<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-258639351699992792</atom:id><lastBuildDate>Tue, 07 Apr 2026 06:54:08 +0000</lastBuildDate><title>WiFi Accelerator Pro</title><description></description><link>http://wifiacceleratorforyou.blogspot.com/</link><managingEditor>noreply@blogger.com (Apps World)</managingEditor><generator>Blogger</generator><openSearch:totalResults>11</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:keywords>wifi,booster,wifi,accelerator,networking,games,software,books,education</itunes:keywords><itunes:summary>this is the best place where you can any information related to increase or accelerate your wifi speed.</itunes:summary><itunes:subtitle>wifi accelerator</itunes:subtitle><itunes:category text="Technology"><itunes:category text="Software How-To"/></itunes:category><itunes:owner><itunes:email>nokiadeveloperpro@gmail.com</itunes:email></itunes:owner><item><guid isPermaLink="false">tag:blogger.com,1999:blog-258639351699992792.post-7616877058883251839</guid><pubDate>Fri, 13 Apr 2012 08:21:00 +0000</pubDate><atom:updated>2012-04-13T01:21:40.295-07:00</atom:updated><title>Long-range Wi-Fi</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlNcaB1ZobW7l3f4Za0r2IW1nUEjCT2UMGrr_qchabocOr6zpkqijm1d-pWB7W290xgQ82yjepbtRacNwX8dU8z5NfT24HCljH2Vhs5dduIozzp0hK6OI_8FYNyRtylOmrOgQNaxHpCNQ/s1600/wirless-networks-in-a-regulated-environment.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlNcaB1ZobW7l3f4Za0r2IW1nUEjCT2UMGrr_qchabocOr6zpkqijm1d-pWB7W290xgQ82yjepbtRacNwX8dU8z5NfT24HCljH2Vhs5dduIozzp0hK6OI_8FYNyRtylOmrOgQNaxHpCNQ/s320/wirless-networks-in-a-regulated-environment.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Long-range Wi-Fi is used for low-cost, unregulated point-to-point computer network connections, as an alternative to other fixed wireless, cellular networks or satellite Internet access.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Wi-Fi networks have a range that's limited by the transmission power, antenna type, the location they're used in, and the environment.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A typical wireless router in an indoor point-to-multipoint arrangement using 802.11b or 802.11g and a stock antenna might have a range of 32 metres (105&amp;nbsp;ft).&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Outdoor point-to-point arrangements, through use of directional antennas, can be extended with many kilometers between stations.&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Long range Wi-Fi especially in the 2.4&amp;nbsp;GHz band (as the shorter range higher bit rate 5.8&amp;nbsp;GHz bands become popular alternatives to wired LAN connections) have proliferated with specialist devices from many vendors including Premiertek CPE, Ubiquiti, EnGenius, Luxul and the Cisco AiroNet line.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;While Wi-Fi hotspots are ubiquitous in urban areas, some rural areas use more powerful longer range transceivers as alternatives to cell (GSM, CDMA) or fixed wireless (Motorola Canopy and other 900&amp;nbsp;MHz) applications.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;The main drawbacks of 2.4&amp;nbsp;GHz vs. these lower-frequency options are: Despite a lack of commercial service providers, applications for long range Wi-Fi have cropped up around the world.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Some benefits of using long range Wi-Fi for these applications include: Nonprofit organizations operating widespread installations, such as forest services, also make extensive use of long-range Wi-Fi to augment or replace older communications technologies such as shortwave or microwave transceivers in licensed bands.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;The Technology and Infrastructure for Emerging Regions (TIER) project at University of California at Berkeley in collaboration with Intel, uses a modified Wi-Fi setup to create long-distance point-to-point links for several of its projects in the developing world.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;This technique, dubbed Wi-Fi over Long Distance (WiLD), is used to connect the Aravind Eye Hospital with several outlying clinics in Tamil Nadu state, India.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;In most standard Wi-Fi routers, the three standards, a, b and g, are enough.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;But in long-range Wi-Fi, special technologies are used to get the most out of a Wi-Fi connection.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;On the other hand, using dual antennas with orthogonal polarities along with a 2x2 MIMO chipset effectively enable two independent carrier signals to be sent and received along the same long distance path.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Specially shaped directional antennas can increase the range of a Wi-Fi transmission without a drastic increase in transmission power.&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;High gain antenna may be of many designs, but all allow transmitting a narrow signal beam over greater distance than a non-directional antenna, often nulling out nearby interference sources.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;The standard IEEE 802.11 protocol implementations can be modified to make them more suitable for long distance, point-to-point usage, at the risk of breaking interoperability with other Wi-Fi devices and suffering interference from transmitters located near the antenna.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Methods that stretch the range of a Wi-Fi connection may also make it fragile and volatile, due to mundane problems including: Obstacles are among the biggest problems when setting up a long-range Wi-Fi.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Sheet metal in walls or roofs, may efficiently reflect Wi-Fi signals, causing signal loss or multipath problems.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;By its very nature, "long range" connotes an antenna system which can see many of these devices, which when added together produce a very high noise floor, whereby no single signal is usable, but nonetheless are still received.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;The aim of a long range system is to produce a system which over-powers these signals and/or uses directional antennas to prevent the receiver "seeing" these devices, thereby reducing the noise floor.&lt;/span&gt; &lt;/div&gt;</description><link>http://wifiacceleratorforyou.blogspot.com/2012/04/long-range-wi-fi.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlNcaB1ZobW7l3f4Za0r2IW1nUEjCT2UMGrr_qchabocOr6zpkqijm1d-pWB7W290xgQ82yjepbtRacNwX8dU8z5NfT24HCljH2Vhs5dduIozzp0hK6OI_8FYNyRtylOmrOgQNaxHpCNQ/s72-c/wirless-networks-in-a-regulated-environment.jpg" width="72"/><thr:total>1</thr:total><author>nokiadeveloperpro@gmail.com (Apps World)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-258639351699992792.post-6157087346025861935</guid><pubDate>Fri, 13 Apr 2012 08:07:00 +0000</pubDate><atom:updated>2012-04-13T01:07:01.676-07:00</atom:updated><title>Cellular repeater</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXroMB8DyLdr9DJ8YCovzQxC_YK7-CMTsYRbcwvuNea3848qN3G7pqDFienx0-MzPFQsDou5mfG_es8zbZF7YNR2L2CONsB7vW6wODGou9qsgTXejyzhVZwwl3cvErpVA-ftYhO1nX0Jo/s1600/mp2mp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="118" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXroMB8DyLdr9DJ8YCovzQxC_YK7-CMTsYRbcwvuNea3848qN3G7pqDFienx0-MzPFQsDou5mfG_es8zbZF7YNR2L2CONsB7vW6wODGou9qsgTXejyzhVZwwl3cvErpVA-ftYhO1nX0Jo/s320/mp2mp.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A cellular repeater, cell phone repeater, or wireless cellular signal booster, a type of bi-directional amplifier (BDA) as commonly named in the wireless telecommunications industry, is a device used for boosting the cell phone reception to the local area by the usage of a reception antenna, a signal amplifier and an internal rebroadcast antenna.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Modern cellular repeater amplifiers rebroadcast cellular signals inside the building.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;The systems usually use an external, directional antenna to collect the best cellular signal, which is then transmitted to an amplifier unit which amplifies the signal, and retransmits it locally, providing significantly improved signal strength.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;One advantage of cellular repeaters is an increase in the cell phone's battery life due to the lower power required to broadcast the signal to the local bi-directional amplifier, due to its proximity to the phone.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;This is because the antenna can be oriented and located outside to provide the best possible signal, usually aligned with the nearest cell tower.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Generally speaking the larger the external antenna the better the signal - although even a small, correctly oriented external antenna should provide better signal than the internal antenna on any cell phone.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;The better systems will generally include an internal monopole antenna (although the type of antenna is far from standardised) for rebroadcasting the signal internally - the advantage of using a monopole antenna is that the signal will be equally distributed in all directions (subject, of course, to attenuation from obstacles).&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Because all radio antennas are intrinsically polarized, cell phones perform best when their antennas are oriented parallel to the booster's antenna - although within reasonable proximity the booster's signal will be strong enough that the orientation of the cell phone's antenna will not make a significant difference in usability.&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Excellent high-power models (not home usage - smart and expensive technology of the operators) offering gain around 100dBm (ICE function is welcomed as an improvement of the radio isolation between donor and service antenna).&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;However, since the decibel scale is measured on a logarithmic scale a 30dB gain represents a one thousandfold signal power increase - meaning the total amplification of a repeater with greater than around 50dB is likely to be useless without a good, well aligned antenna.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;The power gain is calculated by the following equation: For repeater is needed to secure sufficient isolation between donor and service antenna.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;The isolation is possible to improve by antenna type selection, in macro environment by angle between donor and service antenna (ideally 180°), space separation (typically vertical distance in case of the tower installation between donor and service antenna is several meters), inserting of the attenuating environment (smart placement of the donor and service antenna, e.g., between donor and service antenna is wall, placement of the metal mesh), reduction of reflections - in front of the donor antenna no near obstacle (like tree, metal-sheet building, glasshouse, or house)).&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Because of the cellular network has form principle reduced cell size (depends on the technology and activated features typically X*10&amp;nbsp;km (for standard GSM 35&amp;nbsp;km), urban FDD/TDD network 20&amp;nbsp;km) usage of repeater virtually moving user to bigger distance: radio distance = real distance + (repeater delay in us) *0.3&amp;nbsp;km (delay of RF signal in air is 3.3us/km).&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;As a result, the only way to obtain strong cell phone signal in these areas is usually to install a home cellular repeater.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;In these cases the installation of a cellular repeater will generally massively increase signal strength just due to the amplifier, even a great distance from the broadcast towers.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Some construction materials very rapidly attenuate cell phone signal strength.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Even in urban areas which usually have strong cellular signals throughout, there are often dead zones caused by destructive interference of waves which have taken different paths (caused by the signal bouncing off buildings etc.)&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Because the frequencies which cell phones use are too high to reflect off the ionosphere as shortwave radio waves do, cell phone waves cannot travel via the ionosphere.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Repeaters are available for all the different GSM frequency bands, some repeaters will handle different types of network such as multi-mode GSM and UMTS repeaters however dual- and tri-band systems cost significantly more.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;The use of a mobile signal booster in the UK is only permitted by the mobile networks who hold the licences in the cellular bands.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;However, in cities and areas where many cells exist from each operator, the use of devices ranging from small mobile signal boosters to high power repeaters can cause loss of coverage through interference and desensitisation of the cells.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;</description><link>http://wifiacceleratorforyou.blogspot.com/2012/04/cellular-repeater.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXroMB8DyLdr9DJ8YCovzQxC_YK7-CMTsYRbcwvuNea3848qN3G7pqDFienx0-MzPFQsDou5mfG_es8zbZF7YNR2L2CONsB7vW6wODGou9qsgTXejyzhVZwwl3cvErpVA-ftYhO1nX0Jo/s72-c/mp2mp.png" width="72"/><thr:total>4</thr:total><author>nokiadeveloperpro@gmail.com (Apps World)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-258639351699992792.post-8377905231244777907</guid><pubDate>Thu, 12 Apr 2012 08:14:00 +0000</pubDate><atom:updated>2012-04-12T01:14:37.884-07:00</atom:updated><title>Firewall (computing)</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjejmLhmWy5ZDq0_5XK5uAdyenwkX7AY0bGpFKfNncxWB0VbjNud13qIuGMp29653TAqU8V9nQ7Cm8EEH9ghNcPFTMy_1hj_FmgxP63po4j3GgLEI5x-B9xs6glbqwirwdSJ0KIhyphenhyphennlaS0/s1600/images.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjejmLhmWy5ZDq0_5XK5uAdyenwkX7AY0bGpFKfNncxWB0VbjNud13qIuGMp29653TAqU8V9nQ7Cm8EEH9ghNcPFTMy_1hj_FmgxP63po4j3GgLEI5x-B9xs6glbqwirwdSJ0KIhyphenhyphennlaS0/s1600/images.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Many routers that pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;The predecessors to firewalls for network security were the routers used in the late 1980s: The first paper published on firewall technology was in 1988, when engineers from Digital Equipment Corporation (DEC) developed filter systems known as packet filter firewalls.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;TCP and UDP protocols constitute most communication over the Internet, and because TCP and UDP traffic by convention uses well known ports for particular types of traffic, a "stateless" packet filter can distinguish between, and thus control, those types of traffic (such as web browsing, remote printing, email transmission, file transfer), unless the machines on each side of the packet filter are both using the same non-standard ports.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Packet filtering firewalls work mainly on the first three layers of the OSI reference model, which means most of the work is done between the network and physical layers, with a little bit of peeking into the transport layer to figure out source and destination port numbers.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;When a packet originates from the sender and filters through a firewall, the device checks for matches to any of the packet filtering rules that are configured in the firewall and drops or rejects the packet accordingly.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;For example, if a rule in the firewall exists to block telnet access, then the firewall will block the TCP protocol for port number 23.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;The NuFW firewall provides real identity-based firewalling, by requesting the user's signature for each connection.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Network layer firewalls, also called packet filters, operate at a relatively low level of the TCP/IP protocol stack, not allowing packets to pass through the firewall unless they match the established rule set.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;If a packet matches an existing connection based on comparison with the firewall's state table, it will be allowed to pass without further processing.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Modern firewalls can filter traffic based on many packet attributes like source IP address, source port, destination IP address or port, destination service like WWW or FTP.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Application firewalls accomplish their function by hooking into socket calls to filter the connections between the application layer and the lower layers of the OSI model.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Application firewalls work much like a packet filter but application filters apply filtering rules (allow/block) on a per process basis instead of filtering connections on a per port basis.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;It is rare to find application firewalls not combined or used in conjunction with a packet filter.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Also, application firewalls further filter connections by examining the process ID of data packets against a ruleset for the local process involved in the data transmission.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Because of these limitations, application firewalls are beginning to be supplanted by a new generation of application firewalls that rely on mandatory access control (MAC), also referred to as sandboxing, to protect vulnerable services.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Firewalls often have network address translation (NAT) functionality, and the hosts protected behind a firewall commonly have addresses in the "private address range", as defined in RFC 1918.&lt;/span&gt; &lt;/div&gt;</description><link>http://wifiacceleratorforyou.blogspot.com/2012/04/firewall-computing.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjejmLhmWy5ZDq0_5XK5uAdyenwkX7AY0bGpFKfNncxWB0VbjNud13qIuGMp29653TAqU8V9nQ7Cm8EEH9ghNcPFTMy_1hj_FmgxP63po4j3GgLEI5x-B9xs6glbqwirwdSJ0KIhyphenhyphennlaS0/s72-c/images.jpg" width="72"/><thr:total>2</thr:total><author>nokiadeveloperpro@gmail.com (Apps World)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-258639351699992792.post-241928833121459188</guid><pubDate>Thu, 12 Apr 2012 08:11:00 +0000</pubDate><atom:updated>2012-04-12T01:11:43.773-07:00</atom:updated><title>Home network</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGTzaM6At_VyUiTEKJ-yDO-x3Tlymn9xiqKJ-fZr5lWahpECV1Hi-bJCLQJJvvbHmqu0LuwDDyKhGInTLhzjmLn41HrUYfbJXwiy2poG5XdIReBMzW3XTRpW9kQzxR1LdRfrW5BvgciOc/s1600/hotspot.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGTzaM6At_VyUiTEKJ-yDO-x3Tlymn9xiqKJ-fZr5lWahpECV1Hi-bJCLQJJvvbHmqu0LuwDDyKhGInTLhzjmLn41HrUYfbJXwiy2poG5XdIReBMzW3XTRpW9kQzxR1LdRfrW5BvgciOc/s1600/hotspot.png" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A home network or home area network (HAN) is a residential local area network (LAN) for communication between digital devices typically deployed in the home, usually a small number of personal computers and accessories, such as printers and mobile computing devices.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Home networks may use wired or wireless technologies.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;One of the most common ways of creating a home network is by using wireless radio signal technology; the 802.11&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Some home networking devices operate in both radio-band signals and fall within the standard 802.11n.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A wireless network can be used for communication between many electronic devices, to connect to the Internet or to wired networks that use Ethernet technology.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;With the installation of a home networking device, the network can be accessed by simply plugging the Computer into a wall socket.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;The ITU-T G.hn and IEEE Powerline standard, which provide high-speed (up to 1 Gbit/s) local area networking over existing home wiring, are examples of home networking technology designed specifically for IPTV delivery.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A home network may consist of the following components: Older devices may not have the appropriate connector to the network.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;As networking technology evolves, more electronic devices and home appliances are becoming Internet ready and accessible through the home network.&lt;/span&gt; &lt;/div&gt;</description><link>http://wifiacceleratorforyou.blogspot.com/2012/04/home-network.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGTzaM6At_VyUiTEKJ-yDO-x3Tlymn9xiqKJ-fZr5lWahpECV1Hi-bJCLQJJvvbHmqu0LuwDDyKhGInTLhzjmLn41HrUYfbJXwiy2poG5XdIReBMzW3XTRpW9kQzxR1LdRfrW5BvgciOc/s72-c/hotspot.png" width="72"/><thr:total>1</thr:total><author>nokiadeveloperpro@gmail.com (Apps World)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-258639351699992792.post-9023510498469965243</guid><pubDate>Thu, 12 Apr 2012 08:09:00 +0000</pubDate><atom:updated>2012-04-12T01:09:59.636-07:00</atom:updated><title>Computer network</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiD1Wkix2F9i6zTNdEvAzkV13MWvCWfdIl4YGPIag8S7xkH3-wQ-m5eCTR57IvFI9jfj5fIvnysn5vBb3zDnjMIK2tCrgeoAkElCGMTGBXIi7FJOM4nD670AQ8LDih_6o4xbd_M_f1yCO0/s1600/wifi.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiD1Wkix2F9i6zTNdEvAzkV13MWvCWfdIl4YGPIag8S7xkH3-wQ-m5eCTR57IvFI9jfj5fIvnysn5vBb3zDnjMIK2tCrgeoAkElCGMTGBXIi7FJOM4nD670AQ8LDih_6o4xbd_M_f1yCO0/s1600/wifi.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A computer network, often simply referred to as a network, is a collection of hardware components and computers interconnected by communication channels that allow sharing of resources and information.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Networks may be classified according to a wide variety of characteristics such as the medium used to transport the data, communications protocol used, scale, topology, and organizational scope.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Communications protocols define the rules and data formats for exchanging information in a computer network, and provide the basis for network programming.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Well-known communications protocols are Ethernet, a hardware and link layer standard that is ubiquitous in local area networks, and the internet protocol suite, which defines a set of protocols for internetworking, i.e. for data communication between multiple networks, as well as host-to-host data transfer, and application-specific data transmission formats.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Before the advent of computer networks that were based upon some type of telecommunications system, communication between calculation machines and early computers was performed by human users by carrying instructions between them.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Today, computer networks are the core of modern communication.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;The scope of communication has increased significantly in the past decade, and this boom in communications would not have been possible without the progressively advancing computer network.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Computer networks can be classified according to the hardware and associated software technology that is used to interconnect the individual devices in the network, such as electrical cable (HomePNA, power line communication, G.hn), optical fiber, and radio waves (wireless LAN).&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A communications protocol is a set of rules for exchanging information over a network.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;An important example of a protocol stack is HTTP running over TCP over IP over IEEE 802.11 (TCP and IP are members of the Internet Protocol Suite, and IEEE 802.11 is a member of the Ethernet protocol suite).&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Ethernet is a family of connectionless protocols used in LANs, described by a set of standards together called IEEE 802 published by the Institute of Electrical and Electronics Engineers.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;MAC bridging (IEEE 802.1D) deals with the routing of Ethernet packets using a Spanning Tree Protocol, IEEE 802.1Q describes VLANs, and IEEE 802.1X defines a port-based Network Access Control protocol, which forms the basis for the authentication mechanisms used in VLANs, but it is also found in WLANs – it is what the home user sees when the user has to enter a "wireless access key".&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Synchronous Optical NETworking (SONET) and Synchronous Digital Hierarchy (SDH) are standardized multiplexing protocols that transfer multiple digital bit streams over optical fiber using lasers.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Computer network programming involves writing computer programs that communicate with each other across a computer network.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A personal area network (PAN) is a computer network used for communication among computer and different information technological devices close to one person.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as home, school, computer laboratory, office building, or closely positioned group of buildings.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Current wired LANs are most likely to be based on Ethernet technology, although new standards like ITU-T G.hn also provide a way to create a wired LAN using existing home wires (coaxial cables, phone lines and power lines).&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Those inside the library, which have only 10/100 Mbit/s Ethernet connections to the user device and a Gigabit Ethernet connection to the central router, could be called "layer 3 switches" because they only have Ethernet interfaces and must understand IP.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;LANs can be connected to Wide area network by using routers.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A home area network (HAN) is a residential LAN which is used for communication between digital devices typically deployed in the home, usually a small number of personal computers and accessories, such as printers and mobile computing devices.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A campus area network (CAN) is a computer network made up of an interconnection of LANs within a limited geographical area.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A backbone network is part of a computer network infrastructure that interconnects various pieces of network, providing a path for the exchange of information between different LANs or subnetworks.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A specific case of a backbone network is the Internet backbone, which is the set of wide-area network connections and core routers that interconnect all networks connected to the Internet.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A Metropolitan area network (MAN) is a large computer network that usually spans a city or a large campus.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A&amp;nbsp;wide area network (WAN) is a computer network that covers a large geographic area such as a city, country, or spans even intercontinental distances, using a communications channel that combines many types of media such as telephone lines, cables, and air waves.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A virtual private network (VPN) is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;An internetwork is the connection of multiple computer networks via a common routing technology using routers.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Intranets and extranets are parts or extensions of a computer network, usually a LAN.&lt;/span&gt; &lt;/div&gt;</description><link>http://wifiacceleratorforyou.blogspot.com/2012/04/computer-network.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiD1Wkix2F9i6zTNdEvAzkV13MWvCWfdIl4YGPIag8S7xkH3-wQ-m5eCTR57IvFI9jfj5fIvnysn5vBb3zDnjMIK2tCrgeoAkElCGMTGBXIi7FJOM4nD670AQ8LDih_6o4xbd_M_f1yCO0/s72-c/wifi.jpg" width="72"/><thr:total>2</thr:total><author>nokiadeveloperpro@gmail.com (Apps World)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-258639351699992792.post-8270501457530461964</guid><pubDate>Thu, 12 Apr 2012 08:05:00 +0000</pubDate><atom:updated>2012-04-12T01:05:32.301-07:00</atom:updated><title>Telecommunications network</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRBu8SUcq8QoTiPfOYazXsneCKumcPv7FXqtTD_94t4WesFJCuuYXJikq-SVcMdTuryHwyQAJnZoLKF-Hp52xwD8x2Y3gWNjIXzzqHX9YAasP_l0It4bli8wz-8WGay_jOQLg0kFRDHiI/s1600/laptop-working-as-wifi-router.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRBu8SUcq8QoTiPfOYazXsneCKumcPv7FXqtTD_94t4WesFJCuuYXJikq-SVcMdTuryHwyQAJnZoLKF-Hp52xwD8x2Y3gWNjIXzzqHX9YAasP_l0It4bli8wz-8WGay_jOQLg0kFRDHiI/s1600/laptop-working-as-wifi-router.gif" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A telecommunications network is a collection of terminals, links and nodes which connect to enable telecommunication between users of the terminals.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Each terminal in the network must have a unique address so messages or connections can be routed to the correct recipients.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A large number of protocols have been developed over the years to specify how each different type of telecommunication network should handle the control and bearer messages to achieve this efficiently.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;In general, every telecommunications network conceptually consists of three parts, or planes (so called because they can be thought of as being, and often are, separate overlay networks): The data network is used extensively throughout the world to connect individuals and organizations.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;TCP/IP are the fundamental protocols that provide the control and routing of messages across the data network.&lt;/span&gt; &lt;/div&gt;</description><link>http://wifiacceleratorforyou.blogspot.com/2012/04/telecommunications-network.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRBu8SUcq8QoTiPfOYazXsneCKumcPv7FXqtTD_94t4WesFJCuuYXJikq-SVcMdTuryHwyQAJnZoLKF-Hp52xwD8x2Y3gWNjIXzzqHX9YAasP_l0It4bli8wz-8WGay_jOQLg0kFRDHiI/s72-c/laptop-working-as-wifi-router.gif" width="72"/><thr:total>3</thr:total><author>nokiadeveloperpro@gmail.com (Apps World)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-258639351699992792.post-4062858927760679690</guid><pubDate>Thu, 12 Apr 2012 08:03:00 +0000</pubDate><atom:updated>2012-04-12T01:03:11.695-07:00</atom:updated><title>Wireless mesh network</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhah89nPCV51HWWCYwH1r3EXRntQ0nzrN9J8BcW77XvSQNSyHxGSI6V34u8T-x2fliQBgzyhzeLQOxcGs4oFcssMW4jyhL0zMO7vD_euTWw2Zg6NR4PeJNjnYFuFzmNw9H628CpON60VWg/s1600/vena_02.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="197" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhah89nPCV51HWWCYwH1r3EXRntQ0nzrN9J8BcW77XvSQNSyHxGSI6V34u8T-x2fliQBgzyhzeLQOxcGs4oFcssMW4jyhL0zMO7vD_euTWw2Zg6NR4PeJNjnYFuFzmNw9H628CpON60VWg/s320/vena_02.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A wireless mesh network (WMN) is a communications network made up of radio nodes organized in a mesh topology.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Wireless mesh networks often consist of mesh clients, mesh routers and gateways.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;The coverage area of the radio nodes working as a single network is sometimes called a mesh cloud.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;The animation below illustrates how wireless mesh networks can self form and self heal.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A wireless mesh network often has a more planned configuration, and may be deployed to provide dynamic and cost effective connectivity over a certain geographic area.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;In this way, the wireless mesh network differs from an ad-hoc network, since these nodes are often constrained by resources.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Wireless mesh architecture is a first step towards providing cost effective and dynamic high-bandwidth networks over a specific coverage area.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Wireless mesh architectures infrastructure is, in effect, a router network minus the cabling between nodes.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Wireless mesh networks have a relatively stable topology except for the occasional failure of nodes or addition of new nodes.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Practically all the traffic in an infrastructure mesh network is either forwarded to or from a gateway, while in ad hoc networks or client mesh networks the traffic flows between arbitrary pairs of nodes.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;An important possible application for wireless mesh networks is VoIP.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;One of the more often cited papers on Wireless Mesh Networks identified the following areas as open research problems in 2005 - There are more than 70 competing schemes for routing packets across mesh networks.&lt;/span&gt; &lt;/div&gt;</description><link>http://wifiacceleratorforyou.blogspot.com/2012/04/wireless-mesh-network.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhah89nPCV51HWWCYwH1r3EXRntQ0nzrN9J8BcW77XvSQNSyHxGSI6V34u8T-x2fliQBgzyhzeLQOxcGs4oFcssMW4jyhL0zMO7vD_euTWw2Zg6NR4PeJNjnYFuFzmNw9H628CpON60VWg/s72-c/vena_02.jpg" width="72"/><thr:total>0</thr:total><author>nokiadeveloperpro@gmail.com (Apps World)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-258639351699992792.post-9183541151383348242</guid><pubDate>Thu, 12 Apr 2012 08:00:00 +0000</pubDate><atom:updated>2012-04-12T01:00:38.194-07:00</atom:updated><title>Wireless LAN</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEil3KXzId1_WG-9enUxbcgLkRhHXf1mTPARfgqRGUE-fT_4hbFrI9JMfIMgaq2JLE7LGXh4lrpkMrNZshdjCWGZImkhEyuue-yeN5zXT_qcOEGt6Tl-pgrNsUX1LsSDlNAfd6g-FpAATSY/s1600/1303590661-69.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="261" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEil3KXzId1_WG-9enUxbcgLkRhHXf1mTPARfgqRGUE-fT_4hbFrI9JMfIMgaq2JLE7LGXh4lrpkMrNZshdjCWGZImkhEyuue-yeN5zXT_qcOEGt6Tl-pgrNsUX1LsSDlNAfd6g-FpAATSY/s320/1303590661-69.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A wireless local area network (WLAN) links two or more devices using some wireless distribution method (typically spread-spectrum or OFDM radio), and usually providing a connection through an access point to the wider internet.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Norman Abramson, a professor at the University of Hawaii, developed the world’s first wireless computer communication network, ALOHAnet, using low-cost ham-like radios.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;The first generation of wireless data modems was developed in the early 1980s by amateur radio operators, who commonly referred to this as packet radio.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Wireless LANs were being used in hospitals, stock exchanges, and other in building and campus settings for nomadic access, point-to-point LAN bridges, ad-hoc networking, and even larger applications through internet working.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Since 2002 there has been newer standard added to 802.11; 802.11n which operates on both the 5Ghz and 2.4Ghz bands at 300 Mbit/s, most newer routers including those manufactured by Apple Inc. can broadcast a wireless network on both wireless bands, this is called dualband.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Wireless stations fall into one of two categories: access points, and clients.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Access points (APs), normally routers, are base stations for the wireless network.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Every BSS has an identification (ID) called the BSSID, which is the MAC address of the access point servicing the BSS.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;An independent BSS (IBSS) is an ad-hoc network that contains no access points, which means they can not connect to any other basic service set.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A distribution system (DS) connects access points in an extended service set.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Wireless devices within range of each other can discover and communicate directly without involving central access points.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;In infrastructure mode, mobile units communicate through an access point that serves as a bridge to a wired network infrastructure.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A wireless Ethernet bridge allows the connection of devices on a wired Ethernet network to a wireless network.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A Wireless Distribution System enables the wireless interconnection of access points in an IEEE 802.11 network.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;It allows a wireless network to be expanded using multiple access points without the need for a wired backbone to link them, as is traditionally required.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;An access point can be either a main, relay or remote base station.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A remote base station accepts connections from wireless clients and passes them to relay or main stations.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;When it is difficult to connect all of the access points in a network by wires, it is also possible to put up access points as repeaters.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;</description><link>http://wifiacceleratorforyou.blogspot.com/2012/04/wireless-lan.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEil3KXzId1_WG-9enUxbcgLkRhHXf1mTPARfgqRGUE-fT_4hbFrI9JMfIMgaq2JLE7LGXh4lrpkMrNZshdjCWGZImkhEyuue-yeN5zXT_qcOEGt6Tl-pgrNsUX1LsSDlNAfd6g-FpAATSY/s72-c/1303590661-69.jpg" width="72"/><thr:total>0</thr:total><author>nokiadeveloperpro@gmail.com (Apps World)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-258639351699992792.post-7896494493271288419</guid><pubDate>Thu, 12 Apr 2012 07:58:00 +0000</pubDate><atom:updated>2012-04-12T00:58:15.298-07:00</atom:updated><title>Hotspot (Wi-Fi)</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGNPb7YGnB6qeT8U7Um-_FqxtEUOcnXXD1918ZnoGEzv7UkGYhtz19kKHmHnx9MCi_abF5Uv6Yi7iFE10QB8ECKwpOT68SCxPHnadLGy70jUSQcS7L1sIHxXNnQI53YAURlt9N-DP65D4/s1600/Wireless-Networks-Picture.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="221" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGNPb7YGnB6qeT8U7Um-_FqxtEUOcnXXD1918ZnoGEzv7UkGYhtz19kKHmHnx9MCi_abF5Uv6Yi7iFE10QB8ECKwpOT68SCxPHnadLGy70jUSQcS7L1sIHxXNnQI53YAURlt9N-DP65D4/s320/Wireless-Networks-Picture.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A hotspot is a site that offers Internet access over a wireless local area network through the use of a router connected to a link to an Internet service provider.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Public access wireless local area networks (LANs) were first proposed by Henrik Sjödin at the NetWorld+Interop conference in The Moscone Center in San Francisco in August 1993.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Sjödin did not use the term hotspot but referred to publicly accessible wireless LANs.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;The original notion was that users would pay for broadband access at hotspots.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;For venues that have broadband Internet access, offering wireless access is as simple as purchasing one access point (AP), in conjunction with a router and connecting the AP to the Internet connection.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Many services provide payment services to hotspot providers, for a monthly fee or commission from the end-user income.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;ZoneCD is a Linux distribution that provides payment services for hotspots who wish to deploy their own service.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Roaming services are expanding among major hotspot service providers.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;With roaming service the users of a commercial provider can have access to other provider's hotspots with extra fees, in which such a user will be usually charged on the basis of access-per-minute.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Roaming agreements can be hard to negotiate with larger providers such a Boingo, so smaller hotspots usually use an aggregator such as www.gowifi.com to access these networks.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A EDCF user priority list shares the traffic in 3 access categories (data, video, audio) and user priorities (UP) (Pommer, p.&amp;nbsp;117): If the net traffic increases, then the frames of the particular access category (AC) are assigned a low priority value (e.g.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A "poisoned/rogue hotspot" refers to a free public hotspot set up by identity thieves or other malicious individuals for the purpose of "sniffing" the data sent by the user.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;In order to provide robust security to hotspot users, WiFi alliance is coming up with a new hotspot program which aims to encrypt hotspot traffic with the latest WPA2 security.&lt;/span&gt; &lt;/div&gt;</description><link>http://wifiacceleratorforyou.blogspot.com/2012/04/hotspot-wi-fi.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGNPb7YGnB6qeT8U7Um-_FqxtEUOcnXXD1918ZnoGEzv7UkGYhtz19kKHmHnx9MCi_abF5Uv6Yi7iFE10QB8ECKwpOT68SCxPHnadLGy70jUSQcS7L1sIHxXNnQI53YAURlt9N-DP65D4/s72-c/Wireless-Networks-Picture.jpg" width="72"/><thr:total>1</thr:total><author>nokiadeveloperpro@gmail.com (Apps World)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-258639351699992792.post-1175932407629251756</guid><pubDate>Thu, 12 Apr 2012 07:44:00 +0000</pubDate><atom:updated>2012-04-12T00:44:09.183-07:00</atom:updated><title>Wireless router</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimqiBQKA6OhG2UHVpyiniD5pBbunfLGZU5fxzkdVU3fYTp9PesnCpsQLNDwWUax5WR033yD4qZwTO9Orm0ZNU1k8AucdhuYe34vSTWWpwSUyTdng4LdUL9kjY-vo9w4aqr8h6_1XhMp3M/s1600/Netgear-WiFi-Router-WGR614L.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="236" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimqiBQKA6OhG2UHVpyiniD5pBbunfLGZU5fxzkdVU3fYTp9PesnCpsQLNDwWUax5WR033yD4qZwTO9Orm0ZNU1k8AucdhuYe34vSTWWpwSUyTdng4LdUL9kjY-vo9w4aqr8h6_1XhMp3M/s320/Netgear-WiFi-Router-WGR614L.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;A wireless router is a device that performs the functions of a router but also includes the functions of a wireless access point and a network switch.&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;</description><link>http://wifiacceleratorforyou.blogspot.com/2012/04/wireless-router.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimqiBQKA6OhG2UHVpyiniD5pBbunfLGZU5fxzkdVU3fYTp9PesnCpsQLNDwWUax5WR033yD4qZwTO9Orm0ZNU1k8AucdhuYe34vSTWWpwSUyTdng4LdUL9kjY-vo9w4aqr8h6_1XhMp3M/s72-c/Netgear-WiFi-Router-WGR614L.jpg" width="72"/><thr:total>0</thr:total><author>nokiadeveloperpro@gmail.com (Apps World)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-258639351699992792.post-5066149825090168343</guid><pubDate>Thu, 12 Apr 2012 07:40:00 +0000</pubDate><atom:updated>2012-04-12T00:40:16.364-07:00</atom:updated><title>WiFi</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoKaNU8Dtc0zsATtOXu_r62_gb1QP7CLb_lWEWPIIz4aAUvGfgTmoqR_6gDek6GCCvv3dEfoU2SM4LQgDYa20zKuc_KYbZmrz2GEMyCDsv1cuhP69ZIl9-UJIsL7jg99CRIBANRZ9gO7Q/s1600/wireless.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="274" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoKaNU8Dtc0zsATtOXu_r62_gb1QP7CLb_lWEWPIIz4aAUvGfgTmoqR_6gDek6GCCvv3dEfoU2SM4LQgDYa20zKuc_KYbZmrz2GEMyCDsv1cuhP69ZIl9-UJIsL7jg99CRIBANRZ9gO7Q/s320/wireless.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;The name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections.&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;The Wi-Fi Alliance, the organization that owns the Wi-Fi (registered trademark) term specifically defines Wi-Fi as any "wireless local area network (WLAN) products that are based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards."&lt;/span&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;br style="background-color: #f6f6f6; font-family: 'times new roman'; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;" /&gt;&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Initially, Wi-Fi was used in place of only the 2.4GHz 802.11b standard, however the Wi-Fi Alliance has expanded the generic use of the Wi-Fi term to include any type of network or WLAN product based on any of the 802.11&lt;/span&gt; &lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f6f6; font-family: 'times new roman'; text-align: -webkit-auto;"&gt;Wi-Fi works with no physical wired connection between sender and receiver by using radio frequency (RF) technology, a frequency within the electromagnetic spectrum associated with radio wave propagation.&lt;/span&gt; &lt;/div&gt;</description><link>http://wifiacceleratorforyou.blogspot.com/2012/04/wifi.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoKaNU8Dtc0zsATtOXu_r62_gb1QP7CLb_lWEWPIIz4aAUvGfgTmoqR_6gDek6GCCvv3dEfoU2SM4LQgDYa20zKuc_KYbZmrz2GEMyCDsv1cuhP69ZIl9-UJIsL7jg99CRIBANRZ9gO7Q/s72-c/wireless.jpg" width="72"/><thr:total>1</thr:total><author>nokiadeveloperpro@gmail.com (Apps World)</author></item></channel></rss>