Re: Outdoor Wireless Access Point

2012-04-01 Thread Shahab Vahabzadeh
Hi Valdis,
Thanks for your time and your answer, Of course I know how to search in
google or internet.
But the problem is as you told to have a good network and launch the best
solution.
And not do wrong things once more.
Thanks

On Sun, Apr 1, 2012 at 4:19 AM, valdis.kletni...@vt.edu wrote:

 On Sat, 31 Mar 2012 15:48:37 -0700, Network IP Dog said:
  I'm utterly amazed how many people give away free consultant work.

 A lot of us are quite busy with $DAYJOB and not in a position to take on a
 consulting engagement - and there's no good micropayment infrastructure to
 deal
 with 20-minute consulting gigs anyway.  So we give away 5 minute chunks of
 our
 time for the benefit of the networking community.  It's a large chunk of
 what
 makes 'best common practices' evolve. (Hint - that consultant you hired?
  How
 much of *their* knowledge did they aquire from other people's free advice?)

 And those of us who *do* go looking for consulting gigs often need to
 market
 ourselves as somebody clued.  You read NANOG for a while, you get a good
 idea
 of who is clued and who isn't.  And thus you decide who gets the gig.

  Google is your friend...  ;^)

 http://www.xckd.com/979/




-- 
Regards,
Shahab Vahabzadeh, Network Engineer and System Administrator

Cell Phone: +1 (415) 871 0742
PGP Key Fingerprint = 8E34 B335 D702 0CA7 5A81  C2EE 76A2 46C2 5367 BF90


Re: Outdoor Wireless Access Point

2012-04-01 Thread Shahab Vahabzadeh
Dear IP Dog,
Thanks for your time too, but I think you are so free and you are only
showing off yourself busy ;)
Because your answer reflect that to us, Here is a mailing list and open
community ;)
So if you do not have a good answer for question please go away ;)
Thanks

On Sun, Apr 1, 2012 at 3:18 AM, Network IP Dog network.ip...@gmail.comwrote:

 Hi...How do I do it!

 I'm utterly amazed how many people give away free consultant work.

 We need to keep people working... not giving it away.

 Ethics... Security... etc...

 Does the university give away free diploma's?   I don't think so.

 Must be another copy  paste e^%$#?r too!

 Google is your friend...  ;^)

 Cheers!


 Ephesians 4:32Cheers!!!

 A password is like a... toothbrush  ;^)
 Choose a good one, change it regularly and don't share it.

 -Original Message-
 From: Shahab Vahabzadeh [mailto:sh.vahabza...@gmail.com]
 Sent: Saturday, March 31, 2012 2:39 AM
 To: nanog@nanog.org
 Subject: Outdoor Wireless Access Point

 Hi there,
 I asked for a wireless solution for a university, in which they want indoor
 wireless solution for more than 5 building (at least two floor) and outdoor
 wireless solution for near 160m*280m garden.
 As I look for maps we need at least 3 or 4 outdoor radio, I think in these
 networks the best solution is to have only one SSID in whole network to
 give
 mobility for the network, is this called ad-hoc? or it has an other name?
 I do not know if I could ask question clearly or not, suppose we have 4
 radio but only one SSID is broadcasting and when you are near the radio is
 near to you you will get service from that one, as this solution must be
 implement for indoor ones too.
 And if there is any good company which can both indoor and outdoor solution
 and they have shipping to Iran too or reseller in Iran please give me the
 url.
 Thanks

 --
 Regards,
 Shahab Vahabzadeh, Network Engineer and System Administrator

 Cell Phone: +1 (415) 871 0742
 PGP Key Fingerprint = 8E34 B335 D702 0CA7 5A81  C2EE 76A2 46C2 5367 BF90




-- 
Regards,
Shahab Vahabzadeh, Network Engineer and System Administrator

Cell Phone: +1 (415) 871 0742
PGP Key Fingerprint = 8E34 B335 D702 0CA7 5A81  C2EE 76A2 46C2 5367 BF90


Re: Outdoor Wireless Access Point

2012-04-01 Thread Valdis . Kletnieks
On Sun, 01 Apr 2012 11:28:34 +0430, Shahab Vahabzadeh said:
 Thanks for your time and your answer, Of course I know how to search in 
 google or internet.
 But the problem is as you told to have a good network and launch the best 
 solution.

Unfortunately, I can't make any real recommendation for your net - although we
have some 1300 access points scattered across 100 buildings (a combination of
Cisco and Aruba gear) with a peak of 10,700 or so simultaneous users, we have
not ireally addressed the issue of outdoor wireless. For much of campus, it's
not a big problem, as buildings are packed fairly close together, and many of
the good benches, trees, retaining walls, and other places to sit are close
enough to a building that signal leakage from inside allows users to connect 
anyhow.

But there's a 22 acre field (about twice the size of the garden you are trying
to support) in the middle of campus... literally in the middle, as in the 
campus
is built around that field. ;)



pgp8WXtMZQIQ4.pgp
Description: PGP signature


Re: Outdoor Wireless Access Point

2012-04-01 Thread Leigh Porter

On 31 Mar 2012, at 23:51, Network IP Dog 
network.ip...@gmail.commailto:network.ip...@gmail.com wrote:

Hi...How do I do it!

I'm utterly amazed how many people give away free consultant work.

We need to keep people working... not giving it away.

Ethics... Security... etc...

Does the university give away free diploma's?   I don't think so.

Must be another copy  paste e^%$#?r too!

Google is your friend...  ;^)

Cheers!


Ephesians 4:32Cheers!!!

For I was hungry and you gave me nothing to eat, I was thirsty and you gave me 
nothing to drink, 43 I was a stranger and you did not invite me in, I needed 
clothes and you did not clothe me, I was sick and in prison and you did not 
look after me.’ 44 I needed some help building a wireless network and you 
wanted consultancy fees.

I think the day we stop helping each other on this list and start demanding 
consultancy fees will be the day the Internet really did die..

So whilst nobody would document an end to end design for nothing, I think the 
odd snipped of good advice should always be free.

Of course, y'all should google it first because how else are they going to send 
you relevant advertisements!

--
Leigh


__
This email has been scanned by the Symantec Email Security.cloud service.
For more information please visit http://www.symanteccloud.com
__


April fools joke?

2012-04-01 Thread Leigh Porter

http://www.bbc.co.uk/news/uk-politics-17576745

It's sad when you just can't tell with things like this..

-- 
Leigh


__
This email has been scanned by the Symantec Email Security.cloud service.
For more information please visit http://www.symanteccloud.com
__



Re: Outdoor Wireless Access Point

2012-04-01 Thread Jared Mauch
If you use unifi there is an outdoor version. You can mount it outside a 
building or on a pole. 

Jared Mauch

On Apr 1, 2012, at 3:58 AM, valdis.kletni...@vt.edu wrote:

 But there's a 22 acre field (about twice the size of the garden you are trying
 to support) in the middle of campus... literally in the middle, as in the 
 campus
 is built around that field. ;)



Re: Attack on the DNS ?

2012-04-01 Thread Rubens Kuhl
On Sat, Mar 31, 2012 at 10:09 PM, Greg Ihnen os10ru...@gmail.com wrote:
 I manage a tiny network in the Amazon, a satellite internet connection and 
 decent sized wireless network.

 Is DNS traffic being directed to bogus servers? Are the real servers being 
 overloaded? Am I seeing the results of some kind of DDOS mitigation technique?

If you are using broadband connection from the brazilian incumbent
operator (Oi), you might indeed being redirected to bogus servers.
They are very fond of monetizing techniques with their user base,
using either DNS or all the traffic for that matter (Phorm).


Rubens



Re: April fools joke?

2012-04-01 Thread Justin Wilson
I hate April 1 on the Web. You are right you never can tell.  I would be
appalled if someone as respectable as the BBC stoops to downright dumb
pranks.

However, it is England.  They have some of the most strict laws in the
Free world.

I hate the Interweb on April 1. lol

-Original Message-
From: Leigh Porter leigh.por...@ukbroadband.com
Date: Sun, 1 Apr 2012 10:45:51 +
To: nanog@nanog.org nanog@nanog.org
Subject: April fools joke?


http://www.bbc.co.uk/news/uk-politics-17576745

It's sad when you just can't tell with things like this..

-- 
Leigh


__
This email has been scanned by the Symantec Email Security.cloud service.
For more information please visit http://www.symanteccloud.com
__






Re: April fools joke?

2012-04-01 Thread chris
April 1st or not its the gist of that story is probably already true
whether you know it or not.

On Sun, Apr 1, 2012 at 10:30 AM, Justin Wilson li...@mtin.net wrote:

I hate April 1 on the Web. You are right you never can tell.  I
 would be
 appalled if someone as respectable as the BBC stoops to downright dumb
 pranks.

However, it is England.  They have some of the most strict laws in
 the
 Free world.

I hate the Interweb on April 1. lol

 -Original Message-
 From: Leigh Porter leigh.por...@ukbroadband.com
 Date: Sun, 1 Apr 2012 10:45:51 +
 To: nanog@nanog.org nanog@nanog.org
 Subject: April fools joke?

 
 http://www.bbc.co.uk/news/uk-politics-17576745
 
 It's sad when you just can't tell with things like this..
 
 --
 Leigh
 
 
 __
 This email has been scanned by the Symantec Email Security.cloud service.
 For more information please visit http://www.symanteccloud.com
 __
 






CCDP (Was: April fools joke?)

2012-04-01 Thread Alec Muffett

On 1 Apr 2012, at 15:30, Justin Wilson wrote:
   I hate April 1 on the Web. You are right you never can tell.  I would be
 appalled if someone as respectable as the BBC stoops to downright dumb
 pranks.

It is true.  

It's called the Communications Capabilities Development Programme (CCDP) and is 
comprehensively discussed at the OpenRightsGroup* wiki:

  
http://wiki.openrightsgroup.org/wiki/Communications_Capabilities_Development_Programme

...and somewhat less comprehensively at:

  http://en.wikipedia.org/wiki/Communications_Capabilities_Development_Programme

See also ZDNet from February, in case you think it's still an April 1st joke:

  
http://www.zdnet.co.uk/news/security-threats/2012/02/20/isps-kept-in-dark-about-uks-plans-to-intercept-twitter-40095083/


- alec


--
* disclosure: I help out with ORG in an unpaid capacity




Was b.root-servers.net under attack on Mar 31?

2012-04-01 Thread Che-Hoo CHENG
http://dnsmon.ripe.net/dns-servmon/server/plot?server=b.root-servers.net;type=drops;tstart=1333166400;tstop=1333252799;af=ipv4

There were quite a few unanswered queries from around 06:15 to around 09:15 UTC 
on Mar 31.

Che-Hoo




STEP Security (RFC4012012)

2012-04-01 Thread J. Oquendo
Interweb Re-Engineering Task Force   J. Oquendo
Request for Comments 4012012  E-Fensive Security Strategies
Category: Informational
Expires: 2020


   STEP by STEP Security


Status of this Memo

   This Internet-Draft is submitted in full nonconformance with
   provisions of BCP 78 and BCP 79. This document may not be modified,
   and derivative works of it may not be created, except to publish it
   as an RFC and to translate it into languages other than English.
   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.   Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six
   months and may be updated, replaced, or obsoleted by other documents
   at any time.   It is inappropriate to use Internet-Drafts as
   reference material or to cite them other than as work in progress.

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html

   This Internet-Draft will expire on April 01, 2020.

Copyright Notice

   Copyright (c) 2012 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents
   carefully, as they describe your rights and restrictions with
   respect to this document. Code Components extracted from this
   document must include Simplified BSD License text as described in




Oquendo  Expires Apr 01, 2020  [Page 1]


Internet-Draft  Security Step by STEP   RFC 4012012


   Section 4.e of the Trust Legal Provisions and are provided without
   warranty as described in the Simplified BSD License.

Abstract

   This framework describes a practical methodology for ensuring
   security in otherwise insecure environments. The goal is to provide
   a rapid response mechanism to defend against the advanced persistent
   threats in the wild.

Table of Contents


   1.  Introduction..2
   2.  Conventions used in this document.4
   3.  Threats Explained.4
   3.1. Possible Actors..4
   4.  STEP Explained5
   5.  STEP in Action6
   6.  Security Considerations...7
   7.  IANA Considerations...7
   8.  Conclusions...8
   8.1. Informative References...8
   9.  Acknowledgments...8
   Appendix A.  Copyright9


1. Introduction
   In the network and computing industry, malicious actions,
   applications and actors have become more pervasive. Response times
   to anomalous events are burdening today's infrastructures and often
   strain resources. As networks under attack are often saturated with
   malicious traffic and advanced persistent threat actors engage in
   downloading terabytes of data, resources to combat these threats
   have diminished.

   Additionally, the threats are no longer just anonymized actors
   engaging in juvenile behavior, there are many instances of State
   Actors, disgruntled employees, contractors, third party vendors and
   criminal organizations. Each with separate agendas, each
   consistently targeting devices on the Internet.




Oquendo Informational  [Page 2]
Internet-Draft Security Step by STEP   RFC 4012012


   The intent behind this document is to define a methodology for rapid
   response to these threats. In this document, security will be
   achieved using a new methodology and protocol henceforth named
   Scissor To Ethernet Protocol (STEP).



   Initially designed as a last approach for security, STEP ensures
   that no attacker can disaffect any of the Confidentiality,
   Integrity, Availability of data as a whole.



   Many variables are involved in security, but the STEP methodology
   focuses on the following:


   o FUD (Fear Uncertainty and Doubt)
   o SCAM (Security Compliance and Management)
   o APT (Another Possible Threat)



   This methodology proposes STEP that SHOULD be performed at the onset
   of a cyber attack before more terabytes of data are exfiltrated from
   a network.

   1. Industry Standard IP 

Re: Outdoor Wireless Access Point

2012-04-01 Thread Babak Pasdar
Shahab,

We did a large scale outdoor rollout for the X-Games (both summer and winter) 
where we used our outdoor APs to light up the side of Buttermilk mountain in 
Aspen for the winter X Games as well as the LA Coliseum, Staples Center, Nokia 
Theater and Part of downtown LA for the summer X Games.

Here is a link to a story we did on this project:  Bat Blue Delivers Wifi 
Services for ESPN X-Games  You can see one of our outdoor APs in the background 
as Avril Levigne hands Shaun White his medal.
 
We would be happy to work with you on your project if you think we can help.

Best Regards,

Babak

--
Babak Pasdar
President  CEO | Certified Ethical Hacker
Bat Blue Networks
(p) 212.461.3322 x3005 | (f) 212.584. |  www.BatBlue.com


Bat Blue: AS 25885 | BGP Policy | Peering Policy

Watch: Cloud Security Video | Cloud Network Video

Read: Official Provider for ESPN X Games




inline: image/pnginline: image/pnginline: image/pnginline: image/png

Re: April fools joke?

2012-04-01 Thread Martin Hepworth
On Sunday, 1 April 2012, chris wrote:

 April 1st or not its the gist of that story is probably already true
 whether you know it or not.

 On Sun, Apr 1, 2012 at 10:30 AM, Justin Wilson li...@mtin.netjavascript:;
 wrote:

 I hate April 1 on the Web. You are right you never can tell.  I
  would be
  appalled if someone as respectable as the BBC stoops to downright dumb
  pranks.
 
 However, it is England.  They have some of the most strict laws in
  the
  Free world.
 
 I hate the Interweb on April 1. lol
 
  -Original Message-
  From: Leigh Porter leigh.por...@ukbroadband.com javascript:;
  Date: Sun, 1 Apr 2012 10:45:51 +
  To: nanog@nanog.org javascript:; nanog@nanog.org javascript:;
  Subject: April fools joke?
 
  
  http://www.bbc.co.uk/news/uk-politics-17576745
  
  It's sad when you just can't tell with things like this..
  
  --
  Leigh
 


Re visit of the stuff that was thrown out about 3 years when raised by
Labour govmt and berated by the present govemt when they were in opposition

Home Office and others want it but most businesses don't and the civil
liberties guys are quite against it - requirement on any online or comms
provider to keep logs for ages!

Martin


-- 
-- 
Martin Hepworth
Oxford, UK


Re: STEP Security (RFC4012012)

2012-04-01 Thread Grant Ridder
April 1 2012 RFC's

Service Undiscovery Using Hide-and-Go-Seek for the Domain Pseudonym System
(DPS)
http://www.rfc-editor.org/rfc/rfc6593.txt

The Null Packet
http://www.rfc-editor.org/rfc/rfc6592.txt

-Grant

On Sun, Apr 1, 2012 at 10:04 AM, J. Oquendo s...@infiltrated.net wrote:

 Interweb Re-Engineering Task Force   J. Oquendo
 Request for Comments 4012012  E-Fensive Security Strategies
 Category: Informational
 Expires: 2020


   STEP by STEP Security


 Status of this Memo

   This Internet-Draft is submitted in full nonconformance with
   provisions of BCP 78 and BCP 79. This document may not be modified,
   and derivative works of it may not be created, except to publish it
   as an RFC and to translate it into languages other than English.
   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.   Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six
   months and may be updated, replaced, or obsoleted by other documents
   at any time.   It is inappropriate to use Internet-Drafts as
   reference material or to cite them other than as work in progress.

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html

   This Internet-Draft will expire on April 01, 2020.

 Copyright Notice

   Copyright (c) 2012 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents
   carefully, as they describe your rights and restrictions with
   respect to this document. Code Components extracted from this
   document must include Simplified BSD License text as described in




 Oquendo  Expires Apr 01, 2020  [Page 1]


 Internet-Draft  Security Step by STEP   RFC 4012012


   Section 4.e of the Trust Legal Provisions and are provided without
   warranty as described in the Simplified BSD License.

 Abstract

   This framework describes a practical methodology for ensuring
   security in otherwise insecure environments. The goal is to provide
   a rapid response mechanism to defend against the advanced persistent
   threats in the wild.

 Table of Contents


   1.  Introduction..2
   2.  Conventions used in this document.4
   3.  Threats Explained.4
   3.1. Possible Actors..4
   4.  STEP Explained5
   5.  STEP in Action6
   6.  Security Considerations...7
   7.  IANA Considerations...7
   8.  Conclusions...8
   8.1. Informative References...8
   9.  Acknowledgments...8
   Appendix A.  Copyright9


 1. Introduction
   In the network and computing industry, malicious actions,
   applications and actors have become more pervasive. Response times
   to anomalous events are burdening today's infrastructures and often
   strain resources. As networks under attack are often saturated with
   malicious traffic and advanced persistent threat actors engage in
   downloading terabytes of data, resources to combat these threats
   have diminished.

   Additionally, the threats are no longer just anonymized actors
   engaging in juvenile behavior, there are many instances of State
   Actors, disgruntled employees, contractors, third party vendors and
   criminal organizations. Each with separate agendas, each
   consistently targeting devices on the Internet.




 Oquendo Informational  [Page 2]
 Internet-Draft Security Step by STEP   RFC
 4012012


   The intent behind this document is to define a methodology for rapid
   response to these threats. In this document, security will be
   achieved using a new methodology and protocol henceforth named
   Scissor To Ethernet Protocol (STEP).



   Initially designed as a last approach for security, STEP ensures
   that no attacker can disaffect any of the Confidentiality,
   Integrity, Availability of data as a whole.



   Many variables are involved in security, but the STEP methodology
   focuses on the following:


   o FUD 

RE: April fools joke?

2012-04-01 Thread George Bonser
 From: Leigh Porter 
 Sent: Sunday, April 01, 2012 3:46 AM
 To: nanog@nanog.org
 Subject: April fools joke?
 
 
 http://www.bbc.co.uk/news/uk-politics-17576745
 
 It's sad when you just can't tell with things like this..
 
 --
 Leigh

I was hoping for something good, like maybe an extension of RFC 1149 
implementing ECN (aka SQUAWK) in avian carriers. I'm disappointed.



Re: Outdoor Wireless Access Point

2012-04-01 Thread Masataka Ohta
Shahab Vahabzadeh wrote:

 As I look for maps we need at least 3 or 4 outdoor radio, I think in these
 networks the best solution is to have only one SSID in whole network to
 give mobility for the network, is this called ad-hoc? or it has an other
 name?

It is usually called nomad, because it is not really
mobility.

With 802.11, you can connect to an AP and, if the AP
fails, you may be connected to another AP, but the
transition takes considerable amount of time not
tolerable for voice communication, which is why it
is not called mobility.

If you want mobility, have different SSIDs for APs in
the same frequency band (or, let terminals have multiple
sets of radio interfaces) and let terminals connect
to multiple APs simultaneously.

Then, run mobile IP to *RAPIDLY* control the primary
AP depending on signal quality of beacons from APs.

Though you only have to modify software on terminals,
AFAIK, there is no such commercial products.

 And if there is any good company which can both indoor
 and outdoor solution

With your environment, you only need indoor equipments with
external antennas located outdoors.

Masataka Ohta



RE: Outdoor Wireless Access Point

2012-04-01 Thread Jacob Broussard
I won't touch why we share info, others have already beat that horse dead,
but I will say that This list is fairly hostile to people wanting to use
them as 'free consultants'.  Just look back through the archives for people
that post with a message similar to: 'I want to start an isp can someone
give me a step by step guide'.  They aren't usually received nearly as well
as someone who asks 'does anyone have any solutions to this specific
problem I'm facing?'
On Mar 31, 2012 3:49 PM, Network IP Dog network.ip...@gmail.com wrote:

 Hi...How do I do it!

 I'm utterly amazed how many people give away free consultant work.

 We need to keep people working... not giving it away.

 Ethics... Security... etc...

 Does the university give away free diploma's?   I don't think so.

 Must be another copy  paste e^%$#?r too!

 Google is your friend...  ;^)

 Cheers!


 Ephesians 4:32Cheers!!!

 A password is like a... toothbrush  ;^)
 Choose a good one, change it regularly and don't share it.

 -Original Message-
 From: Shahab Vahabzadeh [mailto:sh.vahabza...@gmail.com]
 Sent: Saturday, March 31, 2012 2:39 AM
 To: nanog@nanog.org
 Subject: Outdoor Wireless Access Point

 Hi there,
 I asked for a wireless solution for a university, in which they want indoor
 wireless solution for more than 5 building (at least two floor) and outdoor
 wireless solution for near 160m*280m garden.
 As I look for maps we need at least 3 or 4 outdoor radio, I think in these
 networks the best solution is to have only one SSID in whole network to
 give
 mobility for the network, is this called ad-hoc? or it has an other name?
 I do not know if I could ask question clearly or not, suppose we have 4
 radio but only one SSID is broadcasting and when you are near the radio is
 near to you you will get service from that one, as this solution must be
 implement for indoor ones too.
 And if there is any good company which can both indoor and outdoor solution
 and they have shipping to Iran too or reseller in Iran please give me the
 url.
 Thanks

 --
 Regards,
 Shahab Vahabzadeh, Network Engineer and System Administrator

 Cell Phone: +1 (415) 871 0742
 PGP Key Fingerprint = 8E34 B335 D702 0CA7 5A81  C2EE 76A2 46C2 5367 BF90





RE: Outdoor Wireless Access Point

2012-04-01 Thread Jacob Broussard
Don't forget Stanford's coursera!

Another up and coming one that looks like it is very quality is Udacity.
On Mar 31, 2012 9:12 PM, Hal Murray hmur...@megapathdsl.net wrote:


  Hi...How do I do it!
  I'm utterly amazed how many people give away free consultant work.
  We need to keep people working... not giving it away.
  Ethics... Security... etc...
  Does the university give away free diploma's?   I don't think so.

 I don't expect a free diploma, but many universities are offering free
 internet videos of various classes.

 If you want a sample, here are a few good starting points:
  http://ocw.mit.edu/
  http://oyc.yale.edu/
  http://webcast.berkeley.edu/


 --
 These are my opinions, not necessarily my employer's.  I hate spam.







Re: Outdoor Wireless Access Point

2012-04-01 Thread Joel Maslak
On Apr 1, 2012, at 3:44 PM, Masataka Ohta mo...@necom830.hpcl.titech.ac.jp 
wrote:

 With 802.11, you can connect to an AP and, if the AP
 fails, you may be connected to another AP, but the
 transition takes considerable amount of time not
 tolerable for voice communication, which is why it
 is not called mobility.

True under basic 802.11, at least with WPA2 + EAP, for some clients.  Not all 
clients wait until they lose connectivity to start looking for another AP - it 
depends on how the client was built.  However, even without needing to lose 
connectivity to learn what other APs are nearby, there still is a substantial 
associatiation delay with EAP.

That's why 802.11r + 802.11k exist.  I'm sure the big name vendors support this 
and also support their proprietary alternatives that may or may not be better.


 If you want mobility, have different SSIDs for APs in
 the same frequency band (or, let terminals have multiple
 sets of radio interfaces) and let terminals connect
 to multiple APs simultaneously.

That's one way of doing it, provided you have a way to manage all the end 
devices when you add new APs.  It has the disadvantage of not being a COTS 
solution AFAIK.

Another way to do it is Meru's one frequency, one MAC approach.

As for locating other access points, even without 802.11k, most solutions I 
have seen go into power save mode for long enough to do a quick scan every once 
in a while, taking into account the size of the phone's jitter buffer.  That 
causes the AP to hold packets until the scan finishes.  So one channel is not 
required for fast roaming.

I've seen solutions cope without 802.11r + 802.11k by using a WEP-only SSID on 
each AP (typically the same SSID for all APs) and throwing that into a 
VOIP-only VLAN.  But with smartphones capable of running VoIP clients, I'd be 
less inclined to do it that way even if I thought WEP was secure-enough for 
voice calls.

The other solution that I've seen some things support is to use WDS on the VoIP 
device.  I'm also not a fan of that personally, but others may be.  WDS would 
require one frequency throughout the network however.


 Though you only have to modify software on terminals,
 AFAIK, there is no such commercial products.

There are plenty of commercial products that support VoIP handoff without 
issues.  Some are proprietary, some are open standards.  Many support 
multi-channel networks.  It starts to get expensive to do this though, as most 
(all?) of the cheap vendors don't do what is required on the AP side.  That 
said, I'd love to hear I'm wrong on this - I'm looking for new APs for home.

So, if I was buying an enterprise 802.11 solution and needed to support 
seamless VoIP roaming, I'd look at either a one-vendor solution (I'm sure Cisco 
phones + Cisco APs + Cisco Controller + Cisco PBX would do this just fine, for 
instance; you can substitute a few other big vendors for Cisco, no doubt, 
although not likely cheap ones; you'll be spending 10x or more per AP in many 
cases than if you could have used the cheap ones) or someone that complies with 
802.11r + 802.11k (both for handses and APs).  Obviously your network better 
support DSCP and/or VLAN priority marking and WMM as well.

Supporting VoIP handoff is much more complex (and, at least from what I've 
seen, expensive) than supporting web browsing handoff.  It's also what 
seperates different pricing tiers of wireless equipment.




RE: April fools joke?

2012-04-01 Thread Keith Medcalf

  http://www.bbc.co.uk/news/uk-politics-17576745

  It's sad when you just can't tell with things like this..

 I was hoping for something good, like maybe an extension of RFC 1149
 implementing ECN (aka SQUAWK) in avian carriers. I'm disappointed.

ECN doesn't help if the Hunting Season bit is set.

---
()  ascii ribbon campaign against html e-mail
/\  www.asciiribbon.org







Re: uunet ends newsfeed/newsreader in US

2012-04-01 Thread Jason Bertoch

On 3/30/2012 5:55 PM, John Levine wrote:

 I thought it should have died when pr0n and
w4rez took it over (in the late 90's)..

Many of the tech groups remain quite healthy.  I still moderate
comp.compilers which gets about 100 posts/month.

Actually, it's fine with us that the ignorant masses think that usenet
is dead, since it tends to keep out the riffraff.

R's,
John


+1



Re: Outdoor Wireless Access Point

2012-04-01 Thread Masataka Ohta
Joel Maslak wrote:

 With 802.11, you can connect to an AP and, if the AP
 fails, you may be connected to another AP, but the
 transition takes considerable amount of time not
 tolerable for voice communication, which is why it
 is not called mobility.
 
 True under basic 802.11, at least with WPA2 + EAP, for some
 clients.  Not all clients wait until they lose connectivity
 to start looking for another AP - it depends on how the client
 was built.

The problem of looking for another APs is that, to scan existence
of other APs with reasonable reliability, clients must listen to
other channels for considerable amount of time (three times
maximum beacon interval, maybe), during which the clients can't
receive packets from the current APs.

That's why most, if not all, clients search new APs only after
they loss connection with the current APs.

 However, even without needing to lose connectivity
 to learn what other APs are nearby, there still is a
 substantial associatiation delay with EAP.

That's not a problem, in this case, when all the servers will
be located in a university campus.

 That's why 802.11r + 802.11k exist.

I'm afraid it is a L2 implementation of broken idea of PANA.

 If you want mobility, have different SSIDs for APs in
 the same frequency band (or, let terminals have multiple
 sets of radio interfaces) and let terminals connect
 to multiple APs simultaneously.

 That's one way of doing it, provided you have a way to manage
 all the end devices when you add new APs.  It has the
 disadvantage of not being a COTS solution AFAIK.

It is because the currently recognized commercial demand is to
have smooth migration between 2/3G and WLAN, for which two
RFs one for 2/3G and another for WLAN is enough.

 Another way to do it is Meru's one frequency, one MAC approach.

one frequency, one MAC? I think it does not eliminate overhead
of channel scanning, or, does it?

 As for locating other access points, even without 802.11k, most
 solutions I have seen go into power save mode for long enough
 to do a quick scan every once in a while, taking into account
 the size of the phone's jitter buffer.  That causes the AP
 to hold packets until the scan finishes.  So one channel is
 not required for fast roaming.

Then, very short beacon intervals must be assumed.

 But with smartphones capable of running VoIP clients, I'd be
 less inclined to do it that way even if I thought WEP was
 secure-enough for voice calls.

Smart phones makes the situation worse.

With applications with high speed communication, 50ms loss of
communication can be significant. At 12Mbps, twenty 1500B
packets are lost in 50ms.

 Supporting VoIP handoff is much more complex (and, at least
 from what I've seen, expensive) than supporting web browsing
 handoff.

Both of them are difficult in their own way that the complete
solution (within WLAN SS, between 2/3G and WLAN, between WLAN
of different service providers etc.) can be found only at L3
layer, IMHO.

Masataka Ohta



RE: April fools joke?

2012-04-01 Thread Robert Bonomi

Keith Medcalf wrote:
{prior attributions lost}
   http://www.bbc.co.uk/news/uk-politics-17576745

   It's sad when you just can't tell with things like this..

  I was hoping for something good, like maybe an extension of RFC 1149
  implementing ECN (aka SQUAWK) in avian carriers. I'm disappointed.

 ECN doesn't help if the Hunting Season bit is set.

That's a situation where you *want* Bugs in the project.

  Wabbit Season!