Feeds

Wi-Fi devices not talking

Wi-Fi Alliance admits to lack of communication

  • alert
  • submit to reddit

Boost IT visibility and business value

The UK Consumers' Association recently upset the Wi-Fi wireless networking world by saying that two different makers were unable to inter-operate. The incident was seen as a one-off. Not so, it now seems.

According to a report carried in eWeek.com, the Wi-Fi Alliance has now publicly admitted that there is a problem.

The original report of incompatibility focused simply on a Netgear wireless bridge, which the supplier effectively admitted was faulty in design.

But now, working network administrators have been complaining that it is often hard to make a WLAN secure unless all the equipment is from the same supplier, because the standard security models have been extended, changed, and even rendered obsolete by new developments.

One admin worker said: "We've recently discovered that the length of the security key is crucial for inter-working between varieties of Wi-Fi gear. Some parts simply won't accept more than a 40-bit key; others require it in Ascii, others in HEX."

Another sysadmin said: "It's also the case that the same identical make of cards, one in a Windows XP machine and the other in a Windows ME machine, can be almost impossible to configure so that they work properly together."

At the CeBIT trade show in Hanover, Wi-Fi Alliance spokesman Brian Grimm said: "About 22 per cent of the devices - such as wireless networking cards for computers, access ports and printer servers - submitted for testing at four partner laboratories failed to work on a network on the first try," according to the AP report.

Grimm said increasing complexity and stronger security was causing the problems; "As equipment becomes more advanced, we're actually seeing interoperability failures go up."

The public perception of this remains low, mostly because home users rarely bother to enable security in Wi-Fi. Also, many of the thousands of public Wi-Fi hotspots have no security built into the wireless transceivers at all, being set up as open points to make logging in simpler. Security - if there is any - is managed from the server which connects the WLAN to the internet.

© Newswireless.net

Related stories

Linksys falls off Wi-Fi bridge
Linksys clarifies Netgear comms breakdown

Related Products
Check out Wi-Fi products in The Reg mobile store

Seven Steps to Software Security

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
Google Nest, ARM, Samsung pull out Thread to strangle ZigBee
But there's a flaw in Google's IP-based IoT system
Microsoft unsheathes cheap Android-killer: Behold, the Lumia 530
Say it with us: I'm King of the Landfill-ill-ill-ill
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
'Two-speed internet' storm turns FCC.gov into zero-speed website
Deadline for comments on net neutrality shake-up extended to Friday
Oh girl, you jus' didn't: Level 3 slaps Verizon in Netflix throttle blowup
Just hook us up to more 10Gbps ports, backbone biz yells in tit-for-tat spat
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.