Difference between revisions of "Wireless Internet everywhere"
Line 31: | Line 31: | ||
*[http://www.mytelus.com/internet/currents/article.do?pageID=currents_home&articleID=1884125&issue=04-2005 Ten reasons for WiFi] | *[http://www.mytelus.com/internet/currents/article.do?pageID=currents_home&articleID=1884125&issue=04-2005 Ten reasons for WiFi] | ||
*[http://messenger.yahoo.com/?ovchn=GGL&ovcpn=Non_Eng_Branded-PC+Calling&ovcrn=voip+yahoo&ovtac=PPC Yahoo Messenger with VOIP] | *[http://messenger.yahoo.com/?ovchn=GGL&ovcpn=Non_Eng_Branded-PC+Calling&ovcrn=voip+yahoo&ovtac=PPC Yahoo Messenger with VOIP] | ||
*[http://tools.netgear.com/skype/ NETGEAR Skype WiFi Phone] | |||
[http://tools.netgear.com/skype/ NETGEAR Skype WiFi Phone] |
Revision as of 19:50, 7 May 2006
Description
Wireless Internet has become a public hype. While more cables are disappearing, WiFi arises as its invisible replacement.
Enablers
Ease of use
Instead of laying cables in your living room, study room and kidsroom, it is much easier to have one wireless hub which sends out a signal connect your computer with the Internet
Roaming
Wi-Fi networks support roaming, in which a mobile client station such as a laptop computer can move from one access point to another as the user moves around a building or area.
Worldwide standard
Wi-Fi is a global set of standards. Unlike cellular carriers, the same Wi-Fi client works in different countries around the world.
Inhibitors
Limited Range
The range of WiFi for the 802.11b or 802.11g standards are only 45 meters in doors and still depends on the level of interference.
Interference
Interference of a closed or encrypted access point with other open access points on the same or a neighboring channel can prevent access to the open access points by others in the area. This can pose a problem in high-density areas such as large apartment buildings where many residents are operating Wi-Fi access points.
Security
Access points could be used to steal personal information transmitted from Wi-Fi users.The most common wireless encryption standard, Wired Equivalent Privacy or WEP, has been shown to be breakable even when correctly configured (caused by weak-key generation). Although most newer wireless products support the much improved Wi-Fi Protected Access (WPA) protocol, many first-generation access points cannot be upgraded in the field and have to be replaced to support it. The adoption of the 802.11i (aka WPA2) standard in June 2004 makes available a still further improved security scheme, which is becoming available on the latest equipment. Both schemes require stronger passwords in personal mode than most users typically employ. Many enterprises have deployed additional layers of encryption (such as VPNs) to protect against interception.
Paradigms
While more consumers discover wireless Internet at home, telecommunication providers see a new cashcow arising; Voice Over IP. Voice over IP has become a hit in 2005 and 2006 and giants such as SKYPE (Bought by E-bay) and Yahoo Messenger have released applications for VOIP calls. By combining wireless internet (hotspots, wifi at home/work) with VOIP applications, new devices are being placed on the market. Mobile phones that places calls through the Internet will become the standards because of its low cost. The technology is already there, now the infrastructure needs to be sorted out to get worldwide coverage.