Re: [WISPA] 5.3/5.8 GHz Antenna Suggestion
My experience as well.The mount is wayyy to flimsy. Equinox has some much heavier duty mounts which I hope to get my hands on in a week or two. They would fix that flimsy thing right up and make it quite solid. I have seen an example of one that wasn't for the grids, and they are incredibly solid. +++ neofast.net - fast internet for North East Oregon and South East Washington email me at mark at neofast dot net 541-969-8200 Direct commercial inquiries to purchasing at neofast dot net - Original Message - From: Tim Kerns [EMAIL PROTECTED] To: WISPA General List wireless@wispa.org Sent: Saturday, December 30, 2006 5:48 PM Subject: Re: [WISPA] 5.3/5.8 GHz Antenna Suggestion Mac, Have PacWireless made any changes to the mount on the 29db grids... I have 4 in use and the mount isn't very solid. The grid deflects a lot in the wind. I can watch the signal go up and down as it moves. Tim Kerns CV-Access, Inc. - Original Message - From: Mac Dearman [EMAIL PROTECTED] To: 'WISPA General List' wireless@wispa.org Sent: Saturday, December 30, 2006 12:53 PM Subject: RE: [WISPA] 5.3/5.8 GHz Antenna Suggestion I do use their dishes where I have a large enough tower, water tower or a roof. I will tell ya though - - the 29dbi grids are mighty fine, much less expensive than a solid dish, wind load is no comparison as well as the ease of mounting. If you are leasing tower space - - the grid is a no brainer unless you have to have the extra db that comes with a dish. Mac Dearman -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Mark Nash - Lists Sent: Saturday, December 30, 2006 2:28 PM To: WISPA General List Subject: Re: [WISPA] 5.3/5.8 GHz Antenna Suggestion Are we preferring their grids to dishes? Mark Nash Network Engineer UnwiredOnline.Net 350 Holly Street Junction City, OR 97448 http://www.uwol.net 541-998- 541-998-5599 fax - Original Message - From: Mac Dearman [EMAIL PROTECTED] To: 'WISPA General List' wireless@wispa.org Sent: Saturday, December 30, 2006 12:18 PM Subject: RE: [WISPA] 5.3/5.8 GHz Antenna Suggestion Mark, I have several 8 mile 5.3GHz links (YMMV) using PacWireless 26dbi grids, MT CM9's. IMHO you can't go wrong using the PacWireless antennas. I have built a wireless network that covers 12% of Louisiana utilizing their antennas exclusively for my BH. Well - I do have several of the Trango dual polarity ext's. Mac Dearman -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Mark Nash - Lists Sent: Saturday, December 30, 2006 1:12 PM To: WISPA General List Subject: [WISPA] 5.3/5.8 GHz Antenna Suggestion I have usually used Trango backhauls, so I have not had to worry about 5 GHz antennas and what to choose. Now I'm going to try a MikroTik backhaul with a CM9. Currently, I've got two applications: 1. 2-mile link that I can perhaps use 5.3GHz over. 2. 8-mile link that I'll go 5.8GHz over. What antennas have you used to accomplish links such as these... Also, kI have heard that the output power of the CM9 in a MikroTik can be adjusted. Experience? Mark Nash Network Engineer UnwiredOnline.Net 350 Holly Street Junction City, OR 97448 http://www.uwol.net 541-998- 541-998-5599 fax -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
RE: [WISPA] TRUCKPC
Because they may have their data in a more timely and reliable fashion than they get it by using casual access. When I first got into WiFi, I saw that 80% of detected (broadcasting) access points were fully open. Within a year, it dropped to 60%. Now, several years later it is well below 50%, and out in the more technically savvy areas (just spent 4 months in Sillycon Valley) it is like 10% or less. Consumers are finally getting more in tune with security. Or more accurately, manufacturers are pushing security more heavily now. A customer had just better not ever push that button on the front of a Linksys if they don't know what they are doing (grin). Remember- I am talking about consumers here- not what we as WISPS set up or provide to them. Ralph _ From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Travis Johnson Sent: Sunday, December 31, 2006 12:46 AM To: WISPA General List Subject: Re: [WISPA] TRUCKPC Hi, Why would this company pay for WiFi access when they are now getting all the access they need for free? It's actually a great idea... have the trucks scan all the time and once they find an open AP, connect and upload all their info. Travis Microserv Ralph wrote: I was on the way to one of our remote towers today and was on the interstate next to two US Express trucks. I turned on a sniffer to see if they also had access points on them, but there was nothing. I guess they just scan, looking for free wireless to use. Being bored with the drive, I was thinking about the TRUCKPC thing a lot and had an idea to make some code changes to the mobile access point I have in my vehicle. Its hooked up to a verizon card and I have a roving EVDO to WIFi hot spot gateway. ( see http://ralphfowler.com/stompbox/index.htm ) I could make a couple of code changes to allow the box to also sniff a bit and see exactly what these things are doing when they find a free internet connection. I was also thinking that we, as an industry, could possibly cut a deal with Drivertech to allow their customers to have access to our networks. Of course there would be a lot more to work out and I'm not the guy for that job ;-) Just some Saturday musings... -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Matt Larsen - Lists Sent: Saturday, December 30, 2006 1:16 AM To: WISPA General List Subject: Re: [WISPA] TRUCKPC AHA I've been wondering where the hell that TruckPC request has been coming from!! Occasionally, I have techs who have left the radius authentication disabled on an access point and the dhcp logs will start to fill up with requests from TruckPC. They were coming from access points all over the place and I was a little perplexed. It is interesting to watch our radius logs too. I have one AP overlooking a little town of 200 people, but it is right next to an interstate and the radius log from that AP is always showing logins. Must be all the trucker laptops whizzing by looking for an open AP. I've been toying with the idea of turning on hotspot functionality so that we can provide transient access, and this is probably a good reason to do it. Matt Larsen [EMAIL PROTECTED] Ralph wrote: Well, JohnnyO- you might want to also educate these people, then: http://www.drivertech.com/ Their product, a Truckpc is being installed in many fleet vehicles. One fleet that comes to mind is US Express, a long haul package hauling service http://www.usxpress.com/ The device communicates back to the office via Satellite, Cellular, or WiFi- whichever is available and cheaper. According to the manufacturer, it can hunt down open and unsecured access points and do your HIGHLY illegal act of connecting and sending its data whenever it can. I'm not endorsing this behavior, of course, but I wanted to bring it to the attention of the list. How do I know? My WISP operates hotspot portals that allow casual users to make use of our mountain and tower-top sectors of WiFi. These cover major portions of several towns. These towns have a major Interstate route passing through them. I began noticing numerous TRUCKPC leases being granted by the DHCP servers in these towns. I became concerned about what they were, so I did a little internet research and ended up on the phone with technical support at Drivertech. This is who confirmed how these devices operate and who the probable fleet culprit was. If anyone has portals near major truck routes, check your DHCP logs and see if you see the TRUCKPC SSID grabbing leases. You may want to either block it or contact these folks and work out a roaming agreement. Serious part over, joke follows: This message brought to you by the World's largest free wireless internet provider. Look for our SSID wherever you go: Linksys. Ralph -Original Message-
[WISPA] Quick-Connect PoE at CPE
George, awhile back I got from you a cat5 pigtail that had a quick-connect fitting on it. I think I can use these for my Tranzeo CPEs if I bore out the hole in the boot of the CPE. This could speed up installs some troubleshooting as well, as we can disconnect the customer's PoE cable and plug into it directly from the inverter in my truck without taking off the boot and risking water problems. How to you obtain these? and do you put on the pigtail portion of it or do they come terminated? What are others doing for this? Mark Nash Network Engineer UnwiredOnline.Net 350 Holly Street Junction City, OR 97448 http://www.uwol.net 541-998- 541-998-5599 fax -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
[WISPA] What's everyone using for Bandwidth Management?
I've spent the past week working on getting my bandwidth management system up and running. I opted to go with PowerCode's product because it seemed to be so comprehensive, but the documentation is less than adequate and I spend a lot of time on the phone with their support staff trying to get some of the fundamental functions to work. With that said, I thought it would be worth finding out what everyone else is using. Thanks in advance, Jim -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] What's everyone using for Bandwidth Management?
StarOS. Jeremy Davis and I put together a module for Freeside that uploads bandwidth rules into a StarOS BW controller automatically. It has made life a lot easier. Matt Larsen [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: I've spent the past week working on getting my bandwidth management system up and running. I opted to go with PowerCode's product because it seemed to be so comprehensive, but the documentation is less than adequate and I spend a lot of time on the phone with their support staff trying to get some of the fundamental functions to work. With that said, I thought it would be worth finding out what everyone else is using. Thanks in advance, Jim -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] TRUCKPC
Hi, I would agree that the percentage of open AP's has dropped in the past few years. However, I still believe it's above 50%. I just can't see a company that already has an operating, working system in place that is basically FREE for them changing to paying ISP's around the country for service. Doesn't make sense, other than what they are doing is illegal. :) Travis Ralph wrote: Because they may have their data in a more timely and reliable fashion than they get it by using casual access. When I first got into WiFi, I saw that 80% of detected (broadcasting) access points were fully open. Within a year, it dropped to 60%. Now, several years later it is well below 50%, and out in the more technically savvy areas (just spent 4 months in Sillycon Valley) it is like 10% or less. Consumers are finally getting more in tune with security. Or more accurately, manufacturers are pushing security more heavily now. A customer had just better not ever push that button on the front of a Linksys if they don't know what they are doing (grin). Remember- I am talking about consumers here- not what we as WISPS set up or provide to them. Ralph _ From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Travis Johnson Sent: Sunday, December 31, 2006 12:46 AM To: WISPA General List Subject: Re: [WISPA] TRUCKPC Hi, Why would this company pay for WiFi access when they are now getting all the access they need for free? It's actually a great idea... have the trucks scan all the time and once they find an open AP, connect and upload all their info. Travis Microserv Ralph wrote: I was on the way to one of our remote towers today and was on the interstate next to two US Express trucks. I turned on a sniffer to see if they also had access points on them, but there was nothing. I guess they just scan, looking for free wireless to use. Being bored with the drive, I was thinking about the TRUCKPC thing a lot and had an idea to make some code changes to the mobile access point I have in my vehicle. Its hooked up to a verizon card and I have a roving EVDO to WIFi hot spot gateway. ( see http://ralphfowler.com/stompbox/index.htm ) I could make a couple of code changes to allow the box to also sniff a bit and see exactly what these things are doing when they find a free internet connection. I was also thinking that we, as an industry, could possibly cut a deal with Drivertech to allow their customers to have access to our networks. Of course there would be a lot more to work out and I'm not the guy for that job ;-) Just some Saturday musings... -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Matt Larsen - Lists Sent: Saturday, December 30, 2006 1:16 AM To: WISPA General List Subject: Re: [WISPA] TRUCKPC AHA I've been wondering where the hell that TruckPC request has been coming from!! Occasionally, I have techs who have left the radius authentication disabled on an access point and the dhcp logs will start to fill up with requests from TruckPC. They were coming from access points all over the place and I was a little perplexed. It is interesting to watch our radius logs too. I have one AP overlooking a little town of 200 people, but it is right next to an interstate and the radius log from that AP is always showing logins. Must be all the trucker laptops whizzing by looking for an open AP. I've been toying with the idea of turning on hotspot functionality so that we can provide transient access, and this is probably a good reason to do it. Matt Larsen [EMAIL PROTECTED] Ralph wrote: Well, JohnnyO- you might want to also educate these people, then: http://www.drivertech.com/ Their product, a Truckpc is being installed in many fleet vehicles. One fleet that comes to mind is US Express, a long haul package hauling service http://www.usxpress.com/ The device communicates back to the office via Satellite, Cellular, or WiFi- whichever is available and cheaper. According to the manufacturer, it can hunt down open and unsecured access points and do your HIGHLY illegal act of connecting and sending its data whenever it can. I'm not endorsing this behavior, of course, but I wanted to bring it to the attention of the list. How do I know? My WISP operates hotspot portals that allow casual users to make use of our mountain and tower-top sectors of WiFi. These cover major portions of several towns. These towns have a major Interstate route passing through them. I began noticing numerous TRUCKPC leases being granted by the DHCP servers in these towns. I became concerned about what they were, so I did a little internet research and ended up on the phone with technical support at Drivertech. This is who confirmed how these devices operate and who the probable fleet culprit was. If anyone has
RE: [WISPA] 5.3/5.8 GHz Antenna Suggestion
Can you share the method you use to link them up so quickly over such a distance? Thanks Chris I have aligned 5.8ghz links up to 73 miles (and even a test link at 137 miles) within 5 minutes start to finish. Is it possible you have another problem? -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] 5.3/5.8 GHz Antenna Suggestion
Hi, We use either a GPS at each side, or just bearing coordinates and a compass. I have aligned several links at 20+ miles only doing one side and then going to the other side and having a perfect signal. :) And actually the longer the distance the easier it becomes... most 5.8ghz dishes have around a 4 degree beamwidth... which means at 30 miles is a much broader area than at 5 miles, thus easier to get inside that beam. We aligned a 137 mile link (just for testing) within 10 minutes. ;) Travis Microserv chris cooper wrote: Can you share the method you use to link them up so quickly over such a distance? Thanks Chris I have aligned 5.8ghz links up to 73 miles (and even a test link at 137 miles) within 5 minutes start to finish. Is it possible you have another problem? -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
RE: [WISPA] More Saturday Musings- Another (older) Truck-PC type
yeah I can see 10 - 12 of them at any time off one of my towers. I'm 1/2 mile from a sears garage where they repair those vans... -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ralph Sent: Saturday, December 30, 2006 11:11 PM To: 'WISPA General List' Subject: [WISPA] More Saturday Musings- Another (older) Truck-PC type Hi Matt- Back in my old Net-Stumbler days (back when you could drive across Atlanta and see less than 20 Access Points, and 2 were my own), the experimenters of the day became perplexed by this SSID that kept popping up at random times. It was an Access Point named SST-PR-1 The first time I saw it, I was in my basement and I knew full well what I could normally receive down there. There were all kinds of theories: an AP on a low earth orbit satellite, something on a passing vehicle, some sort of temporary SSID on a piece of gear that just showed up right at bootup, etc. Googling for SST-PR-1 might actually turn up some of the old discussions about it. Anyway- I started seeing it a lot in the evenings after they built some apartments behind me. I sent my son over there on his bike with a camera to do some investigating. He soon found a Sears Service truck (the ones with the small Globalstar dish on top like you see on many semis) parked in front of an apartment. He went back with a laptop and traced the signal to this van. So we had it figured out- Sears truck. A few days later, my son saw the driver coming home for the evening and the driver gave him the dog and pony show of the truck computer. It is linked to Sears parts database via satellite. The SST-PR-1 is the SSID of an integral access point that allows the driver to use a laptop from inside the customer's home to check on parts, see service manuals, etc. The SST stands for Sears Smart Toolbox. I once told a friend about it and he set up a laptop to warn him when the Sears guy entered the neighborhood on his way to fix their refrigerator. An early warning system of sorts. So, the big SST-PR-1 mystery was finally solved by a 12 year old kid! Ralph -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Matt Larsen - Lists Sent: Saturday, December 30, 2006 1:16 AM To: WISPA General List Subject: Re: [WISPA] TRUCKPC AHA I've been wondering where the hell that TruckPC request has been coming from!! Occasionally, I have techs who have left the radius authentication disabled on an access point and the dhcp logs will start to fill up with requests from TruckPC. They were coming from access points all over the place and I was a little perplexed. It is interesting to watch our radius logs too. I have one AP overlooking a little town of 200 people, but it is right next to an interstate and the radius log from that AP is always showing logins. Must be all the trucker laptops whizzing by looking for an open AP. I've been toying with the idea of turning on hotspot functionality so that we can provide transient access, and this is probably a good reason to do it. Matt Larsen [EMAIL PROTECTED] Ralph wrote: Well, JohnnyO- you might want to also educate these people, then: http://www.drivertech.com/ Their product, a Truckpc is being installed in many fleet vehicles. One fleet that comes to mind is US Express, a long haul package hauling service http://www.usxpress.com/ The device communicates back to the office via Satellite, Cellular, or WiFi- whichever is available and cheaper. According to the manufacturer, it can hunt down open and unsecured access points and do your HIGHLY illegal act of connecting and sending its data whenever it can. I'm not endorsing this behavior, of course, but I wanted to bring it to the attention of the list. How do I know? My WISP operates hotspot portals that allow casual users to make use of our mountain and tower-top sectors of WiFi. These cover major portions of several towns. These towns have a major Interstate route passing through them. I began noticing numerous TRUCKPC leases being granted by the DHCP servers in these towns. I became concerned about what they were, so I did a little internet research and ended up on the phone with technical support at Drivertech. This is who confirmed how these devices operate and who the probable fleet culprit was. If anyone has portals near major truck routes, check your DHCP logs and see if you see the TRUCKPC SSID grabbing leases. You may want to either block it or contact these folks and work out a roaming agreement. Serious part over, joke follows: This message brought to you by the World's largest free wireless internet provider. Look for our SSID wherever you go: Linksys. Ralph -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of JohnnyO Sent: Friday, December 29, 2006 5:35 PM To: [EMAIL PROTECTED]; 'WISPA General List' Subject: RE: [WISPA]
RE: [WISPA] TRUCKPC
unless we ISPs all get together and lock up the wifi world for customers. I've charged people $50 to go in and secure their stuff. I could do it for $20... ;) -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Travis Johnson Sent: Sunday, December 31, 2006 1:04 PM To: WISPA General List Subject: Re: [WISPA] TRUCKPC Hi, I would agree that the percentage of open AP's has dropped in the past few years. However, I still believe it's above 50%. I just can't see a company that already has an operating, working system in place that is basically FREE for them changing to paying ISP's around the country for service. Doesn't make sense, other than what they are doing is illegal. :) Travis Ralph wrote: Because they may have their data in a more timely and reliable fashion than they get it by using casual access. When I first got into WiFi, I saw that 80% of detected (broadcasting) access points were fully open. Within a year, it dropped to 60%. Now, several years later it is well below 50%, and out in the more technically savvy areas (just spent 4 months in Sillycon Valley) it is like 10% or less. Consumers are finally getting more in tune with security. Or more accurately, manufacturers are pushing security more heavily now. A customer had just better not ever push that button on the front of a Linksys if they don't know what they are doing (grin). Remember- I am talking about consumers here- not what we as WISPS set up or provide to them. Ralph _ From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Travis Johnson Sent: Sunday, December 31, 2006 12:46 AM To: WISPA General List Subject: Re: [WISPA] TRUCKPC Hi, Why would this company pay for WiFi access when they are now getting all the access they need for free? It's actually a great idea... have the trucks scan all the time and once they find an open AP, connect and upload all their info. Travis Microserv Ralph wrote: I was on the way to one of our remote towers today and was on the interstate next to two US Express trucks. I turned on a sniffer to see if they also had access points on them, but there was nothing. I guess they just scan, looking for free wireless to use. Being bored with the drive, I was thinking about the TRUCKPC thing a lot and had an idea to make some code changes to the mobile access point I have in my vehicle. Its hooked up to a verizon card and I have a roving EVDO to WIFi hot spot gateway. ( see http://ralphfowler.com/stompbox/index.htm ) I could make a couple of code changes to allow the box to also sniff a bit and see exactly what these things are doing when they find a free internet connection. I was also thinking that we, as an industry, could possibly cut a deal with Drivertech to allow their customers to have access to our networks. Of course there would be a lot more to work out and I'm not the guy for that job ;-) Just some Saturday musings... -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Matt Larsen - Lists Sent: Saturday, December 30, 2006 1:16 AM To: WISPA General List Subject: Re: [WISPA] TRUCKPC AHA I've been wondering where the hell that TruckPC request has been coming from!! Occasionally, I have techs who have left the radius authentication disabled on an access point and the dhcp logs will start to fill up with requests from TruckPC. They were coming from access points all over the place and I was a little perplexed. It is interesting to watch our radius logs too. I have one AP overlooking a little town of 200 people, but it is right next to an interstate and the radius log from that AP is always showing logins. Must be all the trucker laptops whizzing by looking for an open AP. I've been toying with the idea of turning on hotspot functionality so that we can provide transient access, and this is probably a good reason to do it. Matt Larsen [EMAIL PROTECTED] Ralph wrote: Well, JohnnyO- you might want to also educate these people, then: http://www.drivertech.com/ Their product, a Truckpc is being installed in many fleet vehicles. One fleet that comes to mind is US Express, a long haul package hauling service http://www.usxpress.com/ The device communicates back to the office via Satellite, Cellular, or WiFi- whichever is available and cheaper. According to the manufacturer, it can hunt down open and unsecured access points and do your HIGHLY illegal act of connecting and sending its data whenever it can. I'm not endorsing this behavior, of course, but I wanted to bring it to the attention of the list. How do I know? My WISP operates hotspot portals that allow casual users to make use of our mountain and tower-top sectors of
Re: [WISPA] recommendation for Client POE integrated radio for 802.11b/g
The legality and ethics of using an open access point is questionable, but there is a liability issue as well. In most of the areas that I cover with my network, there is a strong signal with SSID of NoDial. Connecting to this will get you a DHCP address even, without a WEP or other encryption key. Until I know that you have connected and moved your mac address to a list that authorizes your connection, all of your outbound packets will be sent to http://64.123.108.28:80 This brings up a liability issue. If the emergency communication van tech wastes 2 hrs trying to get hold of me, get connected to the internet, or whatever, and $10M of houses burn down, because they couldn't get to the fire department via a hacked VOIP solution, then am I gonna get sued? If they connect to my private home network that I intentionally left open, and my custom made uber-hacker passive/aggressive firewall unleashes a blackops virus that turns their laptops into bricks. Then what? I guess, that by JohnnyO's example, if you come into my open door and try to visit with my wife, and you step on a rake that gives you a brain anurism, I guess that makes me guilty (or not guilty) of manslaughter. I lost score in this ballgame. If the cops are in a pursuit in my neighborhood, and run their squad car off the road breaking the radio, and they want to use my home phone to call the office, I would let them. Not because I HAVE to, but to be a good citizen. If I HAD to, then the 4th amendment just went out the window. pd Jack Unger wrote: Holy brainfade, JohnnyO. Your comments about highly illegal just went STRAIGHT over my head. What's illegal about Brian's emergency communications operation? Hams have been providing emergency communications services since (literally) the sinking of the Titanic. jack JohnnyO wrote: Brian - Ham Operator or not - do you realize that what you're planning on doing is HIGHLY illegal and has several people over the past 2 yrs in Federal Prison as we speak ? Why don't ya'll get a VSAT system that works well for VOIP ? The cost is only about $60/mo more and you have no restrictions on bandwidth or stupid filtering like Wild Blue does JohnnyO -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Brian Webster Sent: Friday, December 29, 2006 2:56 PM To: WISPA List Subject: [WISPA] recommendation for Client POE integrated radio for 802.11b/g I'm looking for a good client radio to use in an emergency communications vehicle. My criteria are, POE, highest gain panel antenna possible, scan/survey tool built in, web interface, 802.11b at minimum. I'm part of a ham radio emergency response group and we have our own comms van. I want to have a client radio that we can use on a push up mast to scan around for an open access point and grab bandwidth in an emergency on a scene. We respond with our county Hazmat team for support and the internet is handy. We already have a Wild Blue setup and that will work when necessary but I would like to be able to use something with lower latency so we can implement VOIP at times. I have not studied the 802.11b outdoor client radios in a long time and thought I would ask opinions here. Price is a consideration but the feature set is more important. Id' like to stay away from YDI/Proxim just because of their attitude on the phone whenever I have dealt with them. If any of you can point me to a link were I can purchase one that would be great. Have a nice day. Thank You, Brian Webster www.wirelessmapping.com -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
RE: [WISPA] What's everyone using for Bandwidth Management?
MT -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED] Sent: Sunday, December 31, 2006 11:54 AM To: wireless@wispa.org Subject: [WISPA] What's everyone using for Bandwidth Management? I've spent the past week working on getting my bandwidth management system up and running. I opted to go with PowerCode's product because it seemed to be so comprehensive, but the documentation is less than adequate and I spend a lot of time on the phone with their support staff trying to get some of the fundamental functions to work. With that said, I thought it would be worth finding out what everyone else is using. Thanks in advance, Jim -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
RE: [WISPA] recommendation for Client POE integrated radio for 802.11b/g
ah yes, but then you would've had a cop knock on the front door, and ASK your permission to use the phone. At which point, you COULD say NO! and shut the door on them. Or, you could let them in, and tell them OK! here it is! BUT...They wouldn't do the equivalent of walking up to your NID, plugging a butt set in and just dialing away... If I, right now, drove up in front of your house, got out of my truck, walked up to your Network panel that Verizon or the local phone co. put there as their demarcation point, and plugged my butt set in and got dial tone and dialed Hawaii to chat with someone at YOUR expense, I could be found / shot / arrested / sued / what have you. What's different with WiFi ? Nothing but the excuses we allow people to continue to make. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Pete Davis Sent: Sunday, December 31, 2006 3:11 PM To: WISPA General List Subject: Re: [WISPA] recommendation for Client POE integrated radio for 802.11b/g The legality and ethics of using an open access point is questionable, but there is a liability issue as well. In most of the areas that I cover with my network, there is a strong signal with SSID of NoDial. Connecting to this will get you a DHCP address even, without a WEP or other encryption key. Until I know that you have connected and moved your mac address to a list that authorizes your connection, all of your outbound packets will be sent to http://64.123.108.28:80 This brings up a liability issue. If the emergency communication van tech wastes 2 hrs trying to get hold of me, get connected to the internet, or whatever, and $10M of houses burn down, because they couldn't get to the fire department via a hacked VOIP solution, then am I gonna get sued? If they connect to my private home network that I intentionally left open, and my custom made uber-hacker passive/aggressive firewall unleashes a blackops virus that turns their laptops into bricks. Then what? I guess, that by JohnnyO's example, if you come into my open door and try to visit with my wife, and you step on a rake that gives you a brain anurism, I guess that makes me guilty (or not guilty) of manslaughter. I lost score in this ballgame. If the cops are in a pursuit in my neighborhood, and run their squad car off the road breaking the radio, and they want to use my home phone to call the office, I would let them. Not because I HAVE to, but to be a good citizen. If I HAD to, then the 4th amendment just went out the window. pd Jack Unger wrote: Holy brainfade, JohnnyO. Your comments about highly illegal just went STRAIGHT over my head. What's illegal about Brian's emergency communications operation? Hams have been providing emergency communications services since (literally) the sinking of the Titanic. jack JohnnyO wrote: Brian - Ham Operator or not - do you realize that what you're planning on doing is HIGHLY illegal and has several people over the past 2 yrs in Federal Prison as we speak ? Why don't ya'll get a VSAT system that works well for VOIP ? The cost is only about $60/mo more and you have no restrictions on bandwidth or stupid filtering like Wild Blue does JohnnyO -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Brian Webster Sent: Friday, December 29, 2006 2:56 PM To: WISPA List Subject: [WISPA] recommendation for Client POE integrated radio for 802.11b/g I'm looking for a good client radio to use in an emergency communications vehicle. My criteria are, POE, highest gain panel antenna possible, scan/survey tool built in, web interface, 802.11b at minimum. I'm part of a ham radio emergency response group and we have our own comms van. I want to have a client radio that we can use on a push up mast to scan around for an open access point and grab bandwidth in an emergency on a scene. We respond with our county Hazmat team for support and the internet is handy. We already have a Wild Blue setup and that will work when necessary but I would like to be able to use something with lower latency so we can implement VOIP at times. I have not studied the 802.11b outdoor client radios in a long time and thought I would ask opinions here. Price is a consideration but the feature set is more important. Id' like to stay away from YDI/Proxim just because of their attitude on the phone whenever I have dealt with them. If any of you can point me to a link were I can purchase one that would be great. Have a nice day. Thank You, Brian Webster www.wirelessmapping.com -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
RE: [WISPA] More Saturday Musings- Another (older) Truck-PC type
If they still operate as before, you shouldn't see them unless you set your tower as a client/cpe. I have never seen them do anything with an AP, other than BE one. Dis you know that was what the SST-PR-1 was before? -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Rick Smith Sent: Sunday, December 31, 2006 2:35 PM To: 'WISPA General List' Subject: RE: [WISPA] More Saturday Musings- Another (older) Truck-PC type yeah I can see 10 - 12 of them at any time off one of my towers. I'm 1/2 mile from a sears garage where they repair those vans... -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ralph Sent: Saturday, December 30, 2006 11:11 PM To: 'WISPA General List' Subject: [WISPA] More Saturday Musings- Another (older) Truck-PC type Hi Matt- Back in my old Net-Stumbler days (back when you could drive across Atlanta and see less than 20 Access Points, and 2 were my own), the experimenters of the day became perplexed by this SSID that kept popping up at random times. It was an Access Point named SST-PR-1 The first time I saw it, I was in my basement and I knew full well what I could normally receive down there. There were all kinds of theories: an AP on a low earth orbit satellite, something on a passing vehicle, some sort of temporary SSID on a piece of gear that just showed up right at bootup, etc. Googling for SST-PR-1 might actually turn up some of the old discussions about it. Anyway- I started seeing it a lot in the evenings after they built some apartments behind me. I sent my son over there on his bike with a camera to do some investigating. He soon found a Sears Service truck (the ones with the small Globalstar dish on top like you see on many semis) parked in front of an apartment. He went back with a laptop and traced the signal to this van. So we had it figured out- Sears truck. A few days later, my son saw the driver coming home for the evening and the driver gave him the dog and pony show of the truck computer. It is linked to Sears parts database via satellite. The SST-PR-1 is the SSID of an integral access point that allows the driver to use a laptop from inside the customer's home to check on parts, see service manuals, etc. The SST stands for Sears Smart Toolbox. I once told a friend about it and he set up a laptop to warn him when the Sears guy entered the neighborhood on his way to fix their refrigerator. An early warning system of sorts. So, the big SST-PR-1 mystery was finally solved by a 12 year old kid! Ralph -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Matt Larsen - Lists Sent: Saturday, December 30, 2006 1:16 AM To: WISPA General List Subject: Re: [WISPA] TRUCKPC AHA I've been wondering where the hell that TruckPC request has been coming from!! Occasionally, I have techs who have left the radius authentication disabled on an access point and the dhcp logs will start to fill up with requests from TruckPC. They were coming from access points all over the place and I was a little perplexed. It is interesting to watch our radius logs too. I have one AP overlooking a little town of 200 people, but it is right next to an interstate and the radius log from that AP is always showing logins. Must be all the trucker laptops whizzing by looking for an open AP. I've been toying with the idea of turning on hotspot functionality so that we can provide transient access, and this is probably a good reason to do it. Matt Larsen [EMAIL PROTECTED] Ralph wrote: Well, JohnnyO- you might want to also educate these people, then: http://www.drivertech.com/ Their product, a Truckpc is being installed in many fleet vehicles. One fleet that comes to mind is US Express, a long haul package hauling service http://www.usxpress.com/ The device communicates back to the office via Satellite, Cellular, or WiFi- whichever is available and cheaper. According to the manufacturer, it can hunt down open and unsecured access points and do your HIGHLY illegal act of connecting and sending its data whenever it can. I'm not endorsing this behavior, of course, but I wanted to bring it to the attention of the list. How do I know? My WISP operates hotspot portals that allow casual users to make use of our mountain and tower-top sectors of WiFi. These cover major portions of several towns. These towns have a major Interstate route passing through them. I began noticing numerous TRUCKPC leases being granted by the DHCP servers in these towns. I became concerned about what they were, so I did a little internet research and ended up on the phone with technical support at Drivertech. This is who confirmed how these devices operate and who the probable fleet culprit was. If anyone has portals near major truck routes, check your DHCP logs and see if you see the TRUCKPC SSID grabbing leases. You may want to
RE: [WISPA] TRUCKPC
I don't either. They were just thoughts I was having while driving on a long trip and seeing their truck. And you forgot to say HIGHLY illegal: g The Sillycon Valley has a pretty high percentage of Technically savvy users so that probably accounts for the low percentage of unsecured points. Europe is also leaps ahead of us in user awareness of this. Ralph -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Travis Johnson Sent: Sunday, December 31, 2006 1:04 PM To: WISPA General List Subject: Re: [WISPA] TRUCKPC Hi, I would agree that the percentage of open AP's has dropped in the past few years. However, I still believe it's above 50%. I just can't see a company that already has an operating, working system in place that is basically FREE for them changing to paying ISP's around the country for service. Doesn't make sense, other than what they are doing is illegal. :) Travis Ralph wrote: Because they may have their data in a more timely and reliable fashion than they get it by using casual access. When I first got into WiFi, I saw that 80% of detected (broadcasting) access points were fully open. Within a year, it dropped to 60%. Now, several years later it is well below 50%, and out in the more technically savvy areas (just spent 4 months in Sillycon Valley) it is like 10% or less. Consumers are finally getting more in tune with security. Or more accurately, manufacturers are pushing security more heavily now. A customer had just better not ever push that button on the front of a Linksys if they don't know what they are doing (grin). Remember- I am talking about consumers here- not what we as WISPS set up or provide to them. Ralph _ From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Travis Johnson Sent: Sunday, December 31, 2006 12:46 AM To: WISPA General List Subject: Re: [WISPA] TRUCKPC Hi, Why would this company pay for WiFi access when they are now getting all the access they need for free? It's actually a great idea... have the trucks scan all the time and once they find an open AP, connect and upload all their info. Travis Microserv Ralph wrote: I was on the way to one of our remote towers today and was on the interstate next to two US Express trucks. I turned on a sniffer to see if they also had access points on them, but there was nothing. I guess they just scan, looking for free wireless to use. Being bored with the drive, I was thinking about the TRUCKPC thing a lot and had an idea to make some code changes to the mobile access point I have in my vehicle. Its hooked up to a verizon card and I have a roving EVDO to WIFi hot spot gateway. ( see http://ralphfowler.com/stompbox/index.htm ) I could make a couple of code changes to allow the box to also sniff a bit and see exactly what these things are doing when they find a free internet connection. I was also thinking that we, as an industry, could possibly cut a deal with Drivertech to allow their customers to have access to our networks. Of course there would be a lot more to work out and I'm not the guy for that job ;-) Just some Saturday musings... -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Matt Larsen - Lists Sent: Saturday, December 30, 2006 1:16 AM To: WISPA General List Subject: Re: [WISPA] TRUCKPC AHA I've been wondering where the hell that TruckPC request has been coming from!! Occasionally, I have techs who have left the radius authentication disabled on an access point and the dhcp logs will start to fill up with requests from TruckPC. They were coming from access points all over the place and I was a little perplexed. It is interesting to watch our radius logs too. I have one AP overlooking a little town of 200 people, but it is right next to an interstate and the radius log from that AP is always showing logins. Must be all the trucker laptops whizzing by looking for an open AP. I've been toying with the idea of turning on hotspot functionality so that we can provide transient access, and this is probably a good reason to do it. Matt Larsen [EMAIL PROTECTED] Ralph wrote: Well, JohnnyO- you might want to also educate these people, then: http://www.drivertech.com/ Their product, a Truckpc is being installed in many fleet vehicles. One fleet that comes to mind is US Express, a long haul package hauling service http://www.usxpress.com/ The device communicates back to the office via Satellite, Cellular, or WiFi- whichever is available and cheaper. According to the manufacturer, it can hunt down open and unsecured access points and do your HIGHLY illegal act of connecting and sending its data whenever it can. I'm not endorsing this behavior, of course, but I
RE: [WISPA] More Saturday Musings- Another (older) Truck-PC type
nod, a scan on the AP shows them... -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ralph Sent: Sunday, December 31, 2006 4:23 PM To: 'WISPA General List' Subject: RE: [WISPA] More Saturday Musings- Another (older) Truck-PC type If they still operate as before, you shouldn't see them unless you set your tower as a client/cpe. I have never seen them do anything with an AP, other than BE one. Dis you know that was what the SST-PR-1 was before? -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Rick Smith Sent: Sunday, December 31, 2006 2:35 PM To: 'WISPA General List' Subject: RE: [WISPA] More Saturday Musings- Another (older) Truck-PC type yeah I can see 10 - 12 of them at any time off one of my towers. I'm 1/2 mile from a sears garage where they repair those vans... -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ralph Sent: Saturday, December 30, 2006 11:11 PM To: 'WISPA General List' Subject: [WISPA] More Saturday Musings- Another (older) Truck-PC type Hi Matt- Back in my old Net-Stumbler days (back when you could drive across Atlanta and see less than 20 Access Points, and 2 were my own), the experimenters of the day became perplexed by this SSID that kept popping up at random times. It was an Access Point named SST-PR-1 The first time I saw it, I was in my basement and I knew full well what I could normally receive down there. There were all kinds of theories: an AP on a low earth orbit satellite, something on a passing vehicle, some sort of temporary SSID on a piece of gear that just showed up right at bootup, etc. Googling for SST-PR-1 might actually turn up some of the old discussions about it. Anyway- I started seeing it a lot in the evenings after they built some apartments behind me. I sent my son over there on his bike with a camera to do some investigating. He soon found a Sears Service truck (the ones with the small Globalstar dish on top like you see on many semis) parked in front of an apartment. He went back with a laptop and traced the signal to this van. So we had it figured out- Sears truck. A few days later, my son saw the driver coming home for the evening and the driver gave him the dog and pony show of the truck computer. It is linked to Sears parts database via satellite. The SST-PR-1 is the SSID of an integral access point that allows the driver to use a laptop from inside the customer's home to check on parts, see service manuals, etc. The SST stands for Sears Smart Toolbox. I once told a friend about it and he set up a laptop to warn him when the Sears guy entered the neighborhood on his way to fix their refrigerator. An early warning system of sorts. So, the big SST-PR-1 mystery was finally solved by a 12 year old kid! Ralph -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Matt Larsen - Lists Sent: Saturday, December 30, 2006 1:16 AM To: WISPA General List Subject: Re: [WISPA] TRUCKPC AHA I've been wondering where the hell that TruckPC request has been coming from!! Occasionally, I have techs who have left the radius authentication disabled on an access point and the dhcp logs will start to fill up with requests from TruckPC. They were coming from access points all over the place and I was a little perplexed. It is interesting to watch our radius logs too. I have one AP overlooking a little town of 200 people, but it is right next to an interstate and the radius log from that AP is always showing logins. Must be all the trucker laptops whizzing by looking for an open AP. I've been toying with the idea of turning on hotspot functionality so that we can provide transient access, and this is probably a good reason to do it. Matt Larsen [EMAIL PROTECTED] Ralph wrote: Well, JohnnyO- you might want to also educate these people, then: http://www.drivertech.com/ Their product, a Truckpc is being installed in many fleet vehicles. One fleet that comes to mind is US Express, a long haul package hauling service http://www.usxpress.com/ The device communicates back to the office via Satellite, Cellular, or WiFi- whichever is available and cheaper. According to the manufacturer, it can hunt down open and unsecured access points and do your HIGHLY illegal act of connecting and sending its data whenever it can. I'm not endorsing this behavior, of course, but I wanted to bring it to the attention of the list. How do I know? My WISP operates hotspot portals that allow casual users to make use of our mountain and tower-top sectors of WiFi. These cover major portions of several towns. These towns have a major Interstate route passing through them. I began noticing numerous TRUCKPC leases being granted by the DHCP servers in these towns. I became concerned about what they were, so I did a little internet research and ended up on the phone
Re: [WISPA] More Saturday Musings- Another (older) Truck-PC type
ad hoc mode? Rick Smith wrote: nod, a scan on the AP shows them... -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ralph Sent: Sunday, December 31, 2006 4:23 PM To: 'WISPA General List' Subject: RE: [WISPA] More Saturday Musings- Another (older) Truck-PC type If they still operate as before, you shouldn't see them unless you set your tower as a client/cpe. I have never seen them do anything with an AP, other than BE one. Dis you know that was what the SST-PR-1 was before? -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Rick Smith Sent: Sunday, December 31, 2006 2:35 PM To: 'WISPA General List' Subject: RE: [WISPA] More Saturday Musings- Another (older) Truck-PC type yeah I can see 10 - 12 of them at any time off one of my towers. I'm 1/2 mile from a sears garage where they repair those vans... -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ralph Sent: Saturday, December 30, 2006 11:11 PM To: 'WISPA General List' Subject: [WISPA] More Saturday Musings- Another (older) Truck-PC type Hi Matt- Back in my old Net-Stumbler days (back when you could drive across Atlanta and see less than 20 Access Points, and 2 were my own), the experimenters of the day became perplexed by this SSID that kept popping up at random times. It was an Access Point named SST-PR-1 The first time I saw it, I was in my basement and I knew full well what I could normally receive down there. There were all kinds of theories: an AP on a low earth orbit satellite, something on a passing vehicle, some sort of temporary SSID on a piece of gear that just showed up right at bootup, etc. Googling for SST-PR-1 might actually turn up some of the old discussions about it. Anyway- I started seeing it a lot in the evenings after they built some apartments behind me. I sent my son over there on his bike with a camera to do some investigating. He soon found a Sears Service truck (the ones with the small Globalstar dish on top like you see on many semis) parked in front of an apartment. He went back with a laptop and traced the signal to this van. So we had it figured out- Sears truck. A few days later, my son saw the driver coming home for the evening and the driver gave him the dog and pony show of the truck computer. It is linked to Sears parts database via satellite. The SST-PR-1 is the SSID of an integral access point that allows the driver to use a laptop from inside the customer's home to check on parts, see service manuals, etc. The SST stands for Sears Smart Toolbox. I once told a friend about it and he set up a laptop to warn him when the Sears guy entered the neighborhood on his way to fix their refrigerator. An early warning system of sorts. So, the big SST-PR-1 mystery was finally solved by a 12 year old kid! Ralph -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Matt Larsen - Lists Sent: Saturday, December 30, 2006 1:16 AM To: WISPA General List Subject: Re: [WISPA] TRUCKPC AHA I've been wondering where the hell that TruckPC request has been coming from!! Occasionally, I have techs who have left the radius authentication disabled on an access point and the dhcp logs will start to fill up with requests from TruckPC. They were coming from access points all over the place and I was a little perplexed. It is interesting to watch our radius logs too. I have one AP overlooking a little town of 200 people, but it is right next to an interstate and the radius log from that AP is always showing logins. Must be all the trucker laptops whizzing by looking for an open AP. I've been toying with the idea of turning on hotspot functionality so that we can provide transient access, and this is probably a good reason to do it. Matt Larsen [EMAIL PROTECTED] Ralph wrote: Well, JohnnyO- you might want to also educate these people, then: http://www.drivertech.com/ Their product, a Truckpc is being installed in many fleet vehicles. One fleet that comes to mind is US Express, a long haul package hauling service http://www.usxpress.com/ The device communicates back to the office via Satellite, Cellular, or WiFi- whichever is available and cheaper. According to the manufacturer, it can hunt down open and unsecured access points and do your HIGHLY illegal act of connecting and sending its data whenever it can. I'm not endorsing this behavior, of course, but I wanted to bring it to the attention of the list. How do I know? My WISP operates hotspot portals that allow casual users to make use of our mountain and tower-top sectors of WiFi. These cover major portions of several towns. These towns have a major Interstate route passing through them. I began noticing numerous TRUCKPC leases being granted by the DHCP servers in these towns. I became concerned about what they were, so I did a little internet research
RE: [WISPA] More Saturday Musings- Another (older) Truck-PC type
no, mikrotik in this case, doing a 'scan' on the interface...shows their ssid's in their trucks... -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of George Rogato Sent: Sunday, December 31, 2006 5:05 PM To: WISPA General List Subject: Re: [WISPA] More Saturday Musings- Another (older) Truck-PC type ad hoc mode? Rick Smith wrote: nod, a scan on the AP shows them... -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ralph Sent: Sunday, December 31, 2006 4:23 PM To: 'WISPA General List' Subject: RE: [WISPA] More Saturday Musings- Another (older) Truck-PC type If they still operate as before, you shouldn't see them unless you set your tower as a client/cpe. I have never seen them do anything with an AP, other than BE one. Dis you know that was what the SST-PR-1 was before? -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Rick Smith Sent: Sunday, December 31, 2006 2:35 PM To: 'WISPA General List' Subject: RE: [WISPA] More Saturday Musings- Another (older) Truck-PC type yeah I can see 10 - 12 of them at any time off one of my towers. I'm 1/2 mile from a sears garage where they repair those vans... -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ralph Sent: Saturday, December 30, 2006 11:11 PM To: 'WISPA General List' Subject: [WISPA] More Saturday Musings- Another (older) Truck-PC type Hi Matt- Back in my old Net-Stumbler days (back when you could drive across Atlanta and see less than 20 Access Points, and 2 were my own), the experimenters of the day became perplexed by this SSID that kept popping up at random times. It was an Access Point named SST-PR-1 The first time I saw it, I was in my basement and I knew full well what I could normally receive down there. There were all kinds of theories: an AP on a low earth orbit satellite, something on a passing vehicle, some sort of temporary SSID on a piece of gear that just showed up right at bootup, etc. Googling for SST-PR-1 might actually turn up some of the old discussions about it. Anyway- I started seeing it a lot in the evenings after they built some apartments behind me. I sent my son over there on his bike with a camera to do some investigating. He soon found a Sears Service truck (the ones with the small Globalstar dish on top like you see on many semis) parked in front of an apartment. He went back with a laptop and traced the signal to this van. So we had it figured out- Sears truck. A few days later, my son saw the driver coming home for the evening and the driver gave him the dog and pony show of the truck computer. It is linked to Sears parts database via satellite. The SST-PR-1 is the SSID of an integral access point that allows the driver to use a laptop from inside the customer's home to check on parts, see service manuals, etc. The SST stands for Sears Smart Toolbox. I once told a friend about it and he set up a laptop to warn him when the Sears guy entered the neighborhood on his way to fix their refrigerator. An early warning system of sorts. So, the big SST-PR-1 mystery was finally solved by a 12 year old kid! Ralph -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Matt Larsen - Lists Sent: Saturday, December 30, 2006 1:16 AM To: WISPA General List Subject: Re: [WISPA] TRUCKPC AHA I've been wondering where the hell that TruckPC request has been coming from!! Occasionally, I have techs who have left the radius authentication disabled on an access point and the dhcp logs will start to fill up with requests from TruckPC. They were coming from access points all over the place and I was a little perplexed. It is interesting to watch our radius logs too. I have one AP overlooking a little town of 200 people, but it is right next to an interstate and the radius log from that AP is always showing logins. Must be all the trucker laptops whizzing by looking for an open AP. I've been toying with the idea of turning on hotspot functionality so that we can provide transient access, and this is probably a good reason to do it. Matt Larsen [EMAIL PROTECTED] Ralph wrote: Well, JohnnyO- you might want to also educate these people, then: http://www.drivertech.com/ Their product, a Truckpc is being installed in many fleet vehicles. One fleet that comes to mind is US Express, a long haul package hauling service http://www.usxpress.com/ The device communicates back to the office via Satellite, Cellular, or WiFi- whichever is available and cheaper. According to the manufacturer, it can hunt down open and unsecured access points and do your HIGHLY illegal act of connecting and sending its data whenever it can. I'm not endorsing this behavior, of course,
Re: [WISPA] More Saturday Musings- Another (older) Truck-PC type
Right, but do they have their units in ad hoc mode shouting out that essid? I see HP setup quite abit and that is in ad hoc mode. Naturally thats an HP printer waiting to get set up. George Rick Smith wrote: no, mikrotik in this case, doing a 'scan' on the interface...shows their ssid's in their trucks... -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of George Rogato Sent: Sunday, December 31, 2006 5:05 PM To: WISPA General List Subject: Re: [WISPA] More Saturday Musings- Another (older) Truck-PC type ad hoc mode? Rick Smith wrote: nod, a scan on the AP shows them... -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ralph Sent: Sunday, December 31, 2006 4:23 PM To: 'WISPA General List' Subject: RE: [WISPA] More Saturday Musings- Another (older) Truck-PC type If they still operate as before, you shouldn't see them unless you set your tower as a client/cpe. I have never seen them do anything with an AP, other than BE one. Dis you know that was what the SST-PR-1 was before? -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Rick Smith Sent: Sunday, December 31, 2006 2:35 PM To: 'WISPA General List' Subject: RE: [WISPA] More Saturday Musings- Another (older) Truck-PC type yeah I can see 10 - 12 of them at any time off one of my towers. I'm 1/2 mile from a sears garage where they repair those vans... -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ralph Sent: Saturday, December 30, 2006 11:11 PM To: 'WISPA General List' Subject: [WISPA] More Saturday Musings- Another (older) Truck-PC type Hi Matt- Back in my old Net-Stumbler days (back when you could drive across Atlanta and see less than 20 Access Points, and 2 were my own), the experimenters of the day became perplexed by this SSID that kept popping up at random times. It was an Access Point named SST-PR-1 The first time I saw it, I was in my basement and I knew full well what I could normally receive down there. There were all kinds of theories: an AP on a low earth orbit satellite, something on a passing vehicle, some sort of temporary SSID on a piece of gear that just showed up right at bootup, etc. Googling for SST-PR-1 might actually turn up some of the old discussions about it. Anyway- I started seeing it a lot in the evenings after they built some apartments behind me. I sent my son over there on his bike with a camera to do some investigating. He soon found a Sears Service truck (the ones with the small Globalstar dish on top like you see on many semis) parked in front of an apartment. He went back with a laptop and traced the signal to this van. So we had it figured out- Sears truck. A few days later, my son saw the driver coming home for the evening and the driver gave him the dog and pony show of the truck computer. It is linked to Sears parts database via satellite. The SST-PR-1 is the SSID of an integral access point that allows the driver to use a laptop from inside the customer's home to check on parts, see service manuals, etc. The SST stands for Sears Smart Toolbox. I once told a friend about it and he set up a laptop to warn him when the Sears guy entered the neighborhood on his way to fix their refrigerator. An early warning system of sorts. So, the big SST-PR-1 mystery was finally solved by a 12 year old kid! Ralph -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Matt Larsen - Lists Sent: Saturday, December 30, 2006 1:16 AM To: WISPA General List Subject: Re: [WISPA] TRUCKPC AHA I've been wondering where the hell that TruckPC request has been coming from!! Occasionally, I have techs who have left the radius authentication disabled on an access point and the dhcp logs will start to fill up with requests from TruckPC. They were coming from access points all over the place and I was a little perplexed. It is interesting to watch our radius logs too. I have one AP overlooking a little town of 200 people, but it is right next to an interstate and the radius log from that AP is always showing logins. Must be all the trucker laptops whizzing by looking for an open AP. I've been toying with the idea of turning on hotspot functionality so that we can provide transient access, and this is probably a good reason to do it. Matt Larsen [EMAIL PROTECTED] Ralph wrote: Well, JohnnyO- you might want to also educate these people, then: http://www.drivertech.com/ Their product, a Truckpc is being installed in many fleet vehicles. One fleet that comes to mind is US Express, a long haul package hauling service http://www.usxpress.com/ The device communicates back to the office via Satellite, Cellular, or WiFi- whichever is available and cheaper. According to the manufacturer, it can hunt down open and unsecured access points and do
Re: [WISPA] Quick-Connect PoE at CPE
Pac Wireless makes them: http://pacwireless.com/products/RJ45-ECS.shtml Mark Nash wrote: George, awhile back I got from you a cat5 pigtail that had a quick-connect fitting on it. I think I can use these for my Tranzeo CPEs if I bore out the hole in the boot of the CPE. This could speed up installs some troubleshooting as well, as we can disconnect the customer's PoE cable and plug into it directly from the inverter in my truck without taking off the boot and risking water problems. How to you obtain these? and do you put on the pigtail portion of it or do they come terminated? What are others doing for this? Mark Nash Network Engineer UnwiredOnline.Net 350 Holly Street Junction City, OR 97448 http://www.uwol.net 541-998- 541-998-5599 fax -- George Rogato Welcome to WISPA www.wispa.org http://signup.wispa.org/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] Quick-Connect PoE at CPE
Cool...just ordered some from Streakwave $5.95 each. Mark Nash Network Engineer UnwiredOnline.Net 350 Holly Street Junction City, OR 97448 http://www.uwol.net 541-998- 541-998-5599 fax - Original Message - From: George Rogato [EMAIL PROTECTED] To: WISPA General List wireless@wispa.org Sent: Sunday, December 31, 2006 3:09 PM Subject: Re: [WISPA] Quick-Connect PoE at CPE Pac Wireless makes them: http://pacwireless.com/products/RJ45-ECS.shtml Mark Nash wrote: George, awhile back I got from you a cat5 pigtail that had a quick-connect fitting on it. I think I can use these for my Tranzeo CPEs if I bore out the hole in the boot of the CPE. This could speed up installs some troubleshooting as well, as we can disconnect the customer's PoE cable and plug into it directly from the inverter in my truck without taking off the boot and risking water problems. How to you obtain these? and do you put on the pigtail portion of it or do they come terminated? What are others doing for this? Mark Nash Network Engineer UnwiredOnline.Net 350 Holly Street Junction City, OR 97448 http://www.uwol.net 541-998- 541-998-5599 fax -- George Rogato Welcome to WISPA www.wispa.org http://signup.wispa.org/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] Quick-Connect PoE at CPE
Don't the tranzeo's already come with some kind of external quick connect? Mark Nash wrote: Cool...just ordered some from Streakwave $5.95 each. Mark Nash Network Engineer UnwiredOnline.Net 350 Holly Street Junction City, OR 97448 http://www.uwol.net 541-998- 541-998-5599 fax - Original Message - From: George Rogato [EMAIL PROTECTED] To: WISPA General List wireless@wispa.org Sent: Sunday, December 31, 2006 3:09 PM Subject: Re: [WISPA] Quick-Connect PoE at CPE Pac Wireless makes them: http://pacwireless.com/products/RJ45-ECS.shtml Mark Nash wrote: George, awhile back I got from you a cat5 pigtail that had a quick-connect fitting on it. I think I can use these for my Tranzeo CPEs if I bore out the hole in the boot of the CPE. This could speed up installs some troubleshooting as well, as we can disconnect the customer's PoE cable and plug into it directly from the inverter in my truck without taking off the boot and risking water problems. How to you obtain these? and do you put on the pigtail portion of it or do they come terminated? What are others doing for this? Mark Nash Network Engineer UnwiredOnline.Net 350 Holly Street Junction City, OR 97448 http://www.uwol.net 541-998- 541-998-5599 fax -- George Rogato Welcome to WISPA www.wispa.org http://signup.wispa.org/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- George Rogato Welcome to WISPA www.wispa.org http://signup.wispa.org/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] Quick-Connect PoE at CPE
It's not a quick-connect...just a pass-through. If you want access to the RJ45 jack on the CPE, you've got to take the whole weatherproof boot off. That makes a big difference as to what I'm wanting to do. With the quick-connect pigtail, CPEs can be assembled, terminated and configured in the shop prior to installation in the field. When our install tech goes out, he will test the CPE with a test cable (running off the inverter in the truck) just by aiming the CPE by hand. The Tranzeo has 5 signal strength LEDs on the back of it. If a location is chosen, it still needs to wrenched down on a mount for the one installer to be able to do further testing. Prior to having these, the installer would have to either put a boot on with the test cable, or risk water damage to the CPE during testing. So WITH these, on-premises testing and installation can occur in a weatherproof environment. Also, it's very handy for an on-site tech to be able to plug into the CPE when on a service call. All testing/realignment/etc can be done without the customer being present. Mark Nash Network Engineer UnwiredOnline.Net 350 Holly Street Junction City, OR 97448 http://www.uwol.net 541-998- 541-998-5599 fax - Original Message - From: George Rogato [EMAIL PROTECTED] To: WISPA General List wireless@wispa.org Sent: Sunday, December 31, 2006 3:27 PM Subject: Re: [WISPA] Quick-Connect PoE at CPE Don't the tranzeo's already come with some kind of external quick connect? Mark Nash wrote: Cool...just ordered some from Streakwave $5.95 each. Mark Nash Network Engineer UnwiredOnline.Net 350 Holly Street Junction City, OR 97448 http://www.uwol.net 541-998- 541-998-5599 fax - Original Message - From: George Rogato [EMAIL PROTECTED] To: WISPA General List wireless@wispa.org Sent: Sunday, December 31, 2006 3:09 PM Subject: Re: [WISPA] Quick-Connect PoE at CPE Pac Wireless makes them: http://pacwireless.com/products/RJ45-ECS.shtml Mark Nash wrote: George, awhile back I got from you a cat5 pigtail that had a quick-connect fitting on it. I think I can use these for my Tranzeo CPEs if I bore out the hole in the boot of the CPE. This could speed up installs some troubleshooting as well, as we can disconnect the customer's PoE cable and plug into it directly from the inverter in my truck without taking off the boot and risking water problems. How to you obtain these? and do you put on the pigtail portion of it or do they come terminated? What are others doing for this? Mark Nash Network Engineer UnwiredOnline.Net 350 Holly Street Junction City, OR 97448 http://www.uwol.net 541-998- 541-998-5599 fax -- George Rogato Welcome to WISPA www.wispa.org http://signup.wispa.org/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- George Rogato Welcome to WISPA www.wispa.org http://signup.wispa.org/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: wireless@wispa.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/
Re: [WISPA] recommendation for Client POE integrated radio for 802.11b/g
I suppose that the only real difference is that you can drive up within a few hundred feet of any house with a unsecured wireless network, and get online without anyone knowing (or caring most of the time). Its more like walking up and getting a drink from your water hose in your yard than JohnnyO's analogy of using your wife. A sip of water from the hose or 5 minutes on your wireless router neither one significantly costs anyone. While it is technically "stealing" it is hard to suggest that it costs the paying subscriber has sustained any monetary loss or any cost of real performance, internet speed, or water pressure. If his files on his PC were shared on his insecure WLAN, and you drove up and snooped/altered/deleted them, then it would seem that there is grounds for vandalism/business interruption, unauthorized information access, etc, etc. If I walk up to your water hose, steal it, cut it, or run several hoses together and fill my 30,000 gallon pool, or stick it in your window and flood your house, then there is a problem, and a real issue, and a crime has been committed, since it legitimately costs you real money to remedy. If I drive near your home, get on the internet, check my email, make a VOIP call, look up a stock price, or whatever, then I don't suspect anyone will complain, or know that I did it. It also won't cost you anything. If I sit out there for hours downloading copyright violations (P2P) or cracking your file server, or send 10,000,000 spam messages getting your IP added to the RBL's, then there is a real issue. An emergency communication plan that includes "war driving" to establish VOIP is akin to a fire department that plans to put out fires with a series of garden hoses and outside hose bibs instead of installing real fire hydrants. As far as the legality of war driving, I am not sure that MOST war driving is "catch-able" "convict-able" or "quantify-able" (in the cost to the customer) or whatever. Its also against the law to sample grapes at the grocery store. I don't do that, but I am sure that people have done that for years. I have never even heard of anyone getting in trouble for it. (war driving or grape sampling). I suppose that if you got greedy with either one, you would get your hand slapped. Pete Davis NoDial.net. Rick Smith wrote: ah yes, but then you would've had a cop knock on the front door, and ASK your permission to use the phone. At which point, you COULD say "NO!" and shut the door on them. Or, you could let them in, and tell them "OK! here it is!" BUT...They wouldn't do the equivalent of walking up to your NID, plugging a butt set in and just dialing away... If I, right now, drove up in front of your house, got out of my truck, walked up to your Network panel that Verizon or the local phone co. put there as their demarcation point, and plugged my butt set in and got dial tone and dialed Hawaii to chat with someone at YOUR expense, I could be found / shot / arrested / sued / what have you. What's different with WiFi ? Nothing but the excuses we allow people to continue to make. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of Pete Davis Sent: Sunday, December 31, 2006 3:11 PM To: WISPA General List Subject: Re: [WISPA] recommendation for Client POE integrated radio for 802.11b/g The legality and ethics of using an open access point is questionable, but there is a liability issue as well. In most of the areas that I cover with my network, there is a strong signal with SSID of NoDial. Connecting to this will get you a DHCP address even, without a WEP or other encryption key. Until I know that you have connected and moved your mac address to a list that authorizes your connection, all of your outbound packets will be sent to http://64.123.108.28:80 This brings up a liability issue. If the emergency communication van tech wastes 2 hrs trying to get hold of me, get connected to the internet, or whatever, and $10M of houses burn down, because they couldn't get to the fire department via a hacked VOIP solution, then am I gonna get sued? If they connect to my private home network that I intentionally left open, and my custom made uber-hacker passive/aggressive firewall unleashes a blackops virus that turns their laptops into bricks. Then what? I guess, that by JohnnyO's example, if you come into my open door and try to visit with my wife, and you step on a rake that gives you a brain anurism, I guess that makes me guilty (or not guilty) of manslaughter. I lost score in this ballgame. If the cops are in a pursuit in my neighborhood, and run their squad car off the road breaking the radio, and they want to use my home phone to call the office, I would let them. Not because I HAVE to, but to be a good citizen. If I HAD to, then the 4th amendment just went out the window. pd Jack Unger wrote: Holy brainfade, JohnnyO. Your comments about "highly illegal" just went STRAIGHT over my