Feeds

Wi-Fi devices not talking

Wi-Fi Alliance admits to lack of communication

  • alert
  • submit to reddit

Next gen security for virtualised datacentres

The UK Consumers' Association recently upset the Wi-Fi wireless networking world by saying that two different makers were unable to inter-operate. The incident was seen as a one-off. Not so, it now seems.

According to a report carried in eWeek.com, the Wi-Fi Alliance has now publicly admitted that there is a problem.

The original report of incompatibility focused simply on a Netgear wireless bridge, which the supplier effectively admitted was faulty in design.

But now, working network administrators have been complaining that it is often hard to make a WLAN secure unless all the equipment is from the same supplier, because the standard security models have been extended, changed, and even rendered obsolete by new developments.

One admin worker said: "We've recently discovered that the length of the security key is crucial for inter-working between varieties of Wi-Fi gear. Some parts simply won't accept more than a 40-bit key; others require it in Ascii, others in HEX."

Another sysadmin said: "It's also the case that the same identical make of cards, one in a Windows XP machine and the other in a Windows ME machine, can be almost impossible to configure so that they work properly together."

At the CeBIT trade show in Hanover, Wi-Fi Alliance spokesman Brian Grimm said: "About 22 per cent of the devices - such as wireless networking cards for computers, access ports and printer servers - submitted for testing at four partner laboratories failed to work on a network on the first try," according to the AP report.

Grimm said increasing complexity and stronger security was causing the problems; "As equipment becomes more advanced, we're actually seeing interoperability failures go up."

The public perception of this remains low, mostly because home users rarely bother to enable security in Wi-Fi. Also, many of the thousands of public Wi-Fi hotspots have no security built into the wireless transceivers at all, being set up as open points to make logging in simpler. Security - if there is any - is managed from the server which connects the WLAN to the internet.

© Newswireless.net

Related stories

Linksys falls off Wi-Fi bridge
Linksys clarifies Netgear comms breakdown

Related Products
Check out Wi-Fi products in The Reg mobile store

The essential guide to IT transformation

More from The Register

next story
Don't call it throttling: Ericsson 'priority' tech gives users their own slice of spectrum
Actually it's a nifty trick - at least you'll pay for what you get
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
Three floats Jolla in Hong Kong: Says Sailfish is '3rd option'
Network throws hat into ring with Linux-powered handsets
Netflix swallows yet another bitter pill, inks peering deal with TWC
Net neutrality crusader once again pays up for priority access
Fifteen zero days found in hacker router comp romp
Four routers rooted in SOHOpelessly Broken challenge
EE: STILL Blighty's best mobe network, says 'Frappucino' Moore
Fresh round of network stats fisticuffs possibly on the cards here
New Sprint CEO says he will lower axe on staff – but prices come first
'Very disruptive' new rates to be revealed next week
US TV stations bowl sueball directly at FCC's spectrum mega-sale
Broadcasters upset about coverage and cost as they shift up and down the dials
Tech city types developing 'Google Glass for the blind' app
An app and service where other people 'see' for you
Canadian ISP Shaw falls over with 'routing' sickness
How sure are you of cloud computing now?
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.