Re: Outdoor Wireless Access Point
Hi Valdis, Thanks for your time and your answer, Of course I know how to search in google or internet. But the problem is as you told to have a good network and launch the best solution. And not do wrong things once more. Thanks On Sun, Apr 1, 2012 at 4:19 AM, valdis.kletni...@vt.edu wrote: On Sat, 31 Mar 2012 15:48:37 -0700, Network IP Dog said: I'm utterly amazed how many people give away free consultant work. A lot of us are quite busy with $DAYJOB and not in a position to take on a consulting engagement - and there's no good micropayment infrastructure to deal with 20-minute consulting gigs anyway. So we give away 5 minute chunks of our time for the benefit of the networking community. It's a large chunk of what makes 'best common practices' evolve. (Hint - that consultant you hired? How much of *their* knowledge did they aquire from other people's free advice?) And those of us who *do* go looking for consulting gigs often need to market ourselves as somebody clued. You read NANOG for a while, you get a good idea of who is clued and who isn't. And thus you decide who gets the gig. Google is your friend... ;^) http://www.xckd.com/979/ -- Regards, Shahab Vahabzadeh, Network Engineer and System Administrator Cell Phone: +1 (415) 871 0742 PGP Key Fingerprint = 8E34 B335 D702 0CA7 5A81 C2EE 76A2 46C2 5367 BF90
Re: Outdoor Wireless Access Point
Dear IP Dog, Thanks for your time too, but I think you are so free and you are only showing off yourself busy ;) Because your answer reflect that to us, Here is a mailing list and open community ;) So if you do not have a good answer for question please go away ;) Thanks On Sun, Apr 1, 2012 at 3:18 AM, Network IP Dog network.ip...@gmail.comwrote: Hi...How do I do it! I'm utterly amazed how many people give away free consultant work. We need to keep people working... not giving it away. Ethics... Security... etc... Does the university give away free diploma's? I don't think so. Must be another copy paste e^%$#?r too! Google is your friend... ;^) Cheers! Ephesians 4:32Cheers!!! A password is like a... toothbrush ;^) Choose a good one, change it regularly and don't share it. -Original Message- From: Shahab Vahabzadeh [mailto:sh.vahabza...@gmail.com] Sent: Saturday, March 31, 2012 2:39 AM To: nanog@nanog.org Subject: Outdoor Wireless Access Point Hi there, I asked for a wireless solution for a university, in which they want indoor wireless solution for more than 5 building (at least two floor) and outdoor wireless solution for near 160m*280m garden. As I look for maps we need at least 3 or 4 outdoor radio, I think in these networks the best solution is to have only one SSID in whole network to give mobility for the network, is this called ad-hoc? or it has an other name? I do not know if I could ask question clearly or not, suppose we have 4 radio but only one SSID is broadcasting and when you are near the radio is near to you you will get service from that one, as this solution must be implement for indoor ones too. And if there is any good company which can both indoor and outdoor solution and they have shipping to Iran too or reseller in Iran please give me the url. Thanks -- Regards, Shahab Vahabzadeh, Network Engineer and System Administrator Cell Phone: +1 (415) 871 0742 PGP Key Fingerprint = 8E34 B335 D702 0CA7 5A81 C2EE 76A2 46C2 5367 BF90 -- Regards, Shahab Vahabzadeh, Network Engineer and System Administrator Cell Phone: +1 (415) 871 0742 PGP Key Fingerprint = 8E34 B335 D702 0CA7 5A81 C2EE 76A2 46C2 5367 BF90
Re: Outdoor Wireless Access Point
On Sun, 01 Apr 2012 11:28:34 +0430, Shahab Vahabzadeh said: Thanks for your time and your answer, Of course I know how to search in google or internet. But the problem is as you told to have a good network and launch the best solution. Unfortunately, I can't make any real recommendation for your net - although we have some 1300 access points scattered across 100 buildings (a combination of Cisco and Aruba gear) with a peak of 10,700 or so simultaneous users, we have not ireally addressed the issue of outdoor wireless. For much of campus, it's not a big problem, as buildings are packed fairly close together, and many of the good benches, trees, retaining walls, and other places to sit are close enough to a building that signal leakage from inside allows users to connect anyhow. But there's a 22 acre field (about twice the size of the garden you are trying to support) in the middle of campus... literally in the middle, as in the campus is built around that field. ;) pgp8WXtMZQIQ4.pgp Description: PGP signature
Re: Outdoor Wireless Access Point
On 31 Mar 2012, at 23:51, Network IP Dog network.ip...@gmail.commailto:network.ip...@gmail.com wrote: Hi...How do I do it! I'm utterly amazed how many people give away free consultant work. We need to keep people working... not giving it away. Ethics... Security... etc... Does the university give away free diploma's? I don't think so. Must be another copy paste e^%$#?r too! Google is your friend... ;^) Cheers! Ephesians 4:32Cheers!!! For I was hungry and you gave me nothing to eat, I was thirsty and you gave me nothing to drink, 43 I was a stranger and you did not invite me in, I needed clothes and you did not clothe me, I was sick and in prison and you did not look after me.’ 44 I needed some help building a wireless network and you wanted consultancy fees. I think the day we stop helping each other on this list and start demanding consultancy fees will be the day the Internet really did die.. So whilst nobody would document an end to end design for nothing, I think the odd snipped of good advice should always be free. Of course, y'all should google it first because how else are they going to send you relevant advertisements! -- Leigh __ This email has been scanned by the Symantec Email Security.cloud service. For more information please visit http://www.symanteccloud.com __
April fools joke?
http://www.bbc.co.uk/news/uk-politics-17576745 It's sad when you just can't tell with things like this.. -- Leigh __ This email has been scanned by the Symantec Email Security.cloud service. For more information please visit http://www.symanteccloud.com __
Re: Outdoor Wireless Access Point
If you use unifi there is an outdoor version. You can mount it outside a building or on a pole. Jared Mauch On Apr 1, 2012, at 3:58 AM, valdis.kletni...@vt.edu wrote: But there's a 22 acre field (about twice the size of the garden you are trying to support) in the middle of campus... literally in the middle, as in the campus is built around that field. ;)
Re: Attack on the DNS ?
On Sat, Mar 31, 2012 at 10:09 PM, Greg Ihnen os10ru...@gmail.com wrote: I manage a tiny network in the Amazon, a satellite internet connection and decent sized wireless network. Is DNS traffic being directed to bogus servers? Are the real servers being overloaded? Am I seeing the results of some kind of DDOS mitigation technique? If you are using broadband connection from the brazilian incumbent operator (Oi), you might indeed being redirected to bogus servers. They are very fond of monetizing techniques with their user base, using either DNS or all the traffic for that matter (Phorm). Rubens
Re: April fools joke?
I hate April 1 on the Web. You are right you never can tell. I would be appalled if someone as respectable as the BBC stoops to downright dumb pranks. However, it is England. They have some of the most strict laws in the Free world. I hate the Interweb on April 1. lol -Original Message- From: Leigh Porter leigh.por...@ukbroadband.com Date: Sun, 1 Apr 2012 10:45:51 + To: nanog@nanog.org nanog@nanog.org Subject: April fools joke? http://www.bbc.co.uk/news/uk-politics-17576745 It's sad when you just can't tell with things like this.. -- Leigh __ This email has been scanned by the Symantec Email Security.cloud service. For more information please visit http://www.symanteccloud.com __
Re: April fools joke?
April 1st or not its the gist of that story is probably already true whether you know it or not. On Sun, Apr 1, 2012 at 10:30 AM, Justin Wilson li...@mtin.net wrote: I hate April 1 on the Web. You are right you never can tell. I would be appalled if someone as respectable as the BBC stoops to downright dumb pranks. However, it is England. They have some of the most strict laws in the Free world. I hate the Interweb on April 1. lol -Original Message- From: Leigh Porter leigh.por...@ukbroadband.com Date: Sun, 1 Apr 2012 10:45:51 + To: nanog@nanog.org nanog@nanog.org Subject: April fools joke? http://www.bbc.co.uk/news/uk-politics-17576745 It's sad when you just can't tell with things like this.. -- Leigh __ This email has been scanned by the Symantec Email Security.cloud service. For more information please visit http://www.symanteccloud.com __
CCDP (Was: April fools joke?)
On 1 Apr 2012, at 15:30, Justin Wilson wrote: I hate April 1 on the Web. You are right you never can tell. I would be appalled if someone as respectable as the BBC stoops to downright dumb pranks. It is true. It's called the Communications Capabilities Development Programme (CCDP) and is comprehensively discussed at the OpenRightsGroup* wiki: http://wiki.openrightsgroup.org/wiki/Communications_Capabilities_Development_Programme ...and somewhat less comprehensively at: http://en.wikipedia.org/wiki/Communications_Capabilities_Development_Programme See also ZDNet from February, in case you think it's still an April 1st joke: http://www.zdnet.co.uk/news/security-threats/2012/02/20/isps-kept-in-dark-about-uks-plans-to-intercept-twitter-40095083/ - alec -- * disclosure: I help out with ORG in an unpaid capacity
Was b.root-servers.net under attack on Mar 31?
http://dnsmon.ripe.net/dns-servmon/server/plot?server=b.root-servers.net;type=drops;tstart=1333166400;tstop=1333252799;af=ipv4 There were quite a few unanswered queries from around 06:15 to around 09:15 UTC on Mar 31. Che-Hoo
STEP Security (RFC4012012)
Interweb Re-Engineering Task Force J. Oquendo Request for Comments 4012012 E-Fensive Security Strategies Category: Informational Expires: 2020 STEP by STEP Security Status of this Memo This Internet-Draft is submitted in full nonconformance with provisions of BCP 78 and BCP 79. This document may not be modified, and derivative works of it may not be created, except to publish it as an RFC and to translate it into languages other than English. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as work in progress. The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html This Internet-Draft will expire on April 01, 2020. Copyright Notice Copyright (c) 2012 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Oquendo Expires Apr 01, 2020 [Page 1] Internet-Draft Security Step by STEP RFC 4012012 Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Abstract This framework describes a practical methodology for ensuring security in otherwise insecure environments. The goal is to provide a rapid response mechanism to defend against the advanced persistent threats in the wild. Table of Contents 1. Introduction..2 2. Conventions used in this document.4 3. Threats Explained.4 3.1. Possible Actors..4 4. STEP Explained5 5. STEP in Action6 6. Security Considerations...7 7. IANA Considerations...7 8. Conclusions...8 8.1. Informative References...8 9. Acknowledgments...8 Appendix A. Copyright9 1. Introduction In the network and computing industry, malicious actions, applications and actors have become more pervasive. Response times to anomalous events are burdening today's infrastructures and often strain resources. As networks under attack are often saturated with malicious traffic and advanced persistent threat actors engage in downloading terabytes of data, resources to combat these threats have diminished. Additionally, the threats are no longer just anonymized actors engaging in juvenile behavior, there are many instances of State Actors, disgruntled employees, contractors, third party vendors and criminal organizations. Each with separate agendas, each consistently targeting devices on the Internet. Oquendo Informational [Page 2] Internet-Draft Security Step by STEP RFC 4012012 The intent behind this document is to define a methodology for rapid response to these threats. In this document, security will be achieved using a new methodology and protocol henceforth named Scissor To Ethernet Protocol (STEP). Initially designed as a last approach for security, STEP ensures that no attacker can disaffect any of the Confidentiality, Integrity, Availability of data as a whole. Many variables are involved in security, but the STEP methodology focuses on the following: o FUD (Fear Uncertainty and Doubt) o SCAM (Security Compliance and Management) o APT (Another Possible Threat) This methodology proposes STEP that SHOULD be performed at the onset of a cyber attack before more terabytes of data are exfiltrated from a network. 1. Industry Standard IP
Re: Outdoor Wireless Access Point
Shahab, We did a large scale outdoor rollout for the X-Games (both summer and winter) where we used our outdoor APs to light up the side of Buttermilk mountain in Aspen for the winter X Games as well as the LA Coliseum, Staples Center, Nokia Theater and Part of downtown LA for the summer X Games. Here is a link to a story we did on this project: Bat Blue Delivers Wifi Services for ESPN X-Games You can see one of our outdoor APs in the background as Avril Levigne hands Shaun White his medal. We would be happy to work with you on your project if you think we can help. Best Regards, Babak -- Babak Pasdar President CEO | Certified Ethical Hacker Bat Blue Networks (p) 212.461.3322 x3005 | (f) 212.584. | www.BatBlue.com Bat Blue: AS 25885 | BGP Policy | Peering Policy Watch: Cloud Security Video | Cloud Network Video Read: Official Provider for ESPN X Games inline: image/pnginline: image/pnginline: image/pnginline: image/png
Re: April fools joke?
On Sunday, 1 April 2012, chris wrote: April 1st or not its the gist of that story is probably already true whether you know it or not. On Sun, Apr 1, 2012 at 10:30 AM, Justin Wilson li...@mtin.netjavascript:; wrote: I hate April 1 on the Web. You are right you never can tell. I would be appalled if someone as respectable as the BBC stoops to downright dumb pranks. However, it is England. They have some of the most strict laws in the Free world. I hate the Interweb on April 1. lol -Original Message- From: Leigh Porter leigh.por...@ukbroadband.com javascript:; Date: Sun, 1 Apr 2012 10:45:51 + To: nanog@nanog.org javascript:; nanog@nanog.org javascript:; Subject: April fools joke? http://www.bbc.co.uk/news/uk-politics-17576745 It's sad when you just can't tell with things like this.. -- Leigh Re visit of the stuff that was thrown out about 3 years when raised by Labour govmt and berated by the present govemt when they were in opposition Home Office and others want it but most businesses don't and the civil liberties guys are quite against it - requirement on any online or comms provider to keep logs for ages! Martin -- -- Martin Hepworth Oxford, UK
Re: STEP Security (RFC4012012)
April 1 2012 RFC's Service Undiscovery Using Hide-and-Go-Seek for the Domain Pseudonym System (DPS) http://www.rfc-editor.org/rfc/rfc6593.txt The Null Packet http://www.rfc-editor.org/rfc/rfc6592.txt -Grant On Sun, Apr 1, 2012 at 10:04 AM, J. Oquendo s...@infiltrated.net wrote: Interweb Re-Engineering Task Force J. Oquendo Request for Comments 4012012 E-Fensive Security Strategies Category: Informational Expires: 2020 STEP by STEP Security Status of this Memo This Internet-Draft is submitted in full nonconformance with provisions of BCP 78 and BCP 79. This document may not be modified, and derivative works of it may not be created, except to publish it as an RFC and to translate it into languages other than English. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as work in progress. The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html This Internet-Draft will expire on April 01, 2020. Copyright Notice Copyright (c) 2012 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Oquendo Expires Apr 01, 2020 [Page 1] Internet-Draft Security Step by STEP RFC 4012012 Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Abstract This framework describes a practical methodology for ensuring security in otherwise insecure environments. The goal is to provide a rapid response mechanism to defend against the advanced persistent threats in the wild. Table of Contents 1. Introduction..2 2. Conventions used in this document.4 3. Threats Explained.4 3.1. Possible Actors..4 4. STEP Explained5 5. STEP in Action6 6. Security Considerations...7 7. IANA Considerations...7 8. Conclusions...8 8.1. Informative References...8 9. Acknowledgments...8 Appendix A. Copyright9 1. Introduction In the network and computing industry, malicious actions, applications and actors have become more pervasive. Response times to anomalous events are burdening today's infrastructures and often strain resources. As networks under attack are often saturated with malicious traffic and advanced persistent threat actors engage in downloading terabytes of data, resources to combat these threats have diminished. Additionally, the threats are no longer just anonymized actors engaging in juvenile behavior, there are many instances of State Actors, disgruntled employees, contractors, third party vendors and criminal organizations. Each with separate agendas, each consistently targeting devices on the Internet. Oquendo Informational [Page 2] Internet-Draft Security Step by STEP RFC 4012012 The intent behind this document is to define a methodology for rapid response to these threats. In this document, security will be achieved using a new methodology and protocol henceforth named Scissor To Ethernet Protocol (STEP). Initially designed as a last approach for security, STEP ensures that no attacker can disaffect any of the Confidentiality, Integrity, Availability of data as a whole. Many variables are involved in security, but the STEP methodology focuses on the following: o FUD
RE: April fools joke?
From: Leigh Porter Sent: Sunday, April 01, 2012 3:46 AM To: nanog@nanog.org Subject: April fools joke? http://www.bbc.co.uk/news/uk-politics-17576745 It's sad when you just can't tell with things like this.. -- Leigh I was hoping for something good, like maybe an extension of RFC 1149 implementing ECN (aka SQUAWK) in avian carriers. I'm disappointed.
Re: Outdoor Wireless Access Point
Shahab Vahabzadeh wrote: As I look for maps we need at least 3 or 4 outdoor radio, I think in these networks the best solution is to have only one SSID in whole network to give mobility for the network, is this called ad-hoc? or it has an other name? It is usually called nomad, because it is not really mobility. With 802.11, you can connect to an AP and, if the AP fails, you may be connected to another AP, but the transition takes considerable amount of time not tolerable for voice communication, which is why it is not called mobility. If you want mobility, have different SSIDs for APs in the same frequency band (or, let terminals have multiple sets of radio interfaces) and let terminals connect to multiple APs simultaneously. Then, run mobile IP to *RAPIDLY* control the primary AP depending on signal quality of beacons from APs. Though you only have to modify software on terminals, AFAIK, there is no such commercial products. And if there is any good company which can both indoor and outdoor solution With your environment, you only need indoor equipments with external antennas located outdoors. Masataka Ohta
RE: Outdoor Wireless Access Point
I won't touch why we share info, others have already beat that horse dead, but I will say that This list is fairly hostile to people wanting to use them as 'free consultants'. Just look back through the archives for people that post with a message similar to: 'I want to start an isp can someone give me a step by step guide'. They aren't usually received nearly as well as someone who asks 'does anyone have any solutions to this specific problem I'm facing?' On Mar 31, 2012 3:49 PM, Network IP Dog network.ip...@gmail.com wrote: Hi...How do I do it! I'm utterly amazed how many people give away free consultant work. We need to keep people working... not giving it away. Ethics... Security... etc... Does the university give away free diploma's? I don't think so. Must be another copy paste e^%$#?r too! Google is your friend... ;^) Cheers! Ephesians 4:32Cheers!!! A password is like a... toothbrush ;^) Choose a good one, change it regularly and don't share it. -Original Message- From: Shahab Vahabzadeh [mailto:sh.vahabza...@gmail.com] Sent: Saturday, March 31, 2012 2:39 AM To: nanog@nanog.org Subject: Outdoor Wireless Access Point Hi there, I asked for a wireless solution for a university, in which they want indoor wireless solution for more than 5 building (at least two floor) and outdoor wireless solution for near 160m*280m garden. As I look for maps we need at least 3 or 4 outdoor radio, I think in these networks the best solution is to have only one SSID in whole network to give mobility for the network, is this called ad-hoc? or it has an other name? I do not know if I could ask question clearly or not, suppose we have 4 radio but only one SSID is broadcasting and when you are near the radio is near to you you will get service from that one, as this solution must be implement for indoor ones too. And if there is any good company which can both indoor and outdoor solution and they have shipping to Iran too or reseller in Iran please give me the url. Thanks -- Regards, Shahab Vahabzadeh, Network Engineer and System Administrator Cell Phone: +1 (415) 871 0742 PGP Key Fingerprint = 8E34 B335 D702 0CA7 5A81 C2EE 76A2 46C2 5367 BF90
RE: Outdoor Wireless Access Point
Don't forget Stanford's coursera! Another up and coming one that looks like it is very quality is Udacity. On Mar 31, 2012 9:12 PM, Hal Murray hmur...@megapathdsl.net wrote: Hi...How do I do it! I'm utterly amazed how many people give away free consultant work. We need to keep people working... not giving it away. Ethics... Security... etc... Does the university give away free diploma's? I don't think so. I don't expect a free diploma, but many universities are offering free internet videos of various classes. If you want a sample, here are a few good starting points: http://ocw.mit.edu/ http://oyc.yale.edu/ http://webcast.berkeley.edu/ -- These are my opinions, not necessarily my employer's. I hate spam.
Re: Outdoor Wireless Access Point
On Apr 1, 2012, at 3:44 PM, Masataka Ohta mo...@necom830.hpcl.titech.ac.jp wrote: With 802.11, you can connect to an AP and, if the AP fails, you may be connected to another AP, but the transition takes considerable amount of time not tolerable for voice communication, which is why it is not called mobility. True under basic 802.11, at least with WPA2 + EAP, for some clients. Not all clients wait until they lose connectivity to start looking for another AP - it depends on how the client was built. However, even without needing to lose connectivity to learn what other APs are nearby, there still is a substantial associatiation delay with EAP. That's why 802.11r + 802.11k exist. I'm sure the big name vendors support this and also support their proprietary alternatives that may or may not be better. If you want mobility, have different SSIDs for APs in the same frequency band (or, let terminals have multiple sets of radio interfaces) and let terminals connect to multiple APs simultaneously. That's one way of doing it, provided you have a way to manage all the end devices when you add new APs. It has the disadvantage of not being a COTS solution AFAIK. Another way to do it is Meru's one frequency, one MAC approach. As for locating other access points, even without 802.11k, most solutions I have seen go into power save mode for long enough to do a quick scan every once in a while, taking into account the size of the phone's jitter buffer. That causes the AP to hold packets until the scan finishes. So one channel is not required for fast roaming. I've seen solutions cope without 802.11r + 802.11k by using a WEP-only SSID on each AP (typically the same SSID for all APs) and throwing that into a VOIP-only VLAN. But with smartphones capable of running VoIP clients, I'd be less inclined to do it that way even if I thought WEP was secure-enough for voice calls. The other solution that I've seen some things support is to use WDS on the VoIP device. I'm also not a fan of that personally, but others may be. WDS would require one frequency throughout the network however. Though you only have to modify software on terminals, AFAIK, there is no such commercial products. There are plenty of commercial products that support VoIP handoff without issues. Some are proprietary, some are open standards. Many support multi-channel networks. It starts to get expensive to do this though, as most (all?) of the cheap vendors don't do what is required on the AP side. That said, I'd love to hear I'm wrong on this - I'm looking for new APs for home. So, if I was buying an enterprise 802.11 solution and needed to support seamless VoIP roaming, I'd look at either a one-vendor solution (I'm sure Cisco phones + Cisco APs + Cisco Controller + Cisco PBX would do this just fine, for instance; you can substitute a few other big vendors for Cisco, no doubt, although not likely cheap ones; you'll be spending 10x or more per AP in many cases than if you could have used the cheap ones) or someone that complies with 802.11r + 802.11k (both for handses and APs). Obviously your network better support DSCP and/or VLAN priority marking and WMM as well. Supporting VoIP handoff is much more complex (and, at least from what I've seen, expensive) than supporting web browsing handoff. It's also what seperates different pricing tiers of wireless equipment.
RE: April fools joke?
http://www.bbc.co.uk/news/uk-politics-17576745 It's sad when you just can't tell with things like this.. I was hoping for something good, like maybe an extension of RFC 1149 implementing ECN (aka SQUAWK) in avian carriers. I'm disappointed. ECN doesn't help if the Hunting Season bit is set. --- () ascii ribbon campaign against html e-mail /\ www.asciiribbon.org
Re: uunet ends newsfeed/newsreader in US
On 3/30/2012 5:55 PM, John Levine wrote: I thought it should have died when pr0n and w4rez took it over (in the late 90's).. Many of the tech groups remain quite healthy. I still moderate comp.compilers which gets about 100 posts/month. Actually, it's fine with us that the ignorant masses think that usenet is dead, since it tends to keep out the riffraff. R's, John +1
Re: Outdoor Wireless Access Point
Joel Maslak wrote: With 802.11, you can connect to an AP and, if the AP fails, you may be connected to another AP, but the transition takes considerable amount of time not tolerable for voice communication, which is why it is not called mobility. True under basic 802.11, at least with WPA2 + EAP, for some clients. Not all clients wait until they lose connectivity to start looking for another AP - it depends on how the client was built. The problem of looking for another APs is that, to scan existence of other APs with reasonable reliability, clients must listen to other channels for considerable amount of time (three times maximum beacon interval, maybe), during which the clients can't receive packets from the current APs. That's why most, if not all, clients search new APs only after they loss connection with the current APs. However, even without needing to lose connectivity to learn what other APs are nearby, there still is a substantial associatiation delay with EAP. That's not a problem, in this case, when all the servers will be located in a university campus. That's why 802.11r + 802.11k exist. I'm afraid it is a L2 implementation of broken idea of PANA. If you want mobility, have different SSIDs for APs in the same frequency band (or, let terminals have multiple sets of radio interfaces) and let terminals connect to multiple APs simultaneously. That's one way of doing it, provided you have a way to manage all the end devices when you add new APs. It has the disadvantage of not being a COTS solution AFAIK. It is because the currently recognized commercial demand is to have smooth migration between 2/3G and WLAN, for which two RFs one for 2/3G and another for WLAN is enough. Another way to do it is Meru's one frequency, one MAC approach. one frequency, one MAC? I think it does not eliminate overhead of channel scanning, or, does it? As for locating other access points, even without 802.11k, most solutions I have seen go into power save mode for long enough to do a quick scan every once in a while, taking into account the size of the phone's jitter buffer. That causes the AP to hold packets until the scan finishes. So one channel is not required for fast roaming. Then, very short beacon intervals must be assumed. But with smartphones capable of running VoIP clients, I'd be less inclined to do it that way even if I thought WEP was secure-enough for voice calls. Smart phones makes the situation worse. With applications with high speed communication, 50ms loss of communication can be significant. At 12Mbps, twenty 1500B packets are lost in 50ms. Supporting VoIP handoff is much more complex (and, at least from what I've seen, expensive) than supporting web browsing handoff. Both of them are difficult in their own way that the complete solution (within WLAN SS, between 2/3G and WLAN, between WLAN of different service providers etc.) can be found only at L3 layer, IMHO. Masataka Ohta
RE: April fools joke?
Keith Medcalf wrote: {prior attributions lost} http://www.bbc.co.uk/news/uk-politics-17576745 It's sad when you just can't tell with things like this.. I was hoping for something good, like maybe an extension of RFC 1149 implementing ECN (aka SQUAWK) in avian carriers. I'm disappointed. ECN doesn't help if the Hunting Season bit is set. That's a situation where you *want* Bugs in the project. Wabbit Season!