Jump to content
Reliance Jio & Reliance Mobile Discussion Forums
Sign in to follow this  
wi_fi_On_board

Connecting RIM To A Wi-fi Network

Recommended Posts

Hi,

can any body here help me out and tell me if it is possible to set up a wi fi network ,

so that a couple of comuters can communiacte as well as use the net, using the reliance phone.... connected to an access point or a gateway???

is this posssible???

Share this post


Link to post
Share on other sites

well dude by the way you say it, it seems that you want to setup a wi fi network whose internet provider is the reliance phone.

if so, it'll be really easy..

just set up a common wi fi network and have a phone connected to the main server of the network and give the wi fi network an access to the internet resources.

Share this post


Link to post
Share on other sites

Wht is a WI - FI Network... :P

Share this post


Link to post
Share on other sites
Wht is a WI - FI Network...  :P

WiFi offers customers wireless access to the internet within homes or at hotspots like coffee shops or airport lounges. It has a range of around 30 metres from the access point or wireless receiver.

WiMax is now in the anvil and will become more popular than WiFi, in the near future. Read more here

Share this post


Link to post
Share on other sites

Hackers on the move

Tuesday 25 May 2004

Computerweekly.com

As more employers are issuing mobile devices, the problem of securing company data is becoming ever more acute. Danny Bradbury looks at the threats firms need to address

Many employees want to cut their companies' apron strings, go mobile and go on the road. But although mobile computing has many benefits, security has to be a key consideration. Experts believe that a mobile computing culture will never be as secure as fixed line access behind a firewall because of the insecurities inherent in radio-based networks such as Wi-Fi and Bluetooth.

"The obvious answer is that sealed, Lan-based access will always be more secure," says Mike Smart, worldwide vice-president of product management and engineering at mobile security services company Gric. "Radio frequencies can be scanned."

Smart says that most of his clients' mobile employees are more aware of the potential security dangers than non-mobile users and are more on their guard. Conversely, working behind a firewall on a terrestrial Lan can lull IT managers and end-users into a false sense of security, says Phil Robinson, managing consultant at security services company IRM.

Some of his clients are very poor at securing their Lans and are failing to put network access controls in place. He recalls one or two clients that had no access control mechanism for workers inside the firewall. "If you have a network port connection, you can access the system holding the crown jewels," he says.

But although some hope that firms will take extra care with their mobile networks, statistics suggest otherwise. Research released by the DTI at the InfoSecurity event in April revealed that 68% of the 1,000 UK firms interviewed provide some form of remote access (up 20% from two years ago), but 50% of those companies still have no security procedures to manage mobile devices.

Given the number of potential threats to mobile users, this is particularly worrying. The range of exploits run from the low-tech, such as tricking legitimate users into giving away access information, through to the high-tech, such as "blue jacking" (hacking into Bluetooth devices), and "man-in-the-middle" attacks on Wi-Fi devices. This involves placing a rogue wireless access point in the vicinity of your PC which impersonates a genuine access point, passing on your connection to the genuine network while intercepting data.

Ian Hughes, wireless security consultant at British Telecom's technology research and IT operations business BT Exact, advises users of public Wi-Fi hotspots to use a personal firewall on their notebook PCs while ensuring that file and print sharing is disabled.

The security mechanisms built into wireless networks all have their problems, he says. The Wired Equivalent Privacy protocol, part of the original 802.11b standard, is easy to crack using open source software such as Airsnort, and concerns have also been raised over the Wi-Fi Protected Access security protocol that is a precursor to 802.11i.

Hughes is sceptical of the 802.1x protocol, which is designed as a security overlay for wireless networks. "If you read it as per the IEEE standard, then natively it only authenticates one-way, but there are extensions to it," he says. "You have to be clear which version you are talking about."

Unfortunately, simply encrypting data will not stop an infected or vulnerable machine from polluting the rest of the network. The move towards autonomic and policy-based security is designed to mitigate this risk.

Companies such as Cisco with its self-defending network initiative are producing network agents that analyse devices when they connect and make decisions based on the results. This could lead to a mobile device with an operating system lacking the relevant security patches is quarantined onto part of a network with reduced functionality, or simply refused access altogether.

The problem with such security mechanisms is that they concentrate on the device rather than the user behind it, meaning that if a machine is stolen or used illicitly by another party, it could become a conduit for attack.

Ideally, firms should deploy two-factor security, says Smart. This would encompass something you have, such as a smartcard, in addition to something you know, such as a password. However, the DTI survey reveals that just 6% of companies opted for two-factor authentication when using mobile devices.

This low level of interest combined with the easy-to-lose factor of mobile devices makes data on mobile clients particularly vulnerable, even before it travels over a network connection. Consequently, it is important to encrypt data on the mobile device itself, says Chris Knowles, consultancy practice leader with Computacenter.

The problem with encrypting data has been processor power, says Ollie Whitehouse, director of security architecture at security consultancy @Stake. Many encryption algor-ithms chew up CPU time, leaving small footprint devices unable to cope. He suggests elliptic curve cryptography, as used by companies such as Certicom, as a solution because of the lower processing overhead.

But PDAs and smartphones carry other security challenges. As most of them are purchased and owned by individuals rather than distributed by employers, this can make them a security nightmare. With so many makes and models and with many requiring a return to the service centre for security firmware upgrades, even policy-based or autonomic security architectures will run into difficulties handling PDAs and phones, says Whitehouse.

Some of these devices are prone to bluejacking attacks. Nokia, for example, is releasing software upgrades for selected phones to address this problem in the summer.

When dealing with phones and PDAs, the best approach is to deploy a management policy governing how data is held and synchronised on the corporate network. By taking a universal approach you will be able to mitigate the risks, but the smaller and more varied the device, the more of a security risk it creates in any mobile computing infrastructure.

This article is part of Computer Weekly's Special Report on mobile IT produced in association with Vodafone

Share this post


Link to post
Share on other sites

Hey guys didnt u know about this , then check this out.

Rconnect data card

i dont know wheather it comes under wifi but sure serves the purpose.Thought of taking it for my laptop , but check out the price a cool 14,700 bucks.

i think this has been there for the past 6 months.

Share this post


Link to post
Share on other sites

Spokane claims wireless 'hot zone'

Largest wireless Internet area

Wednesday, June 23, 2004 Posted: 9:47 PM EDT (0147 GMT)

CNN.com

SPOKANE, Washington (AP) -- With the flip of a symbolic switch Wednesday, 100 blocks of downtown Spokane got wireless access to the Internet.

City officials and private developers activated what they call the largest deployment of wireless Internet coverage, also known as Wi-Fi, in any urban area in the United States.

"A lot of communities have hot spots," said Jim West, mayor of the city of 200,000. "We have a hot zone."

The zone uses new technology that allows Internet signals to be transmitted more than a mile, far beyond the traditional 200- to 300-foot range of Wi-Fi antennas.

City officials put the cost of the project, which requires just a few antennas atop buildings, at between $50,000 and $75,000.

The Wi-Fi zone is divided into a private network for use by the city and an open network for the public. The public users can connect for two hours a day at no charge, and subscription plans are in the works for extended use, said Chad Skidmore, president of OneEighty Networks, the company that provided the networking for the project.

The city helped build the network for its own use. Meter maids will write and print parking tickets on the network using handheld devices. Police officers will use wireless devices to run license plate checks, cutting out the step of calling in numbers to a dispatcher by radio.

Vivato, a San Francisco-based company with a research and development center in Spokane, uses technology similar to that used with cellular telephones to transmit Wi-Fi signals throughout the downtown zone.

Most cities that attempt to give blanket coverage to an area use a point-to-point system that links hundreds of antennas. Spokane accomplishes its coverage using fewer than 10 antennas.

City officials hope the investment will attract high-tech businesses that could take advantage of the wireless zone. Spokane, like many other cities, has lost thousands of high-tech jobs in recent years.

The Free usage for abt 2 hrs a day is quite an interesting feature! Anything beyond that cud be charged! wht say?

Share this post


Link to post
Share on other sites

Nice piece of information!

But I don't understand when there already are so many cellular mobile networks available, why do they want to install another...maybe it would give much higher speeds becoz of its dedicated nature/ improved technology.

Does anyone know what is the connection speeds such "hot-zone" networks offer?

Wireless internet is already available on RIM cdma network..and its not just limited to a zone..rather its a national network.

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

Sign in to follow this  

×