Wireless Draft N Compatability Issues

There are many flavors of wireless networking. Most common are 802.11B, 802.11G, and now 802.11N (Draft). 802.11N is “draft” because the standard has not yet been formalized, despite the sale of draft-N devices for over a year. For most people, this won’t cause a problem. But hitches do come up.

Draft N Works, Usually

When I was recently setting up a D-Link draft-N router with a MacBook Pro, I noticed that the wireless connection would drop regularly or show a connection but be unable to receive/transmit. This was due to the incompatable N implementations. The solution is to go into the router settings and switch it to only using B/G. In most cases, I have found draft N devices to work without any issues.

Future of WiFi Standards

The 802.11N standard is expected to be finalized by the IEEE LAN/MAN Standards Committee (IEEE 802) in November 2009. Then all the current draft-N manufacturers promise a firmware upgrade that will make them interoperable. Of course by November 2009, we might be looking at buying new draft wireless standards, as described by PC Magazine:

802.11s, a mesh networking specification that’s been on the drawing board since September 2003. (It probably won’t be final until September 2010.) Laptops and other devices with 11s support will function as mesh points (or MPs) and form links with each other, allowing packets of data to skip from device to device across the network as needed. Mesh has been around for a while in many proprietary forms, and is important not only because it can extend a network’s range but also because it has self-configuring abilities: Mesh devices can move about without impacting overall performance. In such a network, data will hop around from mesh point to mesh point along the shortest path to where it needs to go. Actual 11s is already in use in at least one product: the One Laptop per Child project’s XO laptop uses it to communicate with XS school servers, in some tests over distances as great as 2km with 802.11s data hops from device to device.

802.11u, called “InterWorking with External Networks,” will provide a Wi-Fi device with methods of connecting securely to a network, based on the external network’s type. For example, if you have access to the cellular connection that provides Internet access to the Wi-Fi router on a bus, 11u will keep that connection secure. It will also allow a Wi-Fi device to discover more information about that external network, such as whether it’s free of charge or not. 11u could be published by March of 2010.

802.11z “Direct Link Setup” is the 802.11 Working Group’s take on improving ad hoc connections, at least for business users. It’s entirely unrelated to what the Wi-Fi Alliance is doing for device-to-device communication. 11n allows two laptops that would normally communicate on a secure network to form a P2P connection to talk to one another exclusively. This happens only after they’ve authenticated security credentials through an AP. It’s a super-secure ad hoc that requires the right security setup.

See a full list of 802.11 standards and approval timelines from IEEE.

Down & Up Worm Worst Ever

Over the last few months, the “Down and Up” worm, also known as “Conficker” has infected an estimated 6% of all PCs worldwide. The concern is what the authors will now do with all these compromised systems. They could ask for credit card information as the bogus Antivirus 2009 does. They could use the computers to attack and demand money from websites through denial of service (DOS) attacks. No one knows yet what the intentions of the authors are.

It is considered the most professional and pernicious worm attack that researchers have yet seen. It effects all versions of Windows. As a worm, it does not require any user action for the computer to be compromised. The machine must just not be recently patched.

Download the Malicious Software Removal Tool (also available in Windows Updates) in order to protect your computer or to possibly get rid of the worm (most people who have it do not know). Then you can feel comfortable that your computer is owned by you and not by the bad guys.

CNN to create 3D Inauguration Image

If you are going to the inauguration, you can take pictures (under 10MB in size) of the event and send them to themoment@cnn.com.

CNN will then use Microsoft’s PhotoSynth software to create a massive 3D image. It will be interesting to see how well it works, especially since most of the event will be covered with people. Since the people move, it’s not clear how well the software will be able to match images up. But PhotoSynth has created great 3D experiences in other locations.

UPDATE: See the results of CNN’s PhotoSynth project at CNN’s The Moment site.

Presidential Inauguration

The Presidential Inauguration of Barak Obama on January 20th is expected to be a huge event, eclipsing the previous largest ever turnout since Lyndon Johnson’s 1965 inauguration with 1.2 million people. D.C. Mayor Adrian Fenty says up to 4 million people could converge on downtown Washington for the inauguration, although the Secret Service says that it expects 2 million people.

Screenings

Every one of the 240,000 people attending the actual swearing-in ceremony will be screened by walk-through or hand-held metal detectors. Beyond the obvious weapons not allowed, you also will not be allowed to bring:

  • Sticks or poles
  • Pockets or hand tools, such as “Leatherman”
  • Packages
  • Backpacks
  • Large bags
  • Duffel bags
  • Suitcases
  • Thermoses
  • Coolers
  • Strollers
  • Umbrellas
  • Tripods and camera bags
  • Laser pointers
  • Signs
  • Posters
  • Animals (other than service animals)
  • Alcoholic beverages
  • Other items as determined by and at the discretion of the security screener

So while you might have thought it would be funny to point a laser pointer at the presidential motorcade, it will not be allowed.

It is likely to be so crowded that you won’t want to bring much with you besides your cellphone and camera.

Cellphones

Cellular carriers are adding capacity with temporary towers along the parade route. Still, with an unknown number of visitors, there is concern that the network will be overloaded.

One suggestion is to use text messages if your calls are not going through. These take up very little bandwidth and should work more easily.

Emergency responders and 911 calls will be given priority so those calls should be able to get through.

Getting to the event

All N. Va bridges will be closed to cars. You can walk or bike the bridges.

D.C. will be mostly shut down to traffic.

News

The Washington Post has an Inauguration Central website that includes:

  • A live webcam that is focused on the U.S. Capitol to show the construction of the Inaugural stage.
  • An FAQs section that gives users valuable information about ticket availability, transportation, ceremony timing and parade information, providing a sense of what to expect during in the weeks leading up to the Inauguration.
  • A downloadable map of the parade route with the most updated road closures in the area.
  • A calendar of Inaugural parties and events happening during Inauguration Week.
  • Quizzes, polls and discussion threads which give users a chance to test their inaugural knowledge.
  • A visitors guide which includes an interactive map of attractions on The Mall, suggestions on planning a trip to D.C. and advice on where to get lunch post-inauguration.
  • A section that features inauguration history, including a slideshow that provides a look at past inaugurations.

Inauguration Pop-up

One of favorite items to commemorate the inauguration is a pop-up picture of the event that you can print out and make yourself. This low-tech print out might not be like attending the real thing, but it will certainly be more comfortable.

Old School Hacker

Most high profile hacking today is for profit. The Russian mob and other criminal gangs are often involved in taking over computers, stealing credit cards, and threatening websites with denial-of-service attacks.

That’s why it was somewhat refreshing to see what a hacker did to Twitter yesterday, breaking into 33 celebrity accounts to leave messages on their behalf.

Here’s what CNN’s Rick Sanchez got:

Fox News got “Breaking: Bill O Riley is gay”.

There may have been some profit motive, as President Elect Barack Obama’s account was hacked to have a link to a site that offered a $500 gas card for taking a survey. The Facebook page on Twitter had a link to a porn site. Both sites had affiliate links associated with them, meaning that someone would be getting a referral fee.

The break-ins were tracked down to someone called Gmz from a site called Digital Gangster. It is not yet known if Twitter will pursue the matter legally. If money was made from affiliate accounts, it should be easy to track the person down. A post on the Digital Gangster said:

“That guy [who hacked the sites] must have been a very generous individual. To hand out accounts rather than use that for profit. Could it be enough for respect or just enough for that user to be identified as an “idiot”?”