Category: Network Management

Feature Article – Wiring a house for Ethernet

Introduction

There may be a question that may come up when you build your new home or do renovations on an existing home. This question is whether to wire you premises for Ethernet or not and how to go about it?

What is involved when you wire for Ethernet

When you wire a house for Ethernet, you are providing a high-speed data backbone for your premises. This is achieved by laying Category 5 or Category 6 wiring from most rooms to a central location where there is a “switch” that moves data around the network at the appropriate speeds for the network devices.

The reason that it makes sense to consider the home-network issue, especially wired-in Ethernet, is because an increasing number of households are using two or more computers. Infact, there is an increasing trend for households to have more computers than TV sets. As well, computers can and have now become entertainment centres for bedrooms and other small areas thanks to DVD drives, sound-card setups and radio and TV-tuner kits that install in or connect to PCs. There is also an increasing common practice to copy CDs to the computer’s hard drive so that these computers double as personal jukeboxes, which is an asset with small areas. This means that there is a desire to have access to resources like the Internet and printers from all the computers that are in the house.

Similarly, there is new interest in the so-called “home theatre PC” where a computer is being used as a primary media center for the household. This is being achieved through the computer being housed in a case that is optimised for living-room use by having reduced operating-noise output and looking like a piece of home-entertainment equipment. These computers run an operating system that is optimised for viewing from a distance and optimised to do home-entertainment duties, plus being hooked up to the main living-room TV and sound system. This concept permits activities like the use of network media receivers as “media extenders” where one can “take” audio or video content to be viewed or listened to in other rooms.

If you have networked your computer equipment by using a “no-new-wires” method like wireless or HomePlug powerline; you may be dealing with a network that isn’t working at its best. This is because the “no-new-wires” technologies work on having the “no-new-wires” segment’s bandwidth shared by all the devices that connect to the segment. This is exemplified by poor response time during a network multiplayer game hosted across the “no-new-wires” segment or slow transfer speed whenever a file is being transferred between two nodes on the same segment.

Typically, when you implement a “no-new-wires” network, you would use a broadband router that connects to an Ethernet segment and the “no-new-wires” segment on the LAN side, like one of the many wireless Internet gateway devices. Also, if you decide to add on extra network devices, you would have to buy extra network bridges so these devices can work as part of the network.The possibility of high-speed Ethernet being available for home-computer users is made real through high-performance Ethernet network-connectivity devices being made affordable and ubiquitous for most users.

For example, there are Ethernet adaptors available for installation in PCI or ISA-based computers, or for quick connection to “sealed-box” computers via the USB port, or the PCMCIA or CompactFlash card slot. As well, allof the game consoles that are capable of online gaming have an Ethernet socket either built-in or as an extra-cost user-installed system accessory. Let’s not forget that most devices that connect to a network for some part of their functionality would have an Ethernet connector on board or on a supplied network adaptor module. Also, most newer computers are being supplied with built-in Ethernet connection abilities as a standard feature and people who build their own computers are now able to base their projects on Ethernet-equipped motherboards.

As well, the switches that are required as part of an Ethernet network are now available at very cheap prices. This all ends up with the Category 5 Ethernet medium being considered as a lowest-common-denominator for network connectivity.

Why wire a house for Ethernet?

You will benefit from the high data throughput that Ethernet provides in its current form – 100 Mbps, with 1 Gbps (1000 Mbps) being available now at a slight premium for new and existing small Ethernet networks. This will benefit applications like Internet gaming, network media streaming such as Internet radio; as well as graphics-rich printing.

You also gain the advantage of reliable network behaviour because you are not regularly sharing data transports that are prone to interference. This is due to the way the common Ethernet network switches provide dedicated bandwidth to each port on them. They also scale data throughput to the highest speed available between the client and the network switch that the client is connected to. If different clients are moving data at different speeds, the switch implements a buffer so slower clients can benefit from the data while the data is off the faster clients’ minds very quickly.

As you may have known before when you have worked with the computer network at work, or with your Internet experience, the Ethernet infrastructure can carry lots of different data.

This wiring practice will get the best out of the killer applications for these home networks i.e.

  • Internet access from everywhere in the house;
  • PC or console-based network / Internet gaming;
  • Streamed media around the house using DLNA-compliant network-media equipment
  • Voice-over-Internet-Protocol telephony which is either being provided as part of a “triple-play” service or an alternative low-cost telephony service

amongst other activities as outlined below.

IP-TV / Video-on-demand and the “Triple-Play” goal

There is increased interest in delivering video content over the Internet and being able to view it on the large-screen lounge-room TV.

This is being facilitated on two different grounds – one being to provide content complementary to or an extension of what is offered by broadcast TV providers and the other is for telecommunications companies and Internet providers to distribute multi-channel pay-TV via the same Internet “pipe” as the telephone service and broadband Internet service.

The first situation is to provide “over-the-top” video service where the Internet “pipe” is used by another operator to distribute streamed or downloaded video content independent of the broadcasters. It manifests in the form of “download-to-view” video-content services like Netflix, CASPA and Hulu or “complementary cable services” which provide channel groups that may not interest the main cable-TV providers, such as wholesome family entertainment or overseas / expat content in the US.  Increasingly, network-enabled video products like games consoles, TVs and BD-Live Blu-Ray players are now using apps or extensions that support broadcaster “catch-up TV”, complementary-TV or video-on-demand platforms.

The second situation comes to  “IP-TV” where TV signals are transmitted via an IP-based Internet-capable network. This method is being pitched as a way of using DSL or fibre-optic-based next-generation-broadband to distribute Pay-TV signals to subscribers. This has become more so with the ISPs and telcos moving towards offering “single-pipe triple-play” services with regular telephony, Internet service and multi-channel pay-TV from the same entry point. It involves the provision of a set-top box (STB) or personal video recorder which plugs in to the router via an Ethernet cable.

As far as this application is concerned, a house that is wired for Ethernet is at an advantage for the “IP-TV” service. It benefits security of the conditional-access system because it is harder to unnoticeably “sniff” out conditional-access key values before they reach the STB; and there is high quality of service due to the nature of “switched Ethernet” where high bandwidth and low-latency is assured for full-screen video. Also there is the ability to extend the service either through a “portable” setup where the STB is relocated at will or through having extra STBs connected to secondary TV sets, this being a feature increasingly offered as a value-added option.

Extending or improving the wireless network

Two access points used to extend wireless-network coverage in older house

Improving wireless-network coverage in older house

By wiring your house for Ethernet, you are also laying an infrastructure that can definitely work “hand-in-glove” with wireless networking.

This is whether you have your home network based on a wireless backbone provisioned by a wireless router or you are starting from scratch with a wired backbone. If you were on an existing wireless network, you could set up your “fixed” nodes like desktop PCs to work on the Ethernet system.

This then leads to the wireless network being primarily of benefit to those devices that gain the most benefit from it i.e. portable or transportable nodes like laptops, PDAs and Web tablets.

You are also in a better position to improve your wireless network’s performance by implementing a practice that is performed in corporate, education or public wireless networks. This is to install one or more extra access points in areas where it is not possible to gain optimum reception from your primary wireless access point or wireless router using your existing portable nodes. All these access points are connected to the one wired-Ethernet infrastructure and set to similar network parameters so that the wireless client devices can seamlessly move between these access points depending on which one has the best signal strength. This is illustrated in the diagram above this text and discussed further in my article on improving your wireless network’s coverage.

This situation would mainly affect most pre-1950s brick houses with thick brick walls because such walls can easily attenuate the short-wavelength radio signal that wireless networks use. In some of these houses that have been recently extended, the wall that joins the extension to the main house is often a very thick one because it used to be the outside wall, and therefore becomes the point of attenuation for the short-wavelength wireless-network radio signals. The same situation can affect houses with chimneys that are on interior walls that adjoin rooms. In these houses, especially where there is a fireplace or the remnants thereof in both adjoining rooms, these walls are noticeably thick in order to accommodate the chimney and this situation can lead to poor wireless-network performance. It can also affect buildings that are insulated with foil-reflective

This practice of using two or more access points would also permit optimum coverage of large houses by allowing one to deploy an access point close to each end of the house.

In the same manner, you can use HomePlug powerline  networking to complement the Ethernet network by catering to those devices that can only use this technology. This is done using a HomePlug-Ethernet bridge. This functionality may be built in to those routers that support HomePlug, as well as Ethernet and/or wireless as a LAN medium.

The reason this is going to be necessary in the long term because some manufacturers may decide to make network-capable devices that use an “existing-connection” method of providing network connectivity in order to save on design and manufacture costs. This is because they don’t have to add extra sockets on the device’s PCB for Ethernet or write in Ethernet-adaptor support into the device’s firmware. As far as the user or installer is concerned, there is no need to worry about making sure that there is an Ethernet connection accessible to the device or even connect another cable to that device.

Whether you have one computer or many on your premises; or whether you have broadband Internet or dial-up, the improvement brought about by wiring for Ethernet will be seen as enhancing capital value for your premises. This may certainly pay dividends whenever you sell the house or rent it out at a later date, because of the concept of pervasive broadband Internet becoming a reality. This brings with it a desire to wire up multiple computers to a network in order to share the high-speed Internet connection.

The Ethernet infrastructure has now existed on the same feature level as an intruder-alarm system as far as most customers are concerned when considering their next home.

The best time to wire for Ethernet

The best time to do this kind of work is whenever you are doing works that are involving the house’s electrical system. This would involve rebuilding; refurbishing or extending the building or rewiring the building to comply with modern electrical-safety codes.

This will mean that you may prefer to employ electrical contractors who are competent with telecom and data wiring. These tradesmen will advertise their competence by listing job types like telephones, networks, security and similar work in their advertisements and on their vehicles.

If you have a regular maintenance “sparkie” who does your repairs or other ad-hoc work, he may be able to do this kind of work or know of tradesmen who can do this kind of work on an ad-hoc basis.The reason is that this wiring can be done at the same time as the electrical wiring that is involved in the project.

It comes in to its own if there is “rough-wiring” being done before the walls are plastered or panelled; which is common during building work. Then you just need to have any fitting-off of sockets done when the walls have been covered and decorated.

If the job is essentially a re-wire job, the same electricians who do that job can pull the Ethernet cable through the walls while they lay the new AC wiring. By having the work done at the same time as any other major electrical work, you are in a position to gain maximum value out of your tradesmen who charge by the man-hour.

If you are installing an alarm system or doing similar work where new electrical infrastructure is being laid, you could have the Ethernet wiring laid at this point. This works best if the tradesman that you engage is competent at all facets of infrastructure work and will do this as part of the job.How to go about it

Central location

You will need to choose a location for the network switch, which is where all the data that passes the network goes through. It should be out of the way but easily accessible and shouldn’t be too hot.

The places that would come to mind are any built-in storage cupboards like the broom cupboard, the linen press or a built-in wardrobe in one of the bedrooms. You may use a place like the attic or basement. As I have seen for an alarm-system installation, you may use the wall hidden by the laundry door when it is open as a central location for the network switch. Ideally you shouldn’t use a room which is used for any heat-generating systems like hot water tanks, boilers or furnaces.

Tight central location layout for Ethernet switch

What to avoid when working out the Ethernet-switch location

If you are wiring an existing house for Ethernet and the premises is equipped with a security system, it is a good idea to locate this switch in the same area as this system’s central box. This means that if you decide to upgrade the alarm system to a more sophisticated security / home-automation “hub” that has a network interface, you can connect this unit to the home network cheaply and easily. In most cases, this kind of upgrade can be done with the same system peripherals (PIR and other sensors, siren, strobe light) all intact and able to work with the new system. You may also have to be sure that you have enough space near the system’s central box and room at the power outlet to plug in another “wall-wart” power supply so you can install the Ethernet switch without reliability problems for the network and the alarm system.

It also allows you to establish an installation point for any devices that provide “back-end” functionality for the home like network-attached-storage devices. It then means that you can service all these devices by going to one location.

The network switch

As for the switch, you should purchase a dual-speed (10/100 Mbps) unit with more ports than there are rooms to wire. This allows you to add extra network points at a later date or connect network devices like Ethernet-powerline bridges, wireless access points, network-attached storage or home-automation equipment directly to the switch.

There are many three-speed Gigabit Ethernet switches that are being sold at an extra per-port premium over the common 10/100 Ethernet switches. These would mainly appeal to those users who intend to work with high-bandwidth video or similar applications. They also have to work with network adaptors that are capable of working at the Gigabit speed, some of which are now under the $100 mark for a basic PCI unit. They are still worth considering if you want to have a future-proof high-speed Ethernet infrastructure.

It is also worth being aware of and considering switches that work as Power-Over-Ethernet power sources. These units use the Ethernet wiring to provide power to suitably equipped network devices thus eliminating the need to run a power wire to these devices. This feature would be a boon for wireless access points and network CCTV cameras because it removes the need to make sure that there is a power outlet near these devices or risk them being “down” due to accidental power disconnection.

Rooms to wire

When wiring up for Ethernet, it is a good idea to provide a point in each bedroom as well as the kitchen, living room, dining room / family room and the study or home office. This means that you have covered every primary activity area in your home, thus permitting you to install network devices in each of these areas.

You may not think of wiring the living room for Ethernet but this room is where you will end up using networked entertainment equipment. Such equipment could range from network media clients that either are connected to or are part of the TV and stereo to present digital photos, digital video clips and music files through these devices; through the popular online-ready games consoles like the PlayStation 3 and the Xbox 360, to dedicated media servers that present media that is stored on them over the home network. As mentioned earlier, an increasing number of affordably-priced desktop computers that are being sold by main-street computer stores are being designed to look like and behave like home-entertainment equipment, in order to be considered acceptable in rooms other than the study or kid’s bedroom. For example, you could easily think that a few of the newer home computers like the MSI MegaPC systems (Figure 2) resemble some of those bookshelf music systems that are sold at department stores and discount electrical stores.

Another reason would be that one may want to use a laptop computer in the living room during winter if there is an open fire, pot-belly stove or a radiant-style heater. This is because when these heat sources are in use, they become the focal point of the house.

If you use an open-plan shared-purpose room like the kitchen / family room or living room / dining room, it may be a good idea to have a network point in each logical “room”. This will avoid the untidy look and safety hazard (to person, machine and irreplaceable items) of running long cords across the floor of these rooms.

When choosing the socket type for the room sockets, it is best practice to use a standard wall-mount socket for each of these sockets. You may be tempted to use a side-entry socket, which is similar to some TV aerial points that are commonly used in Australia or the older Telecom Australia telephone connector. The problem with using a side-entry socket is that you may experience difficulty plugging and unplugging the device from the socket especially if the cable has the cheaper crimped-on connector.

If the job is aesthetically sensitive, you may be able to find outlet plates that work with the aesthetics of the room where the sockets are installed. This is easy due to the use of standard wall fitting designs that permit manufacturers to supply a large variety of trim-plates or socket modules. This can be of importance to anyone who owns a period home and wants to keep the fittings in tune with the home’s period.

Broadband Internet

You will usually the network-Internet “edge” router, whether it is an ADSL router or a broadband router connected to a cable modem or similar broadband-technology device, either in the study, the home office or the main lounge area and will most likely have Ethernet-enabled devices located close to it. Here, you would connect one of the router’s Ethernet ports to the Ethernet installation while having the other sockets available for the other Ethernet-enabled devices like a games console, network-attached storage or network printer.

Multiple Points in one room

In some rooms like the kitchen or home office, you will need to be able to have more than one point in that room. This is because you will often end up with multiple devices in that same room.

Extra ports on the main switch

This method involves running extra wires from that room to where the main switch is located and using one of the vacant ports on that main switch. This may allow direct bandwidth being provided to the device that is connected to the port; and can therefore yield better performance for that device. This method also certainly comes in handy when the devices are spread around the room because the room has multiple activity locations such as open-plan living areas.

It would be more fault-tolerant due to the removal of another Ethernet switch that could be a point of failure for the network devices in that room.

Regional switch

This method requires all the network devices to be plugged in to a switch, which is uplinked to the network point that is in that room. This mainly works better for any setups where the devices exist in a cluster; such as a home entertainment centre or a home office / study room.

The only main problem is that if the switch is powered down, those devices lose network connectivity. This can be worsened by the way that “wall-wart” power supplies are often used for powering most switches, routers and other network-infrastructure devices. What this means is that these bulky power supplies can easily fall out of most power boards which have outlets that are spaced wide enough for ordinary plugs rather than these “wall-warts”.

This can be alleviated if there is use of Power Over Ethernet, which uses the same Ethernet cables to run low-voltage DC power to network devices. This avoids the need for power outlets to exist near Ethernet ports for devices like access points. The power is placed into the network via a powered switch or a midspan power injector and devices take the power off the network cables either via their own sockets or through a power splitter which connects to the device’s Ethernet socket and power socket.

The Power-Over-Ethernet setup has been assisted via the use of the IEEE 802.3af standard, which now means interoperability between different device manufacturers. As far as switches are concerned, this could mean that you could have a network-powered 5-port switch with “power forwarding”. This means that the switch can be powered via a network port from a Power Over Ethernet infrastructure rather than a “wall-wart”; and feeds power through at least one of its ports to a network device that is powered over the network.

It can also be alleviated if the switch is powered off its own outlet, which would be the case if it is hidden in a built-in cupboard. This also avoids the temptation for one to unplug the switch in order to run other appliances, which can lead to that part of the network being unexplainably down.

Expandable solution for built-in devices

Expansion loop - current situation

Expansion loop - current needs

One way to assure expandability for future network needs while saving costs on the current project is to create an “expansion loop” in areas where you may want to install built-in network devices. This could be easily done for an Ethernet point that covers the kitchen where you want to be able to install a built-in Internet terminal like the IceBox FlipScreen kitchen entertainment centre at a later date; while catering for existing needs. At the moment, these devices are equipped with an Ethernet socket as their broadband / network connection method. The same practice can also be done for rooms like the master bedroom or the living room where you think that you may add extra built-in network devices or network points at a later date.

By installing two Ethernet sockets in a cupboard such as the pantry or built-in wardrobe, you would achieve this ability to cater for this situation. One of the sockets is wired to a point that is in the main area, such as at the breakfast bar. The other is wired to the main Ethernet switch for the home network.

These sockets could be installed in a “three-gang” or “four-gang” faceplate with blanking panels on the unused panels. Then, in the meantime, a straight-through Ethernet patch cable is plugged into both sockets. This then means that you are able to connect any computers or other network devices to this socket that is in the main area.

When the time comes to add a built-in Internet terminal or similar network device, or add extra network sockets; you or an installer, runs a short run of Ethernet cable from the new device’s or new socket’s location to where the two Ethernet sockets are. Then, a socket is installed at the device’s location and another Ethernet socket is inserted in to the abovementioned multi-gang faceplate and these sockets are connected to the Ethernet cable run. You then use a 5-port switch to connect this device and the existing network socket to the existing network backbone. Here, the switch is uplinked to the main Ethernet switch while the existing Ethernet point and the new device are connected to other ports on the switch.

Expansion loop - satisfying a future networking need

Expansion loop - satisfying a future networking need

This solution, which is illustrated in the two images here can also permit other “back-end” network devices such as security and home-automation “hubs” to be installed in this cupboard. As well, other network devices such as network hard drives and Ethernet-“no-new-wires” bridges can he installed in this location. It could even allow one to run extra Ethernet points in this same area at a later date.

Conclusion

Once you consider the idea of wiring for Ethernet, you would certainly have prepared your house for the connected home future. As mentioned before, this act of wiring for Ethernet will be even considered as a capital improvement, which may add value to your house in the Internet age.

You will also avoid the need to think about extra wiring chores should you think of implementing network-based home automation in the future, especially when most “connected-home” equipment will use a standard Ethernet connection on it.

 

Criminal legal action now being taken concerning “scareware”

 Articles

Scareware Indictments Put Cybercriminals on Notice – Microsoft On The Issues

Swede charged in US over ‘scareware’ scheme | The Local (Sweden’s News in English) – Sweden

US-Behörden klagen Scareware-Betrüger an | Der Standard (Austria – German language)

From the horse’s mouth

FBI Press release

My comments

What is scareware

Scareware is a form of malware that presents itself as desktop security software. Typically this software uses a lot of emphasis on “flashing-up” of user-interface dialogs that mimic known desktop security programs, whether as add-on programs or functions that are integral to the operating system. They also put up dialogs requiring you to “register” or “activate” the software in a similar manner to most respected programs. This usually leads you to Web sites that require you to enter your credit-card number to pay for the program.

In reality, they are simply another form of Trojan Horse that is in a similar manner to the easy-to-write “fake login screen” Trojans that computer hackers have created in order to capture an administrator’s high-privilege login credentials. Some of the scareware is even written to take over the computer user’s interactive session, usually with processes that start when the computer starts, so as to “ring-fence” the user from vital system-control utilities like Task Manager, Control Panel or command-line options. In some cases, they also stop any executable files from running unless it is one of a narrow list of approved executable files. They are also known to nobble regular desktop anti-malware programs so that they don’t interfere with their nefarious activities. This behaviour outlined here is from observations that I had made over the last few weeks when I was trying to get a teenager’s computer that was infested with “scareware” back to normal operation.

Who ends up with this scareware on their computer

Typically the kind of user who will end up with such software on their computer would be consumers and small-business operators who are computer-naive or computer-illiterate and are most likely to respond to banner ads hawking “free anti-virus software”. They may not know which free consumer-grade anti-virus programs exist for their computing environment. In a similar context, they may have found their computer is operating below par and they have often heard advice that their computer is infested with viruses.

What you should do to avoid scareware and how should you handle an infestation

The proper steps to take to avoid your computer being infested with scareware is to make sure you are using reputable desktop security software on your computer. If you are strapped for cash, you should consider using AVG, Avast, Avira or Microsoft Security Essentials which have the links in the links column on the right of your screen when reading this article on the site.

If you have a computer that is already infected with this menace, it is a good idea to use another computer, whether on your home network or at your workplace, to download a “process-kill” utility like rkill.com to a USB memory key or CD-R and run this on the infected computer immediately after you log in. It may alos be worth visiting the “Bleeping Computer” resource site for further information regarding removing that particular scareware threat that is affecting your computer. This is because I have had very good experience with this site as a resource when I handled a computer that was infested with scareware.

If you are at a large workplace with a system administrator, ask them to prepare a “rescue CD” with the utilities from the “bleeping-computer” Web site or provide a link or “safe-site” option on your work-home laptop to this site so you can use this computer as a “reference” unit for finding out how to remove scareware from a computer on your home network.

How the criminal law fits in to this equation

The criminal law is now being used to target the “scareware” epidemic through the use of charges centred around fraud or deception. Like other criminal cases involving the online world, the situation will touch on legal situations where the offenders are resident in one or more differing countries and the victims are in the same or different other countries at the time of the offence.

This case could raise questions concerning different standards of proof concerning trans-national criminal offences as well as the point of trial for any such offences. 

Conclusion

Once you know what the “scareware” menace is, you are able to know that criminal-law measures are being used to tackle it and that you can recognise these threats and handle an infestation.

Disclaimer regarding ongoing criminal cases

This article pertains to an ongoing criminal-law action that is likely to go to trial. Nothing in this article is written to infer guilt on the accused parties who are innocent until proven guilty beyond reasonable doubt in a court of law. All comments are based either on previously-published material or my personal observations relevant to the facts commonly known.

Debunking the hysteria and paranoia about Google’s Street View Wi-Fi site surveys

Introduction

Over this last few weeks, there has been hysterical media and political activity in Europe and Australia concerning Google’s Street View activities. This activity has become focused on the collection of Wi-Fi network data by the Street Survey vehicles which grab the initial street images.

The hysteria focused on identifying details about Internet use and Wi-Fi devices that existed at individuals’ addresses and that this data could be used to spy on individuals.

The truth

Wi-Fi site surveys are a part of Wi-Fi networking life

The Wi-Fi site survey is associated with nefarious activities like wardriving but it is commonly practised as part of Wi-Fi network use.

When you want to connect to your Wi-Fi wireless network with a client device, you will come to a point in the device’s setup operation where you see a list of SSIDs, then you choose the SSID that you wish to connect to. This is an elementary form of a site survey.

This is extended to technology enthusiasts like myself who activate Wi-Fi network scanning functions on smartphones to see a list of wireless networks operating in the neighbourhood that they are in for curiosity’s sake. Here, we see the list of SSIDs and an icon beside each SSID that indicates whether the network is protected or not. The practice also extends to use of “Wi-Fi-finder” devices to look for open Wi-Fi networks.

Similarly, people who are optimising wireless networks will use software like inSSIDer (which I have reviewed) or HeatMapper for site surveys and wireless-network optimisation. This software can also yield information about the BSSID and operating channel for that particular SSID and more sophisticated versions can use spectrum analysers to determine interfering frequencies or determine the location using support for GPS modules.

This leads me to Navizon and Skyhook Wireless who have done these surveys in order to turn these beacons in to a location tool in a similar manner to GPS or mobile-phone-tower-based positioning. The most common application of this is the Apple iPhone platform which uses this information for locating the phone during setup, avoiding the need for users to determine their time zone or location.

What does my Wi-Fi network yield

A normally-setup wireless access point or router will send out a “beacon” with contains the following data:

  • SSID or ESSID which is the wireless network name
  • BSSID which is the MAC address for the access point’s radio transceiver. This MAC address does not have any relationship to the Ethernet MAC address or the broadband (WAN) interface’s MAC address on your wireless router.
  • Information required to determine security protocol to establish a successful conection

This data that is in this “beacon” is publicly available in a similar context to the information written on a vehicle’s registration label which would have the registration number (written on the number plates / license plates) and the VIN (vehicle identification number) for that vehicle.

It is also worth knowing that all access points and wireless routers have the option to turn off SSID broadcast. Here, you don’t have the SSID made available but have the network listed as a “hidden network” on some devices. This is something you can do in your router’s or access point’s Web-based management interface

When your network client devices are active in your wireless network and are “talking” to your wireless access point or router, they don’t broadcast an SSID or other beacon because they have “latched on” to that access point or router. This data will usually be encrypeted as part of the WPA security protocols that should be in place on your private wireless network.

Conclusion

Once you know how the Wi-Fi network works, you should then know that a site-survey operation should not gather the actual data that is moved across the network.

Product Review – MetaGeek inSSIDer Wireless Network Analyser

The program is a free download from the MetaGeek Website or other download directories like TuCOWS or CNet. There is another application from this same team that works with a 2.4GHz spectrum analyzer for use in determining interference on this band, but it comes at extra cost.

The installation routine didn’t take long when I installed it on a Dell Studio 15 laptop that was lent to me as a review sample. It could work with the standard Wi-Fi network card that came with this laptop and could therefore work with any Wi-Fi network adaptor that is used with the host computer.

The program provides a “dashboard” with three concurrent views:inssider-screen

  • a table which lists the Wi-Fi networks that the program can find with their SSID, BSSID (MAC address) and channel for each detected wireless network.
  • a signal-strength / time graph for all of the discovered Wi-Fi networks
  • a signal-strength / channel graph for all of the discovered Wi-Fi networks

As far as I am concerned, the highlight of this program is the signal-strength / channel graph which is useful for identifying channel clashes or blank channels that you can tune the wireless access point to.

One of the main limitations is that it doesn’t detect “extended service set” networks nor does it support detection of multi-SSID access points which become a wireless on-ramp for many networks.. This may be of concern when using this program to manage routers with “guest-network” functionality or managing hotspots. Another improvement that I would like to see would be to provide for network grouping by SSID or BSSID (MAC address) so you can identify “foreign” networks easily.This would then help in identifying rogue access points or “evil-twin” hotspots easily.

I would then determine it as being very useful for “tuning” a wireless access point or router so it can coexist with other Wi-Fi networks, either as part of setting one up or troubleshooting a network. I would also recommend it as an essential tool for hotspot owners who want to keep their hotspot networks operating in an optimum manner and providing good customer service. It can also work well in “smoking out” rogue access points or fake “evil-twin” hotspots.

Keeping sanity in your home network during periods of power unreliability

You may be in an area where the mains power cables are strung between poles and there are many trees alongside the cables, Similarly, your neighbourhood may use very old infrastructure for its mains power supply. As well, your electricity supply utility may be regularly engaging in “load-shedding” practices where it may reduce power to certain customers in order to avoid the need to generate extra power.

Sometimes, the premises that you are in may have very old electrical infrastructure that is undersized for modern needs and you may experience situations where the fuses blow too frequently. You may also have an appliance that is “on its last legs” so much so that it causes the fuses to blow or the circuit breaker or earth-leakage circuit breaker (safety switch) to trip when it is used.

In these situations, there is an increased likelihood of unreliable power and whenever the power comes back on, you may have problems getting your home network and Internet service up and running.

Equipment reset procedures

One task you may have to do every time the power comes back after a power cut or surge would be to reset the network-Internet “edge” equipment. If you have a modem integrated in to your router, like most ADSL setups, you may be able to get away with just powering down the router, waiting 10 seconds, then powering up the router.

On the other hand, if you have a cable modem, FTTH fibre-optic modem, DSL modem (including high-speed VDSL2 modems that are part of some next-generation broadband setups) or similar equipment connected to the broadband router via an Ethernet cable and powered by its own power supply, you may have to use a different procedure when resetting your network.

This is to avoid the common access-mismatch situation when you power both devices up at the same time. In this situation, the router attempts to gain network-availability information from the external modem while the external modem is trying to re-establish its link with the Internet service provider and it may not have that link established by the time the router needs it. This usually leads to the router using a “private network” or “Auto-IP” address as its broadband (WAN) address rather than the proper Internet service IP address.

You then reset your network using this procedure outlined below:

  1. Disconnect both the router and the external modem from the power
  2. Wait 10 seconds
  3. Connect the external modem to the power
  4. Wait for the external modem’s CABLE or other media-specific connection light to become stable
  5. Then wait for the “service” or “Internet” light to glow steady.
  6. Once that has happened, connect the router to the power
  7. Wait for the router’s “Internet”, “Broadband” or “WAN” light to become stable. You should then have a stable connection by then

Some installations such as certain FTTH installations may have a separate modem located outside the house and you may not be able to reset that unit. Here, you may just get away with just resetting your router by powering it down, waiting 10 seconds then powering it up again.

After this, you may have to restart or reset network-attached storage devices and other equipment in order to make sure they know where they are on the network and they make themselves known to the rest of the network. This also means that you may have to either reboot your computers that were on or force them to re-obtain their IP address from the broadband router.

Use of an uninterruptible power supply unit with your network equipment

It may be worth using an uninterruptible power supply with the network-Internet “edge” equipment to keep the equipment working properly in an environment known for an unstable power supply. You may get away with the lower-capacity UPS devices like the APC Back-UPS ES series if you intend to provide this kind of power to the network-Internet “edge” and, perhaps, a VoIP ATA or cordless phone base station. This would be an imperative where the household phone service is provided by a VoIP service like the many “n-boxes” (Livebox, Freebox, etc) in France, or the newly launched iiNet “Bob” base station in Australia.

It is also a good idea to connect a high-capacity UPS to your network-attached storage device if you run one on your network. This unit can make sure that the NAS unit is managed properly through the power outages to avoid data corruption and hard-disk damage. Here, you could perhaps use the same higher-capacity unit also to run the network-Internet “edge” equipment or run this equipment on a separate low-capacity UPS.

You may deploy a UPS for your computer, perhaps to provide a graceful shutdown when the power goes down. Here, you would still need the separate UPS for the network equipmentin order to avoid competition for the reserve power that may be needed for your computer or server to complete a proper shutdown if need be.

Conclusion

When you know how to properly manage your home network when the mains power becomes unstable, you will be able to assure long service life for your equipment and “keep your head on” when these times come around.

New UPnP standard for inter-network connection

UPnP Forum standard page – RemoteAccess:1

The UPnP Forum have this week released a Device Class Profile for setting up networks for inter-network operation and remote access. This is mainly to permit:

a) UPnP devices to work across multiple logical networks and

b) UPnP methods to be used for inter-network configuration

What is involved

The standard encompasses public-network-discovery mechanisms like STUN for determining the type of upstream NAT device in the Internet network and dynamic DNS for establishing the IP address for the main network’s fully-qualified Internet name. Some of these standards are implemented through VoIP setups to permit discovery of the VoIP network.

It also involves the establishment of secure VPN or DirectAccess (IPv6 over IPv4) tunnels between networks for this purpose. This doesn’t depend on a particular tunnelling method like PPTP, IPSec or SSL, but is more about establishing the tunnels between the networks.

There is also the establishment of UPnP “device relays” at each end of the tunnel so that UPnP entities (devices or services) in one network can be seen by similar entities in another network.

The standard also includes methods to permit replicated setup and teardown of devices and services between both networks. This would happen when the link is established or torn down or as UPnP devices come on line and go off line while the link is alive.

Abilities

The-access or client network can be a simple single-subnet private network such as a home network, small-business network or public-access network. Larger corporate networks can qualify if the firewall at the network’s edge doesn’t specifically exclude UPnP Remote Access.

The master network which the remote device is visiting must be a simple single-subnet private network such as a home network or small-business network. The remote access server can be part of the network-Internet “edge” device like the typical "VPN endpoint” router sold to small businesses or can be a separate piece or hardware or software existing on that same network. In the latter case, the server would have to work properly with a UPnP-compliant router (which most routers sold through the retail channel are) and obtain the network’s outside IP address and set up port-forward rules through that same device. 

The value of UPnP Remote Access with corporate networks needs to be assessed, both in the context of network security for high-value data as well as interaction with established VPN setups. This can also include issues like the “other” network gaining access to UPnP devices on the local network or particular devices or device classes being visible across the tunnel.

What needs to happen

This standard needs to permit the user to establish or simple yet secure credential-delivery method for VPNs that extend the small networks. This may involve implementing methods similar to either use of a PIN when pairing Bluetooth devices, “push-push” WPS –style configuration or, for “deploy then establish” setups, an email-based system similar to what is being used to confirm user intent when people sign up for Internet forums and social networks; or other similar practices.

The latter situation would appeal to setups where, at one end of the link, there isn’t likely to be a regular client computer in place, such as CCTV and telemetry applications or remote servers.

Compliant systems may also need to support two or more different methods to cater for whether the logical networks are in the same building or afar; or for whether the user prefers to deploy the equipment then configure it remotely or configure all the equipment at one location before deploying it.

Why would this technology end up being useful

One main reason for this development would be to extend the UPnP technologies to VoIP setups. This would then allow for home and small business to benefit from corporate-class telephony setups like tie-lines, common phone books, logical extensions and the like as well as easy-to-implement VoIP telephony.

Another application would be to enable access to existing UPnP devices in other locations. The common reason would be to benefit from multimedia content held at home from a hotel room or to synchronise such content between NAS boxes installed at home and a vacation property. Other applications that come to mind would include remote management of UPnP devices that are part of building control, safety and security such as central heating or alarm systems.

Parts of this standard may be implemented by router and remote-access software vendors as a way of establishing a “box-box” or “box-PC” VPN setup between two small networks like a home network and a small-office network. This could allow the small-business operator to benefit from the VPN setup that big businesses often benefit from, thus allowing for increased yet secure network flexibility.

Windows 7 – How it will benefit the small business and work-home laptop users

There have been some significant advances in Windows 7 that benefit the small business and the mobile laptop users. This includes people who use their computers for both their work use and home / community use.

Location Aware Printing for “work-home” laptops

If you run Windows 7 Professional or above on your laptop, this operating system has another feature to support the “work-home” laptop. It is in the form of “Location Aware Printing” where the default printer is determined based on which network the computer is connected to. The network can be determined by factors like the domain Windows is associated with, the SSID of a wireless network or the MAC of the Internet Gateway or DHCP Server that it gets its IP address from.

The printer can be a network printer that exists on the network like the HP OfficeJet at your workplace or your Epson WiFi-enabled all-in-one at home, a locally-connected printer like your Canon portable USB printer or a software-based virtual printer like your fax software’s “print-to-fax” function or “print-to-PDF” software.

At the moment, there isn’t ready support for handling location-aware printing in locations where there are many printers in the same facility, such as the typical workplace or educational institution with its many rooms.

Inherent support for mobile broadband services

Windows 7 has inherent support for 3G wireless broadband services thus eliminating the need to run operator-provided software to use the 3G modem. It also caters for laptops that have integrated 3G modems, which is a feature becoming more common with units that are supplied through mobile-phone outlets. In some cases, you may not need to install any software provided by the 3G provider to use wireless broadband Internet service.

This is similar to when Microsoft implemented Dial Up Networking in Windows 95 and users didn’t have to run any other software to get online with their dial-up Internet service.

Wi-Fi Wireless Flexibility for the business partner and hotspot surfer

Windows 7 has improved the Wi-Fi wireless infrastructure thus allowing a Wi-Fi equipped computer with an appropriate hardware driver for its wireless card to do more tricks. It can become a wireless-wireless LAN bridge which can allow for such things as running Wi-Fi devices that can’t go beyond regular WPA2-PSK authentication and don’t have an easy-to-use Web browser with networks that implement WPA2-Enterprise authentication at workplaces or Web-based authentication at hotspots. A good use for this could be for a business partner to take pictures with his Wi-Fi digital camera and upload them to his laptop or a site worker who wants to play his Roberts Stream 202 Internet radio at a wireless hotspot just by using his laptop (which will alert him to new work) as a gateway. It can also allow for “bonding” of multiple Wi-Fi signals for greater throughput, which can come in handy with multi-access-point networks.

Improved business network functionality

The Windows 7 Professional or Ultimate computer has improved business network functionality, which can come in handy with corporate or business-partner networks. One feature that I like is “network-specific” security that accounts for VPN and DirectAccess network setups. Here, you can set up a “domain-driven” business network profile for the VPN tunnel while you have a “private-network” security rule that applies to your home network or a “public-network” security rule that applies to public networks like wireless hotspots. This still allows business-driven network tools like system management tools or desktop-based MIS “dashboards” to operate “through the tunnel” with your computer being secure enough for the network you are in.

Speaking of DirectAccess, this is an improved IPv6-IPSec VPN replacement provided with Windows 7 Ultimate that does away with the need for extra weight associated with a lot of VPN software. The software sets up a separate IPv6 path to the DirectAccess server that your employer or business partner provides and makes the access to business resources more transparent. This function will require the use of a Windows Server 2008 R2 box installed at the workplace by your employer or IT contractor and your computer to run Windows 7 Ultimate.

Conclusion

This series of Windows 7 articles shows how your Windows-based computer and network can be improved when you deploy Windows 7.

Devices not associating with your Draytek router? Check for “compatibility modes”

I have tried to connect my Nokia N85 mobile phone and a Kogan Internet radio (which is on loan for an upcoming review) with a 2007-era Draytek VPN-endpoint router used as our household’s Internet “edge”. But what would happen is that I would supply the correct WPA-PSK passphrase and it would not admit the device. It would admit Apple MacOS X and iPhone equipment as well as Windows computers without a hitch. The problem was that the router was on a WEP-WPA compatibility mode which you may have set up for when not many embedded WiFi network clients supported WPA out-of-the-box.

A good idea would be to make sure your router operates in WPA security mode. This is to make sure all your WPA clients associate properly and quickly when you give them the WPA-PSK passphrase and your network is also secure to the full extent of the WPA standard.

The Wi-Fi Personal Area Network is getting closer

Blogs and News Articles

Wi-Fi Alliance Peers into the Future with Ad Hoc Replacement | Wi-Fi Net News

Wi-Fi Gets Even Better | Wi-Fi Planet

Wi-fi to get a whole lot better | BBC News – Technology

Wi-Fi Direct : un sérieux concurrent pour le Bluetooth | DegroupNews (France)

From the horse’s mouth

http://www.wi-fi.org/news_articles.php?f=media_news&news_id=909

My comments

A while ago, I had mentioned in my blog about Intel and Ozmo designing chipsets that support a Wi-Fi (802.11a/b/g/n) personal area network. As well, Microsoft had built support for this kind of activity in to Windows 7 so the operating system can manage these networks if the computer’s chipset has inherent support for this. Now, the Wi-Fi Alliance are defining the “Wi-Fi Direct” standard that allows the establishment of these personal-area networks. They have also said that the “Wi-Fi Direct” personal-area network can be catered for on some existing equipment through the use of a driver or firmware update downloaded from the manufacturer’s site.

Wi-Fi Personal-Area Network concept diagram

Wi-Fi Personal-Area Network concept diagram

A Wi-Fi personal-area network is based around a computer, typically a laptop general-purpose computer, providing a single low-power Wi-Fi service set for a small number of devices while being able to link with an existing Wi-Fi service set using the same Wi-Fi networking chipset. The computer is essentially acting as though it is a wireless router with a Wi-Fi backhaul.

One main near-term benefit of operating a Wi-Fi personal-area network is to use a Wi-Fi-enabled device that doesn’t have the full screen, keyboard and Web browser, like a digital camera or Internet radio at most wireless hotspots which typically require you to establish your session through a Web page. Similarly, you can do network-based activities like transfer files, make your music library available to your DLNA-capable media equipment or engage in multi-player multi-machine gaming while using a public Wi-Fi network like a wireless hotspot.

The main benefit of this method beyond using the classic “Ad-hoc” mode that is part of the 802.11a/b/g/n standards. The “ad-hoc” setup often provided poor security and was very unstable, especially if it was being used to transfer large amounts of data like files between colleagues’ laptop computers.

This technology has also been designed to suit all classes of network deployment, ranging from home and small-business networks to large corporation and government networks. The needs of a large corporation or government department with sensitive intellectual assets have been taken care of including the ability for the access points in these networks to detect Wi-Fi Direct networks and, where policy dictates, to shut down these networks. There is only one security fear that I have in that the technology could be used to create an “evil-twin” rogue access point at a wireless hotspot. The way I would mitigate this problem would be to limit the power of a Wi-Fi Direct network and give hotspots the ability to detect these networks. Further still, I would support the use of SSL-style verification mechanisms being part of the SSID beacons in enterprise and hotspot networks as mentioned in my article on keeping the WiFi public hotspot industry safe.

Some of the computing press see the technology as a competitor to Bluetooth especially when it comes to linking devices with general-purpose computers. This is although Bluetooth have established small-size low-power chipsets for integration into peripheral devices like headsets and mice. It may also be seen as a chance for companies to work on low-power small-size Wi-Fi radio chips for use in these kind of devices, which can also benefit devices that deal with Wi-Fi on a LAN perspective like Internet-enabled consumer electronics.

Also, if the pundits see that this technology is going to work for human-interface devices (keyboards, mice, remote controls, game controllers, etc) and similar applications, they need to have this concept developed and proven across an IP subnet. This is because Wi-Fi is simply being used as one of many physical network media for IP networks; and there haven’t been any device classes and application-layer protocols established for human-interface devices, sensors and similar applications to operate across these networks.

Once this technology is worked out properly, I would see Wi-Fi Direct being an enabler for network activities involving Internet-based consumer electronics or working alongside a colleague rather than being another wireless medium for keyboards and mice.

Feature Article – Understanding the 802.11n high-bandwidth wireless network

Introduction

Now that the 802.11n high-bandwidth wireless-network standard has been declared a final standard, the price of 802.11n-compatible wireless-network hardware will come down to more affordable levels. This will lead to you considering upgrading your wireless network to 802.11n whenever the time is right to renew your home-network IT hardware.

The 802.11n access point

This works in a different manner to the 802.11a/b/g access points we are so used to. Basically, these units use a “multiple in, multiple out” methodology with “front-end diversity”. They will typically have two or three aerials with each aerial serving a particular transceiver. Some units may have an aerial serving a receiver as well as the two aerials serving two transceivers. It is totally different from “antenna diversity” which is used on most 802.11b/g routers and access points, where one transceiver works with two aerials, choosing whichever has the best signal strength.

These access points and the network client devices that connect to them also make use of “constructive multipath” to improve their quality of reception.This is different from the “destructive multipath” often experienced with FM radio and analogue television. Here, signals picked up as reflected signals are mixed with signals received by line-of-sight and “worked out” as a data stream.

The premium-priced 802.11n access points will be typically dual-band in which they can work on the existing 2.4GHz band or the newer 5GHz band. Some of this equipment may be able to work on both bands, as though there are two access points in one box.

Access Point Types

Single Band

These access points use a single access point that is set up to work on one band, typically 2.4GHz, but some of them work on 5GHz as an “add-on” access point.

Dual Band, Single Radio

These access points are like a single-band access point but can be set by the user to work on either 2.4GHz or 5GHz, but not both of the bands.

Dual Band, Dual Radio

These access points, sometimes described as “simultaneous dual-band”, are effectively two 802.11n access points in one box with one working on 2.4GHz and the other working on 5GHz.

Access Point Operating Modes

Primary Operating Modes

A typical 802.11n access point can be configured to work in one of two primary operating modes – a “compatibility” mode or an “N-only” mode.

Compatibility Mode

This mode, known as Mixed Mode or G-compatible mode allows 802.11g wireless network hardware to work from the same access point alongside 802.11n equipment. The limitation with this mode is that the wireless network works to a “worst-case” scenario with throughput that doesn’t hit the standards for an 802.11n segment. You will still have the larger coverage and service reliability with the 802.11n equipment and this benefit may pass through to 802.11g equipment

N-only Mode

This mode allows the access point to work only with 802.11n equipment and gives the equipment full wireless throughput as well as the full reliability of the standard.

Wideband vs Standard Channels

802.11n access points can run their channels as either “standard” 20MHz channels or 40MHz wideband channels which can yield higher throughput. The wideband channels also make use of a “standard” channel as a “base” channel for the double-width channel.

The preferred method of operation is that a 2.4GHz access point works on “standard” channels and most such access points will be set to have this kind of behaviour by default. But you can run these access points on the wideband channels with the limitation of poorer compatibility with 802.11g devices. If you are running a 2,4GHz access point in a manner to be compatible with regular 802.11g devices, it would be a good idea to stick to “standard” channels. If you are running 5GHz access points, you can get away with using the wideband channels and I would prefer setting up a 5GHz 802.11n extended-service-set to work this way.

The number of streams a device can handle

An 802.11n wireless device will typically be rated as being a single-stream, dual-stream or multiple-stream device. This relates to how many streams of data the wireless device can handle. All Wireless-N (802.11n) access points and routers will typically be either a dual-stream type or a multiple-stream type in the case of premium devices. Similarly, laptops with integrated Wireless-N capability; and add-on Wireless-N products will typically be dual-stream devices.

The main class of devices that will handle only one stream will be primarily-battery-powered devices like smartphones, WiFi VoIP phones, and WiFi-enabled digital cameras / portable media players because the single-stream ability won’t be intensive on these devices’ internal battery resources. Similarly, the idea of a single-stream Wireless-N network interface will also appeal to applications where size or cost do matter.

Other points to know

Best practice with dual-band equipment

If you are running dual-band equipment, especially dual-band dual-radio equipment, it would be a good idea to use the 5GHz band as N-only mode, while 2.4GHz works as compatibility mode. If you are running dual-band single-radio equipment, you will need to use older 2.4GHz equipment to run an 802.11g service set with the dual-band single-radio equipment on 5GHz N-only mode.

Use of aftermarket antennas

You can use external aftermarket antennas (aerials) with 802.11n equipment as long as all of the antennas are of the same type. This may work well if you replace the omnidirectional whip aerials with stronger omnidirectional ones. Then you may have to space the aerials further apart for the front-end diversity to work properly The main difficulty you will have is using directional aerials, in which case you may need to look for directional aerials optimised for 802.11n setups.

As well, if you are running dual-band dual-radio equipment, you will have to use antennas that can work on the 2.4GHz and 5GHz bands rather than antennas optimised for the 2.4GHz bands.

Shaping your 802.11n wireless network – the ideal upgrade path for your wireless network

I will be talking of WiFi networks that work on a particular technology and with a unique SSID and security parameter set as an “extended-service-set”. This allows me to cover setups where there are multiple access points working with a particular configuration.

You may be tempted to construct a multiple-access-point extended-service-set with an 802.11g access point and an 802.11n access point working in “compatibility mode” connected by an Ethernet or HomePlug wired backbone. The simple answer is "don’t”. You will end up with your wireless network having reliability problems especially as devices roam between the different access points and switch operating modes.

The simple answer would be to run different extended-service-sets with at least one access point for each WiFi technology. They are set up with different ESSIDs (such as SSID for the G cloud and SSID-N for the N cloud) with the wireless stations choosing between the different ESSIDs. The only thing they can have that is common is the WPA security parameters, and a common wired backbone which can be Gigabit Ethernet or HomePlug AV.

This could be achieved through deploying an existing 802.11g router that is set up as an access point and working on “SSID-G” and one channel while a newer 802.11n router working as the Internet “edge” is set to “N-only: or “compatibility” mode in the case of a single-band 2.4GHz unit, and set to “SSID-N” and a different channel.

As you evolve your wireless network, you may want to work towards establishing a 2.4GHz 802.11n “compatibility-mode” extended-service-set and a 5GHz N-only extended-service-set. You then upgrade your portable computers to work with dual-band 802.11n network interfaces or add dual-band 802.11n network adaptors to your existing equipment. The 5GHz extended-service-set will come in handy for high-throughput activity like video streaming and related applications while the 2.4GHz extended service set can work well with voice applications, smartphones, Internet radio and similar applications where throughput doesn’t matter.

If you are upgrading a wireless hotspot to 802.11n, it would be preferable to make sure your hotspot’s extended-service-set is on the 2.4GHz band and operating in “compatibility” mode so that customers can still use their existing 802.11g hardware on the wireless hotspot.

Some issues may occur with dual-band networks where the 5GHz extended-service-set may not cover the same area as the 2.4GHz extended-service-set. This is because the 5GHz band is of a higher frequency and shorter wavelength than the 2.4GHz band and is best demonstrated by AM radio stations being receivable at a longer distance compared to FM radio stations. It can be rectified by deploying a dual-band single-radio access point working on the 5GHz band in to the 5GHz extended-service-set as an infill access point.

Conclusion

Once you understand the 802.11n wireless standard and what it can and cannot do, you can make sure that you get the best out of the new standard while gaining the maximum mileage out of the existing wireless-network hardware.