 5GHz bands. Some newer high-performance units will work at best to the 802.11ac Wi-Fi standard on the 5GHz band.

Other LAN connections that some of the devices will offer include a USB network interface adaptor for a regular computer that doesn’t have network ability, or a HomePlug AV powerline network segment. The latter may be offered in the form of a power-supply module that integrates the HomePlug-Ethernet adaptor and is what most of the French ISPs are using for their triple-play Internet services.

Setting up your connection

Make sure your Internet access works first

When you set up your home network, use one device, preferably a regular desktop or laptop computer for the setup routine. Preferably the device should be connected to the router via a LAN Ethernet connection or Wi-Fi with “out-of-the-box” default parameters. Then you connect your broadband connection to the router, whether this involves connecting it to your broadband modem or connecting it to the DSL, cable or other service in the case of a modem router. Resist the temptation to tweak your router’s settings beyond what is actually required to achieve connection such as to harden security or improve network performance.

If your setup is based around a separate modem, switch on that modem and make sure that the SYNC and LINK lights are steady. The SYNC light or similar light indicates that the modem has effectively made a connection with the “head-end” of your service on a media level, while the LINK or INTERNET light indicates that it has established service with the provider on a logical level. Then switch on your router.

Log in to your router and visit the “WAN” or “Internet Connection” menu on the user interface. Here, set up the Internet service connections according to your service requirements. Most cable, fixed-wireless and next-generation broadband connections typically just require you to choose a DHCP connection as your connection type for residential services.

In the case of an ADSL service or other service that has login requirements, select the login or authentication method that your service uses and enter the Internet Service credentials that were determined as part of provisioning your Internet service.

You should see the “Internet” light glow steady and the “WAN” or “Internet Connection” details update with information like an IP address. This is the point of success and, to prove it, open a Webpage like a news portal in another tab or session (window) of your Web browser.

Wi-Fi wireless for best-case performance

Here, you need to set up your wireless-network segment for best-case performance.

If your router implements external antennas (aerials) such as the typical “rabbit’s ears”, make sure these are upright so they are not obfuscated by the unit itself or other computer equipment or metal furniture and fixtures. It may also be a better practice to place the router on top of a piece of furniture to assure proper Wi-Fi performance although this may not be aesthetically appealing.

The 2.4GHz band should be set for 802.11g/n or 802.11b/g/n operating mode so as to preserve compatibility with 802.11g devices but allow best performance with 802.11n devices using this band. This is because a lot of older and cheaper consumer-electronics devices use the 802.11g technology and this technology may be still used with portable devices like smartphones and tablets in order to economise on battery life.

The 5GHz band should be set for 802.11n operation because most of the devices that can work to the 5GHz band can work on the 802.11n standard.

Establishing a two-band wireless network

This leads me to talk about the dual-band wireless network which would be facilitated by most high-end performance-grade routers.

Here, I would use a separate SSID for each band. An easy way to go about this to have one band have the standard SSID while the other band has that SSID plus a band-specific prefix or suffix like BIGPOND2346 for the 2.4GHz band and BIGPOND2346-54G for the 5GHz band. This means that you can be sure which band to select from your laptop or other client device for better performance.

Choosing vacant Wi-Fi channels

You may have to select a vacant channel for your wireless network so as to avoid interfering with your neighbours’ wireless networks and to assure best performance for your network. Some routers may make this easy by implementing an auto-setup routine which looks for the channel with the least activity and tuning to that.

But you may have to use one of the many free Wi-Fi site survey tools like WiFi Analyzer for Android or MetaGeek’s inSSIDer for Windows to determine which channels are effectively vacant in your area. These programs provide a graphical view of SSIDs with relative signal strength on the 2.4GHz or 5GHz band so you can know which channels will offer greater performance.

Setting up for security

New passwords

The first job I would do with a new router after I have got the Internet connection going would be to change the device management password away from the default. This is important if manufacturers don’t assign device-management passwords that are unique to each device they sell. Here, I would determine a password that is easy to remember but hard for outsiders to guess and use some numbers and punctuation marks in the password.

As well, change the Wi-Fi network’s SSID away from the default SSID especially if it betrays the device’s brand like LINKSYS. It is important because if a device’s brand is guessed easily, hackers can take advantage of that brand’s or model’s security weaknesses to target your network.

If you are dealing with carrier-supplied equipment, you may find that the SSID may be something like the Internet service’s brand plus an apparently random number such as BIGPOND2346.

This may be a good time to personalise your Wi-Fi network such as to have it represent your business’s brand or the purpose of the network.

Most carrier-provided routers and some retail-provided routers will have a random WPA2-PSK passphrase that is unique to each unit and this will be stuck on a label attached to the underneath or back of the unit.

If your router implements WPS where it can determine the passphrase automatically, set the passphrase using the WPS push-button setup method by enrolling a Windows 7/8 laptop or Android mobile device to the network using this method. Then log in to your router’s Web user interface and go to the WPS option to set the option that “keeps” the WPS parameters the same when you use the WPS push-button setup method subsequently, then go to the wireless-network security parameters screen to record the randomly-determined passphrase for your network. This is important if you have to enroll Apple devices or other devices that don’t implement this setup method.

If you are dealing with a router that doesn’t implement WPS functionality, make up a WPA-PSK passphrase yourself and use some numbers and punctuation in that passphrase to make a secure passphrase. Record this on paper or a computer text file and transcribe it in to the router to keep a secure network.

As you change these passwords and Wi-Fi network parameters, keep a record of these details on paper in a secure place on your premises. This is useful if you have to reset your router due to network problems and reinstate network settings, you change Internet service or are setting up new Wi-Fi-capable equipment on your network.

Making sure UPnP works from the inside only

Most consumer and some small-business routers implement UPnP Internet Gateway Device functionality by default to simplify application-specific port-forwarding requirements. This is important especially for Skype, cloud-based device features and online gaming but some poorly-executed implementations have caused it to be deemed a security risk.

The main risk here is for UPnP IGD functionality to be accessible from the Internet rather than just the LAN (home network) side. This was aggravated due to Wi-Fi networks operating on manufacturer-default settings such as no passphrase or a manufacturer-default SSID and passphrase.

The risk has been mitigated through routers that are running firmware issued over the past few years as well as Wi-Fi segments that use “random-default” passphrases made easier with WPS and “random-default” SSIDs in the case of carrier-supplied hardware. But a good test to do is to visit the Rapid7 Website at this location: http://upnp-check.rapid7.com/results/91ca51deb4effcf7dcdda7f1b02571ef to make sure that you can’t use UPnP IGD functionality from the outside. If this test fails, it may be a good idea to update the firmware and/or disable UPnP functionality on the router if you aren’t using Skype, online games or similar applications.

Even if UPnP functionality is OK, it is a good idea to run a desktop firewall on your regular computers and the recent iterations of the Windows platform have this functionality integrated. This function is also integrated in to many newer desktop-security software packages which are infact worth installing on these computers. As for mobile and, increasingly, regular-computer platforms, read this article about app stores before you head on that app-store shopping spree.

IPv6

Some of you who are on an Internet Service Provider that supports IPv6 as well as having a recent high-end consumer router or small-business router equipped for IPv6 will find that you want to go to this path. This is supported in a dual-stack mode by the latest iterations of most regular and mobile operating systems and is being supported by most small-business network-capable printers.

To engage this operating mode if you know your ISP provides the functionality is a simple task. Here, you just select a checkbox on most IPv6-capable routers to enable the dual-stack IPv6 operation. This means that you have two logical networks on the same physical bearers – one with IPv6 operation and one with legacy IPv4 operation. Some of these ISPs also offer the routing between the networks so that data can reach the legacy single-stack IPv4 equipment.

What credentials you can keep constant

Upgrade or replace router,
Change Internet service – different connection type and hardware
Change Internet service – same connection type and hardware Relocate premises
– same device
Device Management Password Optional Yes Yes
Internet Service Credentials Yes No Yes if taking same service with you
Wireless Network SSID Yes Yes Optional
WPA2-Personal Passphrase Yes Yes Yes

I have prepared a “download-to-print” A4 sheet which you can print out and fill in with your router password and Wi-Fi network details. Here, you then keep this with your paper files as a reference if you need to modify your router’s settings or add equipment to your network’s wireless segment.

Conclusion

Once you have your router set up in an optimum manner, you can expect many years out of this device working as an “edge” to your network. Here, you could expect your router to last around three to five years serving as this “edge”.

Taking the integrated access point practice further with Wi-Fi-capable client devices

Marantz Audio Consolette speaker dock

Marantz Audio Consolette speaker dock – an example of a device that uses an access point for initial network setup

An increasing number of consumer-electronics and small-business devices that don’t have a large screen are repurposing their integrated Wi-Fi functionality as an access point as part of the setup routine. This is used alongside an integrated Web server and is mainly for when the devices are being integrated with a Wi-Fi network that doesn’t implement WPS one-touch setup.

But a lot of these devices also implement an Ethernet wired-network connection for use when there isn’t reliable Wi-Fi wireless-network connectivity. This function is used primarily as a product differentiator for the consumer printers but is common on a lot of “big-set” consumer AV equipment. This concept can be taken further in one of a few ways in order so that the Wi-Fi wireless network ability in these devices doesn’t go to waste, especially when the device is connected to a wired (Ethernet or HomePlug AV powerline) network segment.

Setups

Separate Wi-Fi logical network

One of these devices, typically a wireless speaker or printer, could implement a logical network that just serves the access point and run its own DHCP server. This could come in to its own where you just want the device to provide its function to portable devices in a walk-up manner but you don’t want the portable devices wandering on to the Ethernet-connected network or Internet service.

This may be a situation with a wireless speaker or a network printer where you want to allow the device to gain access to Internet and network resources or allow other network devices to have access to the device. But you don’t want people who use the device in a “walk-up” manner with unauthorised devices to maraud around the network or use the Internet bandwidth, which is something of concern with business users with larger networks.

Some of the wireless speakers like what Pioneer offers follow this pattern by working as their own networks so as to create an ad-hoc setup to get the tunes going in environments where a small Wi-Fi network segment isn’t in service. Pioneer achieves this through a switch on the back of the speaker which enables this mode specifically rather than for setup and this method could be exploited by other device manufacturers through a “permanent setup mode” where the speaker doesn’t stay in the setup mode if it succeeds in connecting to a wireless network.

Access Point

On the other hand, you could have the Wi-Fi functionality that is normally dormant when the device is connected to the wired network, become a simple access point. Here, this setup could come in to its own if the device is being used in an area where Wi-Fi wireless reception for your network is very difficult.

One classic example could be a smart TV that is installed in a secondary lounge area but this lounge area is out of reach of the main wireless router. Here, the Wi-Fi-capable smart TV can serve as an access point for the secondary lounge area and neighbouring rooms even while it is on standby.

This kind of setup could be simplified with a WPS-based “Wi-Fi Clone” function so you could switch to the access-point mode even if the device worked initially with the Wi-Fi segment. On the other hand, a device like a business-grade network printer could implement WPA2-Enterprise access point functionality in order to work with business-grade wireless networks.

As well, this functionality could be simplified by the device detecting the connection to an Ethernet network and asking the user if they want to operate it as an access point if the device was previously connected to a wireless network.

Wireless Client Bridge

In a similar context, the Wi-Fi and Ethernet network interfaces that these devices have could permit the device to become a wireless client bridge for an Ethernet-based device or segment. This would be of an advantage if the device is picking up a reliable strong signal from your Wi-FI network.

The classic use of this would be to provide network connectivity to a games console or Blu-Ray player from a Wi-Fi-enabled smart TV working with an existing Wi-Fi wireless network. Similarly a desktop computer in a remote room could work with the integrated Wi-Fi ability in a network printer for its network connectivity.

Simplifying the Setup Experience

The setup experience could be set up with the use of WPS-assisted “setup copy” routines and vacant-channel-seek routines for network integration. For “standalone segment” setups, the device could implement setup routines that are similar to carrier-provided wireless routers like SSID / passphrase stickers or cards.

This can be augmented through the use of nVoy technology which is intended to make the configuration and operation of small networks simpler yet giving these networks the ability to be like a big network.

Business-grade setup could involve support for WPA2-Enterprise functionality and multiple-SSID / VLAN functionality that are part of larger networks. This would be more relevant for printers or other devices that small business could take advantage of. It can be assisted with a technology similar to the original Windows Connect Now USB technology where parameters are transferred between devices using a USB flash drive.

Similarly the above technology could work hand in glove with Wi-Fi Passpoint technology in order to support the simple-yet-secure hotspot login technology that the Wi-Fi Alliance have proposed. This can work through the devices linking back to access controllers that implement this technology.

Conclusion

Manufacturers could take the concept of the integrated access point that is part of their network-capable devices and make sure that they don’t go to waste when these devices are connected to a wired network. Similarly, they could make sure that the wired network functionality doesn’t go to waste if a wireless link is exploited for network connectivity.

A HomePlug access point that works on both the Wi-Fi bands available from Solwise

Article – From the horse’s mouth

Solwise

Value – Aztech HomePlug AV with Dual Band WiFi – PL-HL117EW

My Comments

We are seeing a lot more of the Wi-Fi access points that use the HomePlug AV powerline-network technology as a backbone but these typically work on the 2.4GHz waveband, now using 802.11g/n technology.

But Aztech have released a HomePlug wireless access point that works on both the 2.4GHz and 5GHz bands rather than just the 2.4GHz band. The Aztech PL-117EW uses a HomePlug AV500 powerline network segment or an Ethernet segment as its backbone, so can be used for a “wired-for-Ethernet” house with the ability to create a HomePlug AV500 segment as well as being an access point.

It satisfies the reality that a home network will be needing the 5GHz 802.11n wireless network segment everywhere especially as the 2.4GHz band becomes more congested. There is the SimpleConnect “push-button” setup for the HomePlug segment as well as a WPS push-button setup for enrolling new Wi-Fi clients close to it. As far as I know, it misses out on the simple “Wi-Fi clone” function which aids setting it up as a secondary access point.

What I see of this is the idea of using the “wired no-new-wires” network that is HomePlug AV as a backbone for extending wireless-network coverage hasn’t died off and is appealing to the UK market as a valid home-network setup option in the face of the cheaper wireless-network range extenders. This device underscores this reality by extending it to the 5GHz Wi-Fi band.

2.4 GHz networking is five feet under with 802.11ac | Wi-Fi Alliance

Article – From the horse’s mouth

Wi-Fi Alliance

2.4 GHz networking is five feet under with 802.11ac | Wi-Fi Alliance

My Comments

The comments raised by the Wi-Fi Alliance about the fact that 2.4GHz-based Wi-Fi networking technology being a nearly-dead technology is something that I find a bit “too quick” at the moment.

One key issue is that there is still a significant number of Wi-Fi client-side and access-point-side devices which only work on the 2.4GHz band using 802.11b/g/n protocols in circulation. This is more so with mobile devices and specific-purpose devices like consumer AV where an upgrade to a 5GHz technology would be costly if not impossible.

In some situations, the 2.4 GHz band with the longer wavelength compared to 5GHz may be at an advantage when it comes to the longer-wavelength bands and frequencies offering better coverage. This may allow for fewer 2.4GHz access points to cover a space.

So if I was to create a upgrade a Wi-Fi segement, I would look towards implementing a simultaneous dual-band setup which works to 802.11n or 802.11ac on the 5GHz band and 802.11n on the 2.4GHz band. As well, I would prefer to buy or specify devices, especially laptops, tablets and smartphones that use dual band Wi-Fi technology.

As for configuring the networks, the 2.4GHz band would be working as 802.11g/n compatibility mode while the 5GHz band would be at 802.11n or 802.11n/ac compatibility mode. This is to assure greatest compatibility with most of the existing devices that are to work with the network.

At last a HomePlug wireless access point that simplifies the wireless network extension process

Article – From the horse’s mouth

TP-Link

TL-WPA4220 – Welcome to TP-LINK (Product Page)

My Comments

One main reason most of us would buy a HomePlug-based wireless access point is to extend the coverage of that Wi-Fi wireless network past that radio obstacle like the double-brick interior wall without needing to pull new cabling. Or you don’t want to butcher your garden or dig up your lawn so you can reliably extend your home network with its Wi-Fi wireless segment to that garage or bungalow.

But a setup hurdle that one can easily end up with is copying the SSID (wireless network name) and network security parameters from your existing wireless router to the access point and making sure these are accurately copied so you can have proper roaming operation for your wireless network.

TP-Link have made this simple through the use of a “Wi-Fi Clone” button on the TL-WPA4220 access point. Here, this access point uses the WPS-PBC “push-button” setup routine to learn the parameters associated with your small wireless network segment.

This procedure has to be performed with this HomePlug access point in good Wi-Fi range of a router or access point that implements WPS push-button setup.You push the WPS button on your suitably-equipped wireless router as if to enrol a new device to your home network, then push the “Wi-Fi Clone” button to complete the procedure. This means that the access point has what is needed to be part of the Extended Service Set which is you home network’s Wi-Fi segment.

From that point on, you just simply establish that HomePlug AV powerline segment as the backbone for your wireless network and benefit from the increased coverage. But I would personally have this access point equipped with the WPS client setup mode for enrolling client devices close to it to avoid the need to traipse back to your wireless router to enrol that Android smartphone or Internet radio that is to be used in the remote area.

What I see of this is that steps have been taken in the right path to move away from the so-caled “range extenders” towards a more reliable and proven method of extending a wireless network’s coverage by simplifying the tasks required for achieving this goal.

Samsung’s Knox security platform available to consumers and small business

Article

Samsung opens up Knox security platform to all consumers

From the horse’s mouth

Samsung

Product Page

Lookout

Press Release

Product Page

My Comments

With the increased trend for BYOD and smartphone/tablet-based computing, there has been the call for mobile device management and mobile application management in order to achieve the goal of corporate data security.

Typically the solutions that are being offered out there are very costly and require an in-house information-technology team to manage them. This also includes the requirement to implement corporate messaging systems like Microsoft Exchange ActiveDirectory and use them as data hubs for these systems. This kind of situation may not appeal to personal users who value the security of their personal data. Nor does it work well for small organisations where one person is effectively the “chief cook and bottle-washer” for that organisation. You may be lucky to benefit from this technology if you deal with an IT value-added reseller that works with these systems and pitches them to these organisations.

But the security realities are still the same, especially with personal data or if your business hub is your briefcase, a corner of a room at home, a small office, or a small shop.

Here, Samsung has opened up the Knox security platform for their Galaxy-based Android mobile devices in a manner that makes the platform available to everyone by partnering with Lookout . It implements sandboxing so you can corral private data and have it treated more securely compared to other data. This includes allowing applications that you pre-approve to touch that data and limit what they can do to the data. For larger business setups, it could allow business data to be “wiped off” the smartphone when a user leaves the business without personal data being affected, but this context could be implemented when a smartphone is being retired from active service or you effectively “hand the keys over” to someone else as, per se, part of selling your business.

One question that may need to be asked is whether this solution may allow many data corrals so you as a small-business operator or professional have greater control over data such as intellectual property that pertains to different contracts or a person who has business work but also does volunteer work for a charity.

At least Samsung have taken the step to offer enterprise-desired security solutions to the “rest of us” rather than fencing it off for the “big end of town” and is something that could be encouraged for data security or similar application classes.

A “homeplug” with Power Over Ethernet now for the British market

Article – from the horse’s mouth

Solwise

Value – Solwise HomePlug 500AV with Power over Ethernet – PL-500AV-POE (Product link)

Previous coverage of similar devices

At last HomePlug AV and Power-Over-Ethernet in one device

My Comments

Previously, I had written an article on this site about Asoka releasing a HomePlug AV-Ethernet bridge that provides power to connected devices using the 802.3af Power-Over-Ethernet technology. This adaptor, which is available to fit US power sockets, can use the one Ethernet cable to power an access point, VoIP telephone, IP camera or similar device as well as being a data conduit to that device.

Now Solwise in England have raised the ante with this class of device when they offered one that plugs in to UK power outlets and sold to the UK market. Here, the PL-500AV-POE implements the HomePlug AV500 technology rather than the HomePlug AV technology on the powerline network side of the equation. If the HomePlug segment is based around HomePlug AV500 hardware, it could lead to higher data throughput speeds which would benefit high-resolution IP surveillance cameras or 802.11n access points.

The same company ask GBP£59.80 including VAT for this device but they are not short on Ethernet devices that can be powered from this “homeplug”. Here, they have a single-band 802.11g/n dual-stream access point that looks like a smoke detector for GBP£73.25 or a dual-band dual-stream 802.11a/g/n access point for GBP£189.14. There is also a basic “dome” IP camera for GBP£144.02 or a traditional-style auto-zoom camera for GBP£167.17 for a country that places emphasis on video-surveillance.

What I see of this is that at least some more manufacturers are raising the game for HomePlug powerline devices that integrate 802.3af or 802.3at Power-Over-Ethernet technology in a way as to underscore the fact that the powerline network and the Power-Over-Ethernet technology complement each other rather than exist as competing technologies.