Tag: WiFi wireless

IEEE P1905–A standard to make the heterogenous small network easy to manage

Articles

HomePlug® Powerline Alliance Announces Support for IEEE P1905 Convergent Digital Home Network Standard – HomePlug Powerline Alliance

IEEE P1905 Standard page

My Comments

Realities

More home networks implementing two or more media backbones

As the typical home network evolves, there will be a time when another interface type will be implemented in that network.

There are two examples of this common situation. One is where a person who has run an Ethernet network from the network-Internet edge to their computer decides to “go wireless” with their laptop computers and upgrades to a wireless router yet maintains the Ethernet connection for desktop computers. Another example that is increasingly common in Europe and will become so with the prevalence of IP-delivered TV would be a household that has a Wi-Fi network for the laptop but implements a HomePlug powerline network to serve the set-top box or IP-enabled TV in the lounge.

Infact I have advocated these kinds of network setups in this site in order to encourage a flexible home or small-business network that suits all situations that are thrown at it. This includes handling radio-difficult environments like double-brick walls or foil-lined insulation that can exist in many houses.

Network endpoint devices with multiple network interfaces

An increasing number of network-endpoint devices like computers, printers and Internet media devices are being required to support multiple types of network interfaces. This may be provided out of the box; or the user may have to install a hardware network adaptor for a particular network interface in to the device even though the device has an integrated network adaptor for another interface.

A very common example that I have seen for myself is laptop users switching between a wired Ethernet connection and a Wi-Fi wireless connection. Typically the laptop user who is getting used to the “New Computing Environment” and what it offers will plug their computer into the router’s Ethernet socket while they work at their desk; then disconnect from the Ethernet socket and “go wireless” when they want to use the laptop in other parts of the house. This typically can cause problems due to network storms or switchover problems; and often requires the user to disable or enable Wi-Fi on the laptop as they change connections.

Similarly, most of the network-enabled multifunction printers that I have reviewed at HomeNetworking01.info are equipped with an Ethernet socket as well as an integrated WPA2-secured Wi-Fi interface. This is becoming very common with most network-enabled media players, especially “smart TVs” and BD-Live Blu-Ray players.

Setup and management difficulties with these networks

These networks can yield their fair share of difficulties as users have to set up each network segment or device for secure reliable operation. This can include initial provisioning needs that a media type has like SSID and WPA-PSK security keys for Wi-Fi segments to management of segment-specific problems like Wi-Fi reception issues.

It will become more difficult as advanced networking requirements such as quality-of-service, synchronous media streaming, multiple logical networks and robust security are required out of these small heterogenous networks.

In the case of the devices, it will include making sure that the device works with the best network interface available even if both interfaces are physically connected. The most common example of this is making sure that the Wi-Fi-enabled laptop or printer works on a wired link if connected to the network via that link and works with the Wi-Fi link in other cases without the need for a manual switchover procedure.

What is this new standard intending to provide

You may think that there are standards out there to help with managing a computer network but most of these standards work to a particular network media type. As well, a lot of them require management by an IT team, something which few households or small businesses can have on hand all the time.

One major benefit is simplified media-level control across different media types on the same network. This isn’t achieved through the use of higher-level configuration routines managed by IP or application-level protocols like SNMP or UPnP, but these protocols can be adapted for this standard.

There will also be a focus on end-to-end performance such as allowing a device to choose the network interface that provides best throughput and quality-of-service. It can also allow “end-to-end” quality-of-service to be achieved from the network-Internet “edge” to the end device for IP telephony, multimedia streaming or Internet gaming.

Similarly, there is the ability to manage the media-level network security and energy-management needs that are required for the network in an easier form. This includes coordinating device wakeup across different media types so that a device can exist in an energy-saving quiescent mode yet “come to” when someone else on the network need it no matter how it is connected.

This standard recognises the reality that no one network type suits all needs, different horses for different courses.

Here, a typical setup may use Cat5 Ethernet as a high-speed backbone between floors or across the house, a HomePlug AV segment as a high-reliability wired “no-new-wires” setup for temporary applications and a Wi-Fi wireless segment that is primarily for portable devices.

The main focus that will be achieved is that bridge or switch devices that work across the multiple media types can perform these jobs more efficiently without needing to use higher-level protocols to achieve this goal; and be assured that the requirements for the network data are met as the data travels these devices.

Unanswered questions

Support for and management of VLAN networks

An unanswered question about this standard is whether it can support a VLAN network. This is a network that hosts multiple logical networks across the same physical infrastructure. It would be relevant in the small network space for “guest / hotspot networks” and IPTV setups where end-to-end content protection is required.

Features that may be considered of importance in this regard include replicating VLAN setups across the network as infrastructure devices are added to the network. An example of this could b to use an extension access point to “build out” a Wi-Fi network yet maintain the “guest network” and the “private network” as separate entities with separate SSIDs.

It also includes multi-tenancy-building environments where there is common “LAN” network infrastructure like cable runs that exist to interlink units (apartments, shops, offices, etc) or multi-SSID access points installed to service common areas (common gardens, swimming pools, food courts, etc). Here, it would be required to establish a VLAN interlink between two or more premises under the control of the same entity or establish a link to a common multi-SSID access point with the same SSID and security parameters as your main access point.

Wi-Fi devices and their operating mode

Another questiom that may affect the management of Wi-Fi devices is what kind of operating mode the device should be in. This is whether it is a client device or an access point; or to implement “direct link” or WDS or newer-standard network repeater functionality.

This would cater for an increasing number of “multi-function” access points which was a trend brought about by newer firmware versions for the Linksys WAP54G wireless access point. Here, the access point could be set up to be on the end of a direct wireless link, or be a client bridge for an existing Wi-Fi segment, a Wi-Fi repeater as well as being an access point.

This standard could provide support for a wireless endpoint such as a "multi-function” access point or the Wi-Fi functionality in a printer or other device to work as a client device or as an access point. It could then allow for these devices to quickly serve as infill access points when they are connected to a wired backbone after working on the Wi-Fi network.

Conclusion

At least the IEEE P1905 standard will make some effort towards making the establishment, management and development of the typical heterogenous small network become an easier talsk that is less painful.

My comments on the WiFi “universal range extenders” like the Netgear WN3000RP

Product Page

Netgear WN3000RP

My Comments

There has been some increased Internet publicity about Netgear’s WN3000RP “universal range extender” which is intended to extend Wi-Fi coverage in to a network’s dead spot. Devices like this one are billed as being able to work with any 2.4GHz Wi-Fi network segment such as an ISP-supplied “Internet-network edge” wireless router.

But these devices work in a particular manner that may cause problems with network use. Here, they work as a wireless client bridge to the existing network and set themselves up as a Wi-Fi access point that is its own “extended service set” or Wi-Fi network segment. Most of these devices will typically have an Ethernet connection for use with Ethernet-ended network devices like PCs, network printers or games consoles and work as a Wi-Fi client bridge for these devices.

What can go wrong

Positioning in the wireless network

There is infact a lot that can go wrong in setting up and using these devices. One issue is how the device is positioned in the master wireless segment that is to be extended. You have to locate these devices just off the fringe of that wireless segment in order to avoid unreliable service from the client devices on both network segments. Usually, you would have to keep an eye on two indicator lights – one which shows reception quality relative to the master wireless segment and one which shows the quality of the wireless segment created by the device.

Operation of Wi-Fi client devices

As well, users will need to make sure that their laptop computers, smartphones or other devices point to the SSID associated with the range extender. In the case of the Netgear device that is set up using WPS to the “master segment”, the SSID will be a combination of “master_segment_SSID” + “_EXT”; like “BIGPOND-1234_EXT” for a hypothetical Telstra-supplied Wi-Fi router whose SSID is “BIGPOND-1234”. Of course, the WPA security parameters will be the same as that for the “master segment”. It may also require users to make sure their devices “latch on” to the SSID that is strongest for the area they are in; which may be a problem with laptop computers running some desktop operating systems; or some network devices like some Internet radios.

Bandwidth availability and advanced Wi-Fi setups

Another factor that is also worth considering is that the data bandwidth available in this newly-created segment will be smaller that that available in the master segment due to the device working from a weaker point of the master segment. Of course, never expect these devices to offer advanced network behaviour like client isolation for use with hotspots or support for multi-SSID access points for example. With the latter example, these devices will only work with one of the SSIDs available from these access points.

WPS network setup

A key point of confusion that can occur with Netgear’s wireless range extenders is the way the WPS “push-to-connect” function works. These devices have one WPS button on their control surface, which handles associating with the “master segment” or associating with a client device on its own segment. When you set up the range-extender for the first time with a WPS-enabled access point or router on the master segment, you are meant to press this button on this range extender to start the WPS cycle then press the button on the WPS-enabled access point to complete the process. Then you enroll a WPS-capable client device on this range extender’s segment by starting the WPS-configuration process on that device then pressing the WPS button on this range extender. What can happen is that a person who is enrolling the client device could press the button on the range extender before starting the WPS-setup process on the client and this could make the device assume it is connecting to another master segment rather than enrolling the new client.

What could be done to make these devices better

Firmware that suits multi-function operation

Of course the current firmware with these devices prohibits using them as a “pure” Wi-Fi access point with a wired backbone to the network. This is although they work properly as an access point for the new segment with the Wi-Fi “master segment” as their backbone. Rather, I would prefer that these devices have a “multi-function” firmware in place which allows at least three operation modes: a wireless range extender with one wireless segment as the backbone and another covering the area; a wireless access point with a wired backbone; and a wireless client bridge serving Ethernet-connected devices.

Improved designs could use a hardware switch that selects between the operation modes. This can then lead to a logical foolproof WPS operation mode with the WPS button only used for enrolling client devices in modes other than “Client Bridge” whereupon it would be used to enrol with the master segment. The user would be required to set the unit to “Client Bridge” mode when the want to establish a wireless backbone, then set the unit to “Range Extender” mode for operation as a range extender with a distinct satellite segment.

Improved WPS operation

Similarly, these devices could have improved WPS-button logic such as a “long press” for setup with a master segment and a “short press” for client setup. This can avoid further operation complications due to someone who intends to enrol a client device causing these range extenders to “hunt” for new master segments and affecting access to the network by established devices.

Conclusion and my opinion on these devices

If I was to extend the coverage of a wireless network segment, I wouldn’t necessarily use the wireless backbone method that is encouraged with these devices. Instead I would use access points run off a wired (Ethernet or HomePlug AV) backbone. This would then make sure that there is the full bandwidth available across the coverage of the network

With two new standards in the works, we could be approaching the Gigabit wireless network

Articles

Understanding gigabit Wireless LAN: 802.11ac and 802.11ad

My comments

What is it all about

At the moment, 802.11n on both the 2.4GHz and 5GHz wavebands is the current link standard for the Wi-Fi wireless network. But the IEEE have decided to work on standards for providing increased-bandwidth wireless networks.

The two standards are 802.11ac, which will primarily work on the 2.4Ghz and 5GHz radio bands and be seen as a migration path from the current 802.11n technology; as well as 802.11ad which works on the 60GHz waveband and has a very short range. The latter technology would be considered best for peer-to-peer applications like short-range wireless backhaul.

Both of these systems will use MIMO (Multiple Input Multiple Output) radio technology; a “front-end diversity” system with multiple transceivers which is what the 802.11n network uses. But this technology will work with at least four “front-ends”; known as “4×4” due to four signals coming in and four going out.

Dedicated bandwidth options

One major benefit that I see with these technologies will provide is dedicated-bandwidth wireless networking which each access point compliant to these standards can do. This is brought on through the use of MU-MIMO (Multi-User Multi-Input Multi-Output) Here, it extends “transmit beamforming” technology which provides improved signal quality in an 802.11n network to allow the access point to provide “switched” Wi-Fi with dedicated bandwidth to stations; similar to the way the typical wired Ethernet network works.

It may be an improvement for network setups with many SSIDs per access point like so-called “guest / hotspot” + “private” networks, shared hotspot access points or many university networks; by allowing full bandwidth to each SSID.

The realities

Of course, the actual throughput that a network link will achieve will typically be less than headline link speed due to overheads associated with the link’s transmission requirements. Here, the average real world maximum throughput will be 867Mbps and the figure may be quoted for first-generation equipment or mature-generation equipment.

How it affects my small network

What will be asked of a small network like a home network would be a 5GHz segment that provides the 802.11ac network.

It may provide for dedicated throughput to client devices like laptops or tablet computers. For those networks that run as dual networks like hotspots or guest networks that share the same wireless router as the private network,the dedicated throughput for each wireless-network segment will be a bonus.

Of course, 2.4GHz will still be used as an 802.11n segment for existing devices and there may be a compatibility mode so that existing 802.11n devices can operate on the same segment.

Other issues

If the 802.11ad technology is to be used as a wireless-backhaul for many 802.11ac access points, there will have to be work on a complementary mesh-network technology. It will then provide a level of fault-tolerance in the wireless backhaul as well as a chance for each station to have and pass on full bandwidth networking. This is something that the IEEE standards body are working on with the 802.11s draft standard.

Conclusion.

It therefore shows that when there is a standard in place, there will be a chance to “raise the bar” with the technology that it covers. This will mean that a Wi-Fi wireless network could become close to the goal of a switched Gigabit network.

First device to use Wi-Fi technology for host-peripheral connection

Article

HP Intros The First Wi-Fi Mouse For Your PC | eHomeUpgrade

From the horse’s mouth

HP Introduces Wireless PC Accessories to Enhance the Computing Experience

Click here to play YouTube video

My Comments

This mouse is the first to use the Wi-Fi technology as a “personal area network” i.e. to use a network technology to connect peripherals to a host computer. At the moment it requires the host computer to run Windows 7 and implement the “virtual network adaptor” technology in its Wi-Fi chipset.

Furthermore, the host computer needs also to run a device-monitor applet supplied by HP with this mouse. This whole functionality could be improved through the use of code being integrated in Windows 7.

This mouse is expected to have a 9 month battery life which is meant to be longer than with devices that run current Bluetooth technology. I would see that as a coup for Wi-Fi when it comes to applications ranging from mice and keyboards to other “sensor and control” applications like barcode readers used in business; remote controls or health-monitor devices. As well, if the chipsets used in this mouse are implemented in smartphones, PMP / MID devices (iPod Touch, etc) or tablet computers, this could help with improving device runtime when they are used with Wi-Fi networks.

As far as the software is concerned, I would like to have HP avoid “reinventing the wheel” for Wi-Fi mice, keyboards and similar peripherals by making use of “class drivers” that have been defined for USB or Bluetooth human-interface devices.

There is one question that could be asked about this device as in whether it could work over the regular wireless network using the network’s router or access point and sending the data back to the host computer via that local area network, rather than the host PC’s wireless adaptor being virtualised as an access point. This may be of concern with people who run a desktop computer that doesn’t have integrated Wi-Fi but is connected to a the network via Ethernet or HomePlug and this network has a Wi-Fi segment serviced by a wireless router or access point.

A similar setup has been achieved with the myRemote Android app which converts an Android smartphone in to a mouse or remote control for a computer. This one uses the regular wireless network and requires knowledge of the host computer’s IP address and that computer has to run a monitor program downloaded from the myRemote developer’s Web site.

Product Review–WiFi Analyzer (Android)

Links:

Android Market direct link

qrcode

Click on or scan this barcode from your Android device to install this program.

Introduction

I am reviewing WiFi Analyzer which is an elementary wireless-network site-survey tool for the Android platform. This program is free-to-download but is ad-supported with ads that can be suppressed for a few weeks at a time through a user option. There is also the ability for users to donate via PayPal to keep the program being developed.

Like all other WiFi site-survey tools, this program relies on the “beacon” information sent out by wireless networks at regular information and a low-traffic wireless network may occasionally show up on the program’s radar whereas a regularly-used network will exist on the program’s radar.

Data views

This program has a few different methods of visualising the wireless-network space that your Android device as listed below.

There is a Channel graph which, like inSSIDer, can show the relative strength of each SSID on the Y axis and channel positioning on the X axis. This can be useful for determining whether a wireless network is being swamped out by other networks or determining where to tune the wireless access point’s operating channel to.

Wi-Fi Analyzer for Android Channel Graph

Wi-Fi Analyzer Channel Graph

There is also a time graph which shows relative signal strength of access points over a time period. This can be useful for determining what happens when a certain network comes on line for example.

There is also an access-point list which lists each access point that the Android phone can pick up. Here, you are provided with the ESSID, BSSID, channel number and security type (including WPS capability) of each access point and can have this sorted by ESSID, channel,signal strength or security type (“openness”). This list can be grouped by ESSID and security type so you can identify multi-access-point networks. This view may not be accurate if you have multiple wireless routers in an area set to default SSIDs like “linksys” or “dlink” but working on different WEP keys or WPA passphrases.

Wi-Fi Analyzer Network List

Wi-Fi Analyzer Network List by ESSID

There is a Channel-rating bar graph which measures channel useability by the number of stars where the more stars that exist, the better the channel is for your network. You can also “set” an access point to this graph so you can compare channels to the one it is tuned to at the moment. Again, this would come in handy for tuning the access point for best operation.

Lastly, there is a Signal strength meter which allows you to measure the signal strength of an access point. This can be useful for locating rogue or interfering access points or simply to determine the coverage of an access point.

Wi-Fi Analyzer signal strength meter

Wi-Fi Analyzer signal strength meter

There is the ability for one to connect to a network if the user installs the “WiFi Connector Library” either through the application or by visiting the Android Market. This can allow the user to “lock-on” to a network while monitoring other wireless access points.

It works well as a basic handheld tool for setting up a new wireless router or access point or keeping a small wireless network operating at its best. For businesses who run public wireless hotspots, this program allows them to assess their hotspot’s performance or find rogue access points (fake hotspots / evil-twins).

Usage tests

I had put the program to some usage tests with different wireless networks including my own and a wireless hotspot, This hotspot was a complementary-use service run by a small independently-run cafe whom I have been helping out with concerning its performance and keeping it “business-safe”. Here, I used the signal-strength meter to check that there was proper signal coverage over the public dining room and terrace area of that cafe. I also used the channel-graph view to determine if there are other access points or ad-hoc wireless networks able to be picked up in the cafe. Both of these functions worked well with assessing the hotspot’s coverage and quality-of-service.

As well, I used it in two shopping strips to assess how it and the Samsung Galaxy S Android handset that I was running it on could handle many wireless networks. It is able to identify each SSID and plot it properly on the graph and could cope with me walking into and out of particular access-point coverage ranges.

Limitations and Points of Improvement

For this application, the program could support “whitelisting” of BSSIDs against an ESSID so that one can easily know if the access point that is using your ESSID is really your network. This would work well with managing public networks like wireless hotspots by identifying rogue access points like the aforementioned “fake hotspots”. It can also work well with managing multiple-access-point wireless networks.

A “Pro” version, which would be sold for at an extra cost and wouldn’t have in-app advertising, could provide various extra functions like SSID whitelist management for use in optimising or managing wireless-network activity in particular sites or GPS support for “plotting” network coverage maps or the ability to keep standard log files for use with desktop software.

It is worth noting that this program is restricted to the frequency bands that the smartphone or tablet can cover and this is typically the 2.4GHz platform. At the moment, there aren’t any Android devices that can cover the 5GHz spectrum using their own hardware.

Conclusion

At last this is a program that answers my need for a cost-effective easy-to-use handheld network-survey tool in a popular smartphone platform. It can therefore be a good companion program to the inSSIDer program that I had previously reviewed on this site.

Simplifying login and authentication processes for WiFi hotspots

Articles

Wi-Fi body wants hotspots to override 3G • reghardware

From the horse’s mouth

Wi-Fi CERTIFIED™ Hotspot Program to Ease Subscriber Connectivity in Service Provider Wi-Fi® Hotspots  – Press Release

Wi-Fi Alliance Webpage

My comments

One main thrust behind the Wi-Fi Alliance’s new initiative concerning authentication, authorisation and accounting on public hotspots was to permit a wireless-broadband carrier to use Wi-Fi hotspots as a complimentary cellular technology. This is to avoid the need to buy cellular-telephony spectrum in order to increase service capacity and is increasingly necessary as the available radio spectrum becomes increasingly scarce.

Here, a cellular carrier could run their own Wi-Fi hotspot networks like what Telstra is doing or they could form a partnership with a wireless Internet service provider like “The Cloud” in the UK as a way of providing this service. They could then allow for a customer to seamlessly hand over from a 3G network to a Wi-Fi network that supports these credentials.

The way this is going to operate is to use a SIM card in a smartphone to store credentials for Wi-Fi networks. This card is typically controlled by the cellular carrier and may be only used for login credentials that continue the carrier’s partnerships.

A limitation I find with this is that the carrier could implement software locks so that the customer can’t use public networks other than those provided for by the carrier or their partnership. As well, there are other issues that haven’t been looked at properly with this goal for improved authorisation, authentication and accounting on these networks as I list below.

Venue-controlled hotspots

It can also make life difficult for customers who use hotspots provided by venue owners like hotels or cafes. Here, the login experience is typically managed by the hotspot owner and this may require information like a session ID in the case of a hotspot at a bar or cafe, or a room number for a hotel. These may apply for hotspot service where you pay the premises owner for that service or the service is part of the business’s main operation. In some free hotspots, you may have to click on a form to assent to terms and conditions of the service before you continue using the service.

As well, a user could use a hotspot run by an independent wireless hotspot operator and buy their access themselves through a Web-based user interface before using the service.

What I would like to see is support for these kind of hotspots because the user interface that is provided by most of them can become awkward for people who use handheld devices. This is typically because most of these user interfaces are designed for devices like laptops rather than handheld devices.

The improved interfaces could support “app-style” login experiences including “remember-me” login experiences where applicable. Other improvements that could be facilitated include the use of barcodes that are scanned by the phone’s camera to load “session keys” for docket-controlled hotspots or MMS direct-load support for login tokens for “SMS login token” WISPS. It could then lead to a venue-branded experience which some users may find as a “safety net” for their hotspot experience.

As well, a branded experience can be part of a “walled-garden” of sites that a person can visit free of charge or can be a sophisticated experience with such things as an online menu or the ability to order food and drink from your computing device.

Similarly, the idea of “franchising” WISP service to owners of venue-controlled hotspots hasn’t been worked out fully with this technology. Here, a person could have the rights to resell a WISP’s service under varying risk-return models and have the clients associated with that service use their hotspot in exchange for a cut of the costs paid by the clients.

Selective device-cluster creation

It is also a preferred standard to have devices in a public network isolated at lower network levels in order to prevent unwanted peer-to-peer discovery of the devices on these networks. This is typically achieved through functions like “AP isolation” or “Wireless Network isolation” and makes it appear to the devices that they are connecting directly to the Internet privately.

There are situations where a person may want to provide local connectivity between their own devices or devices owned by other users that are in their trust circle. Examples of this include LAN-based gaming over a wireless hotspot network, workgroups sharing data during a cafe meeting; one shifting data between a smartphone and a tablet computer at a coffee lounge or simply uploading pictures from a Wi-Fi-enabled camera to a 13” traveller laptop at their favourite “watering hole”.

Here, the authentication needed for this could be achieved through “same-token” login for devices with integrated Web browsers to entry of MAC addresses or WPS PIN numbers into a “cluster-creation” screen provided by the hotspot gateway. The Wi-Fi Alliance could examine the feasibility of using the new authentication methods as a way of creating selective network clusters across a device-isolated public wireless network.

Authenticating hotspots at the SSID-discovery level

The other question that has not been answered as far as I am concerned is whether there will be a system for authenticating hotspots and public networks in a similar manner to what is done when a user logs on to a banking site for example. This is to verify that the user has discovered a “safe” network before they select that SSID and begin to login to the hotspot.

The data that would be verified would be the MAC addresses of the access points as well as the gateway device’s  IP address and MAC address. This can be used to verify that the user has logged in to a network that is operated by the venue that is providing the hotspot service. For a WISP like “The Cloud” or FON, this may be useful for verifying that users have logged in to the WISP’s network. In this case, this information may pertain to the locally-installed hardware for the WISP.

Here, this could be achieved through a private-key / public-key exchange setup where the successfully verified hotspots could at least be highlighted in a wireless network with a ?key” or green-light icon. If this system does also support the transmission of logo icons, the client device could also show a company logo for that hotspot host.

It can also work as a way of encouraging customers to be sure of where they are surfing the Web through. As well, a business could have a Windows 7 laptop or Blackberry smartphone that supports this kind of verification for public wireless networks to prohibit logging in to public wireless networks that don’t have this kind of verification.

The main issue with this is that independently-run cafes and bars may need to be able to have access to any certification setups at a modest price, preferably through a government business-support agency or their bank.

Conclusion

Once these issues are ironed out concerning the provision of public Wi-Fi Internet service to the hordes of users with notebooks, netbooks, smartphones and tablet computers, then they can use these services to full capability in a secure manner.

Feature Article – Basic information about provisioning public Wi-Fi hotspot service

Introduction

You might be considering setting up that complimentary hotspot for your guests to use but there are certain risks to be aware of concerning the security of your business and your guests’ data and identity.

Risks that have been highlighted include confidential-data and identity theft performed against customers as they work this data from their portable devices; as well as clandestine computer activity like the downloading or serving of illegal content; or the distribution of spam email, performed using computers connected to public Internet networks like wireless hotspots.

As well, there may be other imperatives required of people who provide Internet access to the public. These imperatives, asked for by various local, state / regional or national governments may include requirement like keeping a log of whom you provide Internet access to or requirement for session tracking. Therefore I am not therefore in a position to explain how to satisfy these needs and it is best to seek local advice on this topic.

Therefore, your business should know who is using the hotspot service and be able to make sure that the people who benefit are the business’s customers or guests. This means that the customers or guests are actually going to be operating the network device that they use when connecting to the service and also operate it on your premises. As well, your customers know that they are going to actually benefit from your hotspot service when they log in to this service.

The cafe or bar as a “second office”

This is more important for the cafe as an increasing number of businesspeople use these places as “second offices” where they can work without unnecessary office-borne distraction or as places where they meet their colleagues or business partners. Here, these people will be working on workplace-confidential data and most of these workplaces place high value on the security of this data as it travels between the laptop and the workplace’s main computer systems.

In fact, the reason I have decided to publish this article was because a cafe that I regularly visit in Camberwell (Melbourne, Australia) had just started to offer free public Wi-Fi access but I had wanted them to provide a free Wi-Fi service that is safe for their customers. Here, they had an ordinary wireless router as the Internet service but they needed help in getting this service working properly and safely. They also wanted to make sure that this resource was available just to their customers as part of their customer service.

Your equipment

When you start out with your complimentary-use hotspot service, you may use a wireless router hooked up to a separate Internet service or use one with a “guest-access” or hotspot function and is connected to your common Internet service.

This should be set up to cover your public area such as the bar areas in your bar or the dining room in your cafe. In some situations, you may need to use an additional access point to cover larger areas or get your signal past thick walls. This is something I have covered in this site as a separate article.

As well, if your equipment works on 802.11n technology, it should be set to work in compatibility mode where it can work with 802.11g and 802.11n devices. This is to cater for the fact that most devices that are in circulation, especially smartphones, are likely to work with 802.11g technology and people may operate battery-operated 802,11n-capable devices in 802.11g mode in order to conserve battery runtime.

Dual-band setups

It may be an asset to consider a dual-band setup for your wireless hotspot. This will use a radio presence on the 2.4GHz band as well as the newer 5GHz band and is supported by an increasing number of newer laptops, tablets and smartphones. The new waveband comes in to its own for multimedia applications like video conferencing or photo and video uploads to social media as well as taking some pressure off the 2.4GHz band for legacy equipment to use.

This can be achieved with a router / gateway or access point that implements simultaneous dual-band operation or you can add a 5GHz access point or a dual-band access point set up for 5GHz operation to your existing network.

Here, you need to make sure you still have your network set up for 802.11b/g/n operation for the 2.4GHz band and 802.11n operation for the 5GHz band. If your equipment supports 802.11ac Wi-Fi, you may have to make sure that the 5GHz aspect works in a compatibility mode for both 802.11n and 802.11ac equipment. As for the SSID (Network Name) which is talked about below, you can use the same SSID for both bands and the clients’ computer equipment switches between the bands automatically.

Your SSID or Network Name

The SSID or network name is very important to your hotspot’s identity. Here, it should reflect your business’s name and have a reference to public or guest Wi-Fi service. An example that I used for a basic complimentary-use Wi-Fi hotspot that I set up at a coffee lounge just recently was MORAVIA-PUBLIC-WIFI. Here this reflected the coffee lounge’s name (MORAVIA) as well as stating that the service was a public Wi-Fi hotspot service hosted by this business. Therefore, you can then identify any “evil-twin” or “fake-hotspot” devices left on or near the premises that exist to capture customers’ sensitive data.

This SSID must be used in all signage advertising your hotspot and the signage must reflect your company’s identity. This means that it either has your company logo and name or be in your company’s styling. In this case, the signage about the hotspot should at least exist beside the cash-register and the door, preferably at eye-level or near the main handle or pull.

Hotspot security

Basic security

Your hotspot network should be secured with a WPA-PSK passcode which your staff should give out to customers who want to use hotspot service. As well, the network should have wireless-client isolation enabled, so that customers who are using the hotspot cannot browse on to each others’ computers.

Previously, there wasn’t any wisdom in implementing link security on a public-use wireless network but now that most computers and handheld devices support WPA-based link security for wireless networks, adding this function to WPA-level is still worth it for achieving some control and security in a public-use wireless network.

It is still important to change the WPA-PSK passphrase regularly such as at least twice a month. Some environments may require the passphrase to the changed every week. This is so that it becomes hard to set up a “fake hotspot” using your service’s credentials or keep a computer logged in to the hotspot service without you knowing.

People who use “open-frame” computing devices based on recent versions of Android or Windows may find that this job may be simplified. One method, which works with both the operating systems, is to use WPS push-button setup on consumer routers that are suitably equipped and are serving as dedicated hotspot devices. But another method is to make a QR code representing the SSID and WPA passcode as a machine-readable form and print this out on to a card that you hand to your customer. Then they scan this code with their Android or Windows 10 device with the appropriate reader software.

As well, your hotspot should properly support VPN pass-through for all protocols so that business users can log in to their workplace VPNs  without any headache.

Special hotspot-gateway devices

It may be worth knowing that if you want greater control over your public Internet service, it may be worth implementing a “docket-printer-based” wireless hotspot gateway like the Netcomm HS-1100, Solwise WAS-105R or Zyxel N4100.

Here, these devices direct users to a login page where they have to key in a session login and password that they transcribe from a paper docket that is printed from a docket printer attached to the hotspot gateway. If you intend to offer a paid service, these devices put you in a position to use the payment methods and paths that you use to accept payment for your goods and services.

This is unlike some other hotspot gateway setups that require the potential user to pay another company directly using their credit card or an account maintained by that other company using a payment form hosted by that hotspot. Typically, a lot of these setups are managed in a manner where you don’t have much control over how the service in provided and the service may be provided in a manner not dissimilar to how most vending and amusement machines are provided where you don’t own the equipment, representatives visit the premises to maintain the equipment and you get a small “cut” from the takings.

As well, the session login parameters that your users type in from these dockets exist only for a particular time limit. This is also important for people who run a paid service, but can be useful for managing complimentary service so you can be sure that the people who are using your service are your customers or guests who are in your public areas.

If you do run one of these dedicated hotspot gateway devices, such as a “docket-printer-based” device, the wireless network that these devices operate should still have WPA-PSK security with the passphrase changed regularly. The “docket-based” devices will list the WPA-PSK passphrase on that same docket so your customers can still log in to your hotspot from their device.

Hotspot 2.0 / Wi-Fi Passpoint functionality

Hotspot-gateway devices that supports Hotspot 2.0 or Wi-Fi Passpoint operation, including firmware updates that bring this functionality to existing equipment, is also worth its salt. This provides for improved login experiences including the ability to have your venue described in the list of available Wi-Fi networks when your customers use compatible along with a simplified signup or login procedure. It also supports link-level security between the user’s computer or phone and the access point.

When you enable Hotspot 2.0 or Passpoint functionality on your hotspot gateway device, make sure that your establishment’s details are properly entered when you fill out the setup form for this function. Here, if your users have equipment that supports this technology to the letter, they can identify your establishment in a more qualified manner so they are sure that the Wi-Fi service they are connecting to is the one you are providing at your business.

Of course those of us who use devices that don’t support this functionality can still benefit from Wi-Fi hotspot service on these services as long as “universal” authentication is enabled on the gateway device.

Branding options

If you do implement these devices, make sure that you know how to brand the customer-facing user interfaces.

Most of these devices can allow you to upload a graphic and integrate it in to the login interface or they can allow you to upload customised login screens or point to a Web server for the login interface graphics. The latter option may appeal to you if you have a good hand with creating basic HTML Web pages.

Here, make sure that you have your business name and logo and, if you can do it, set the colour scheme to your business’s colour scheme. As well, make sure that your business name appears on the access dockets that your hotspot gateway prints out.

Power outlets

With a hotspot, always expect that some of your customers will use the power outlets on your premises to power their laptops or smartphones from AC power to avoid compromising battery runtime. This is more so with customers are operating older equipment that has batteries that are “on their last legs” or are working VPN sessions in order to “pick up” files from work and want to be sure this is done properly.

Here, a few double outlets near the tables can work wonders here and if an outlet is used for powering a device like a lamp, the device could be connected to the outlet via a multi-socket power-board with extra outlet space for a few appliances.

Conclusion

Once you know how to choose and set up your public-use wireless network properly, you can make sure that this is a service that your customers and guests will benefit from fully. This may even put your business “on the map” as far as customer-service extras are concerned.

UPDATES

I have done some revisions to this article which was originally published in August 2011 to reflect the arrival of newer technologies like 802.11ac dual-band Wi-Fi wireless technology, Wi-Fi network credentials via QR codes, and Wi-Fi Passpoint technology.

What is the “new computing environment” and how to go about it?

When I talk of laptops, wireless routers and network-capable printers, I make frequent references to a “new computing environment” that these devices can enable.

What is the “New Computing Environment”

Sony VAIO E-Series laptopThe “New Computing Environment” is a home computing environment that is based around portability and flexibility. The seed for this environment has been sown with the widely-publicised Intel Centrino campaign and is becoming stronger in a lot of households.

It consists of most of the computers in the house being laptop or notebook computers.It may also include the use of “all-in-one” desktop computers similar to the newer Apple iMacs or HP TouchSmart desktops. The goal is that these computers are able to be moved easily around the house at a whim.

This environment will also encompass the use of smartphones and tablet computers for secondary computing activities like casual Web browsing, email and use of social networks.

There is a Wi-Fi home network in place that is served by at least a wireless router that is the network’s Internet “edge”. The computers may connect to that router via Ethernet if they are close to it but are typically connected to that router using the Wi-Fi network segment.

What does this lead to

Increased flexibility

The key benefit is to increase flexibility when it comes to computer use. The major benefit is that you can relocate the computer as you need it. An example that was portrayed in an Intel Centrino radio ad that was played in the UK was someone who was writing out an email on a laptop being being interrupted by another household member who had come in to do the vacuuming. Then they are able to move somewhere quieter to do the rest of their work.

Netgear DG834G ADSL2 wireless router

Netgear DG834G ADSL2 wireless router

As well, the “New Computing Environment” also leads to increased “casual computing” setups like viewing sites like YouTube or Facebook while lounging around on the sofa; going through one’s email while relaxing in bed or flicking through online news sites while in the kitchen. I even wrote a short article on this site about the trend of young people visiting Websites while watching TV.

Catering to temporary workspaces

Another very common scenario is a household without a dedicated workspace. This is where the kitchen bench or the dining table becomes a temporary office. Some households may have a collapsible table like a card table or trestle table along with one or more folding chairs, set up in a lounge area or landing for use as a temporary workspace; or may have such furniture on hand to set up a temporary workspace as required. The “New Computing Environment” allows the user to shift the computer along with the rest of their work whenever they need to do something like set the table for a meal.

Even if a household has a dedicated workspace, there will always be the need to create another temporary workspace to suit another person’s work or study needs or to suit a different type of work.

Storage flexibility

Similarly, laptop computers are much easier to store when not in use. For example, they can be put in a drawer when not needed, as I have mentioned in an older article regarding use of a laptop as a kitchen PC. This allows the machine to be well out of harm’s way which can be of concern in a busy household or with some children and pets.

As well, the laptop is also more suited to households who have older “davenport” or “roll-top” desks which are capable of being closed up when not in use. Here, these computers can be used at and stored easily in these desks. It also allows these desks to become the elegant piece of furniture that they are known for.

Suitability with “downsized living”

This computing environment is becoming increasingly relevant with people who live in smaller houses and apartments; especially city apartments.

This class of user includes “empty-nest” parents who are moving to smaller premises because their children have left the family home, but still need to be able to look after their grandchildren when they come around.  Here, their computing equipment doesn’t need to cause much space to be taken up in these smaller living quarters.

The “home-business” laptop

This kind of computing environment also suits the use of a “home-business” computer that is used at home but taken to the workplace while you are working. For some small-business operators, a large laptop like the Dell Inspiron 15R or the HP Probook 4520s may be the only computing device that they need to use for all their computing needs and you just pack this machine in the boot (trunk) of your car before you head to or from your workplace.

Implementation notes

Starting out

You will need to use a laptop computer that is commensurate to your computing needs. But it will have to be equipped with an integrated Wi-Fi wireless network interface of at least 802.11g WPA standard. This covers most laptops made over the past five years. I have reviewed plenty of laptops and notebooks on this site and will be reviewing more of them as they come along from different manufacturers. You can have a look at the list of equipment reviewed here on this page.

Compaq Presario CQ42

Compaq Presario CQ42 entry-level laptop

If you are intending to buy a new laptop computer, I would suggest that you look at the buyer’s guides that I have written – “Buying a Laptop or Notebook Computer”. Here, I have suggested the use of the 15” laptop computers as a sole or main computing device for this environment. If you have very basic needs like emailing and basic Web surfing, a unit equipped with a low-end processor and around 2Gb memory, like the Compaq Presario CQ42 that I have reviewed here, can suit your needs here. It is still worth it to spend as much as you can afford on the hard disk capacity because as you use the computer more regularly, you will end up filling the hard disk more quickly.

On the other hand, you may want to use an “all-in-one” desktop computer like one of the Apple iMac, HP TouchSmart Desktop or Sony VAIO J or L Series computers. These have the computing power, secondary storage and the screen integrated in one slim lightweight housing, with a separate keyboard and mouse. They may be useful as a “common” or “family” computer and can be stored or moved easily as long as you know how to reconnect the keyboard and mouse.

Printers

A lot of people who set up for the “new computing environment” typically use a direct-connected printer and bring the laptop closer to it in order to plug it in when they want to print or scan something.

Canon PIXMA MX-350 network multifunction printer

What you need to do for proper implementation is to use a network-enabled printer. Here, these printers connect directly to the network either via Ethernet or Wi-Fi wireless and accept their print jobs through this connection. Multi-function printers can also expose their other functions like the scanner, fax or memory-card slots to the network.

This avoids the need to connect the laptop to the printer every time you want to print something out. With a network printer, you just select that printer from the list of printers when you specify a print job from your laptop and, moments later. you will find your print job in the printer’s output tray. Here, the job is sent via the network to the printer rather than via a cable that you always connect to the printer.

“Easing the gap” towards flexibility

Some users who are used to a regular laptop computer connected by Ethernet to a single-port broadband modem at a regular workspace may still get in to the habit of connecting the laptop to the wireless router using the “old way”. This is more so if they see their computer’s home location as being on the desktop near the router and while at that location they plug it in to the Ethernet socket on the router.

Some operating systems may react in a strange way if the user plugs in the Ethernet connection while the wireless connection is still active. This may be not of concern with newer operating systems that can automatically deactivate the Wi-Fi wireless network interface if the computer is connected to the network via an Ethernet cable.  Here, the user needs to know how to manually enable and disable the Wi-Fi wireless network interface in the laptop.

Some of the computers will use a separate “Wi-Fi” button to turn the Wi-Fi modem on an off whereas more recent examples will require you to press the “Fn” key and a function key with a transmitter symbol to turn the wireless network on and off. This function may also be known as a “flight mode” and in some cases, will turn the Bluetooth function on and off at the same time.

Then what you might end up doing is to forget using the Ethernet cord and just use the laptop wirelessly as you realise you can use the Internet at home without wires.

Network-attached storage devices

If you are considering expanded or secondary data storage space for the “New Computing Environment”, you will be interested in buying a network-attached storage device. This is a dedicated external hard disk that is accessible from computers connected to your network. It is different to the idea of repurposing an old desktop computer as a shared storage server because the device is designed specifically to be a storage device and will end up being quieter, more efficient and more reliable to run than the old desktop computer.

They are relevant as a backup device; to offload rarely-touched data from your computer and/or to works as a standards-compliant media server for your music, digital pictures and videos. I have touched on this latter application in the DLNA Home Media Network series article: “Setting up for PC-free operation”.

An increasing number of wireless routers are offering NAS functionality when a USB hard disk is plugged in to them. This may be good for starting out or a temporary network-storage solution but a dedicated network-attached storage device can do the job much better for long-term use. As well, most of the routers that offer this function are very under-powered when it comes to handling USB hard disks and you would then have to use a self-powered USB hard disk or connect the “power” USB connection on small USB-powered hard disks to a powered USB hub.

Is wired technology relevant to the New Computing Environment

There are some cases where wired-networking technology is relevant to the New Computing Environment. One main case would be to support network printers or networked AV devices that don’t have integrated Wi-Fi functionality. This would be more so as you consider purchasing an Internet-enabled TV or Blu-ray player for your home and a lot of these devices may just have an Ethernet socket rather than Wi-Fi connectivity.

Another case would be to use a secondary access point to extend wireless-network coverage, such as with buildings that use thick walls made of brick, stone or similar materials; large buildings or outbuildings on a property.

Here, you may think that you have to lay Ethernet wiring through the premises and this may be expensive and of poor value if you aren’t renovating, extending or rewiring your building. In most cases, you could use HomePlug AV technology as your wired “no-new-wires” technology because this uses regular AC wiring as a data carrier.

Conclusion

What I am hoping to do with this is to explain the “New Computing Environment” that is becoming a major trend as far as home and small-business computing is concerned. This is where the computing environment is centred around the use of portable computers that connect to a wireless network.

“Wi-Fi-ready” consumer electronics–what should you know

Article

Why you should avoid proprietary Wi-Fi dongles | Crave – CNET

My comments

Previously, I had written an article about using HomePlug to connect a TiVo device to your home network if you don’t have Ethernet connectivity near the TiVo device. This was after I had seen poor Wi-Fi performance from the TiVo-specified 802.11g Wi-Fi adaptor that a TiVo that was on show at a consumer-electronics show was connected to. This is infact the beginning of a trend by consumer-electronics manufacturers to differentiate their product ranges.

What does it mean if consumer-electronics is “Wi-Fi-ready”

Consumer-electronics manufacturers will place a range of network-enabled consumer-electronics products like flatscreen TVs or Blu-Ray players as “Wi-Fi-ready” or “Wi-Fi-enabled” units. These units will be cheaper than the products that have Wi-Fi functionality integrated in them and this fact is used as a way of differentiating between particular models or ranges.

When you want to use the “Wi-Fi-ready” TV or Blu-Ray player on your home network’s Wi-Fi segment, you have to buy a special Wi-Fi network-adaptor module from the consumer-electronics manufacturer through their retail front. Most such adaptor modules will come in the form of a USB “dongle” that plugs in to a specified USB socket on the device but some manufacturers may require that their technicians install the module in the set for you. This latter practice may be more so with TVs sold by some European manufacturers who are used to having add-on functionality modules available for installation by their technicians at a later date upon their customers’ request.

Of course, nearly all of these items of consumer electronics will have an Ethernet socket on them so you can connect them to an Ethernet network segment or a HomePlug networks segment with the appropriate bridge device.

The Wi-Fi dongles or modules

The dongles or modules are usually peculiar to a manufacturer’s products or may only work with a certain subset of their products such as those that are based on a particular design. They usually cost more than a USB-Wi-Fi network adaptor sold for general-purpose computers. As well, the modules, especially the dongles, may not give the same kind of Wi-Fi performance as a setup where the Wi-Fi functionality is integrated in the device.

It may also be worth paying attention to the price difference for the model that comes with Wi-Fi and the model that is “Wi-Fi-ready”. If the device of concern is a TV set, I would suggest that you compare the two models that have the same screen size and display technology. It is also worth asking if the retailer does sell the Wi-Fi module and how much for. This is because in some cases, the aforementioned price difference at the store may be less than the cost of buying this module.

What can you do with a “Wi-Fi-ready” device if you don’t have Ethernet at its location?

This same situation can also hold true if you wish to go for the cheaper “Wi-Fi-ready” model yet integrate it in to the home network in a “no-new-wires” manner.

I would suggest that you use a HomePlug AV setup to connect the “Wi-Fi-ready” device to the home network if you don’t have an Ethernet connection in place at the device’s location. This also includes situations where you may move the device to a newer location such as “pushing” the existing Internet-enabled “Wi-Fi-ready” TV to the secondary lounge area or bedroom.

Most of the HomePlug AV starter kits which comprise of two HomePlug AV-Ethernet bridges (a.k.a “homeplugs”) can typically cost the same as the add-on Wi-Fi adaptors. It is also worth knowing that if you pay a bit more, some of these kits even come with an integrated Ethernet switch which may be useful if you have two or three network-enabled video peripherals near the TV or are likely to connect the PS3 or Xbox 360 to the TV.

Other comments

One situation that I would fear most with consumer-electronics would be to use the optional Wi-Fi module technique used in the current crop of “Wi-Fi-ready” equipment to provide network / Internet connectivity to cheaper equipment at extra cost to the consumer.

Here, the equipment would have no Ethernet socket yet still show “network-function” teasers in its user interface and describe the functions in its user manual and marketing literature. But the user would have to buy a Wi-Fi or Ethernet module in order to link the device to the  home network before they benefit from network and Internet functionality.

Like with the Wi-Fi-ready scenario, the user wouldn’t be able to use cheaper or better-value hardware to network-enable their device, therefore end up paying the premium for network connectivity.

Consumer Electronics Show 2011–Part 3

Now we come to the issue of network-infrastructure equipment that will need to support the increasing demands placed on the home network by the previously-mentioned smartphones, tablet computers and Internet-enabled TVs.

Network Infrastructure

Network Connectivity

Some newer chipsets have appeared which will increase network bandwidth for the 802.11n Wi-Fi segment and the HomePlug AV segment. The current implementations may use manufacturer-specific implementations which won’t bode well with the standards.

The first new “call” is the 450Mbps 802.11n WPA2 WPS Wi-Fi segment which is being provided by most network makes for their midrange routers and access points. Access points and routers that work with this specification use three 802.11n radio streams to maintain the high throughput. The full bandwidth may be achieved if the client device is equipped with an 802.11n wireless network adaptor that supports the three streams but your existing devices may benefit due to reduced contention for the wireless bandwidth due to the access point / router offering three streams.

Most of the routers shown at the Consumer Electronics Show this year that support the 3-stream 450Mbps level for the 802.11n wireless network functionality also offered dual-band dual-radio operation to the same specification. Here, these devices could work on both the 2.4GHz band and the 5GHz band at this level of performance.

Some manufacturers were trying out the idea of a 60GHz high-bandwidth media network which may be based on a Wi-Fi (802.11 technology) or other proprietary scheme. This could lead to three-band multimedia routers and access points that use 2.4GHz and 5GHz for regular whole-home wireless networking and 60GHz for same-room wireless networking.

The second new “call” is the 500Mbps throughput being made available on high-end HomePlug AV devices. These powerline network devices may only achieve the high bandwidth on a segment consisting of the high-bandwidth devices that are based on the same chipset. Here, I would wait for the HomePlug AV2 standard to be fully ratified before you chase the 500Mbps bandwidth on your HomePlug segment. Of course, these devices can work with HomePlug AV segments.

The third new call is for midrange high-throughput routers to have Gigabit on the WAN (Internet) port as well as the LAN ports. This is more relevant nowadays as fibre-based next-generation broadband services are rolled out in most countries.

Everyone who exhibited network-infrastructure equipment offered at least one 450Mbps dual-band dual-radio router with Gigabit Ethernet on the WAN (Internet) connection as well as the wired-LAN connection. As well, most of these routers are equipped with circuitry that supports QoS when streaming media and some of them have a USB file-server function which can also provide media files to the DLNA Home Media Network.

Trendnet also offered an access point and a wireless client bridge that worked to this new level of 802.11n performance. They also demonstrated power-saving circuitry for Wi-Fi client devices which throttles back transmission power if the device is in the presence of a strong access point signal for their network. This was ostensibly to be “green” when it comes to AC-powered devices but would yield more real benefit for devices that have to run on battery power.

They also ran with the TPL-410AP which is a HomePlug AV Wireless-N multi-function access point. Another of those HomePlug access points that can “fill in the gap” on a wireless network or extend the Wi-Fi network out to the garage, barn or old caravan.

They also issued the TEW-656BRG 3G Mobile Wireless N Router, which is an 802.11n “MiFi router” that is powered by USB and works with most 3G / 4G modem sticks available in the USA. It is of a small design that allows it to be clipped on to a laptop’s lid or a small LCD monitor.

TP-Link had their 450Mbps three-stream dual-band dual-radio router with Gigabit on bot WAN and LAN Ethernet connections. As well they fielded a single-stream 150Mbps USB stick as the TL-WNT23N.

They also tried their hand with IP surveillance with the TL-SC4171G camera . This camera can do remote pan-tilt, and 10x digital zoom. It connects to the network via Ethernet or 802.11g Wi-Fi (not that much chop nowadays) and is equipped with an IR ring for night capture, as well as a microphone and speaker.

Netgear were more active with the 450Mbps three-stream routers with Gigabit LAN. Two of the models are broadband routers with Gigabit WAN, while one is an ADSL2 modem router which I think would serve the European and Australian markets more easily. The top-end model of the series has a USB file server function which works with the DLNA Home Media Network and also with Tivo “personal-TV devices”.

They also released the XAV5004 HomePlug AV switch which is the 500Mbps version of the their earlier “home-theatre” four-port HomePlug switch. Of course, they released the XAV2001 which is a compact “homeplug” adaptor which connects to the regular standards-based HomePlug AV segment.

They also have released the MBR1000 Mobile Broadband Router which works with 3G/4G wireless broadband or  Ethernet broadband. This unit is being provided “tuNrnkey” for Verizon’s new 4G LTE service.

Netgear have also fielded the VEVG3700 VDSL2/Gigabit Ethernet dual-WAN router with Gigabit Ethernet LAN, Cat-IQ DECT VoIP phone base station. This device, which is pitched at triple-play service providers also supports DLNA server functionality. As well, they also had a DECT VoIP kit available for these providers

As well, Netgear have tried their footsteps in to IP-surveillance for home and small business with a camera and an Android-driven screen for this purpose.

D-Link’s network hardware range include the three-stream 450Mbps routers with Gigabit WAN/LAN, a multifunction access point / repeater for the 802.11n network as well as a new DLNA-enabled network-attached storage range

As far as the MoCA TV-coaxial-cable network is concerned, Channel Master is the only company to release any network hardware for this “no-new-wires” network. It is in the form of a MoCA-Ethernet 4-port switch for the home theatre.

“Mi-Fi” wireless-broadband routers

Every one of the US cellular-telecommunications carriers are catching on to the 4G bandwagon not just with the smartphones and tablets but with the wireless-broadband routers.

Sprint have a unit for their WiMAX service while Verizon are fielding a Samsung LTE “Mi-Fi” as well as the aforementioned Netgear MBR1000 router.

Computer hardware and software

Monitors

Some of the companies who manufacture monitors are looking at the idea of “Internet-connected” monitors which have a basic Web browser in them so you don’t have to fire up a computer to view the Web.

CPU/GPU combo chips

These new processor chips combine a CPU which is a computer’s “brain” as well as the graphics processor which “draws” the user interface on to the screen. AMD and Intel were premiering the “Accelerated Processor Units” and the Core “Sandy Bridge” prcessors respectively at the CES this year.

Intel were trumpeting the fact that this technology could make it harder to pirate movie content but this is more about mainstream computing and small-form-factor hardware being behind this space and power saving processor hardware.

Sony had lodged a commitment to AMD to use the Zacate “Accelerated Processor Unit” in some of their VAIO laptops.

Other hardware

AMD haven’t forgotten the “performance computing” segment when it comes to processor chips and released the quad-core and 6-core “Phenom” desktop and gaming-rig CPUs.

Seagate have also made the “GoFlex” removable / dockable hard disks a standard by building alliances with third-parties to make hardware that works to this standard. Could this be another “VHS-style” alliance for dockable hard disks?

Microsoft also used this show to premiere their Touch Mouse which uses that same touch operation method as Apple’s Magic Mouse. Do I see an attempt for them to “snap at” Apple when it comes to “cool hardware” as well as software?

The Microsoft Platform

There has been some activity with the Microsoft Windows platforms now that set-top boxes and tablet computers are becoming the “order of the day”

One direction Microsoft is taking is to port the Windows Platform, which was primarily written for Intel-Architecture processors, to the Acorn ARM-architecture processors. The reason that this port is taking place is due to these energy-efficient RISC processors being commonly used in battery-driven applications like tablet computers. They are also popular with other dedicated multimedia devices like set-top boxes and TV applications.

As well, Microsoft will be working on a lightweight Windows build for TV applications like set-top boxes. This is although they have previously written Windows-CE builds for this class of device.

Microsoft also want to make a variant of the Windows Phone 7 for tablet computers and are starting work on the Windows 8 project.

Similarly, Somsung has demonstrated the second incarnation of the Microsoft Surface platform This one comes in a slimmer table-based form rather than a unit that is as thick as the 1980s-style “cocktail-table” arcade game machine.

Conclusion

The Consumer Electronics Show 2011 has certainly put the connected home on the map. This is due to affordable smartphones and tablet computers becoming more ubiquitous and Internet-provided video services becoming an increasing part of American home life.

It will be interesting to see what will happen for the other “pillar” of the consumer-electronics trade fair cycle – the Internationaler Funkaustellung; and how more prevalent the Internet TV, smartphone and tablet computer lifestyle will be in Europe and Asia.