Le seguenti 1630 parole non sono state trovate nel dizionario di 1275 termini (includendo 1275 LocalSpellingWords) e sono evidenziate qui sotto:
11a   11b   11g   16a   6h   abandon   able   about   absolute   abundance   accessible   accessing   accessories   accomplished   accordingly   achieve   act   action   active   acts   actual   actually   adapter   adapters   addbr   addif   Adding   addition   additional   address   addresses   administrator   advantage   advantages   affect   afford   against   agreement   aim   Airmux   aligned   Alignment   alignment   allow   allows   almost   alone   along   already   Alternately   alternative   Although   Alvarion   alvarion   always   American   amount   amplifier   Andrew   Another   another   answer   answering   antenna   antennas   anything   apparent   appear   application   applications   applying   approach   appropriate   architect   architecture   areas   aren   arise   arrangement   arresters   arrestor   arrestors   arriving   art   assist   assumes   assuming   at   At   Atheros   attached   attaching   attention   attractive   attributes   authenticated   Authentication   authentication   authors   auto   automatically   availability   Availability   available   avoid   away   back   Back   backfilled   background   backhaul   backup   Badger   balance   band   bandwidth   bang   barring   Based   based   basic   basis   be   Be   bear   Because   because   become   becomes   been   beeper   beeping   before   Before   begin   being   Beldon   below   Berlin   best   better   Between   between   beyond   big   biggest   bit   Blaster   blocking   bolt   boot   booting   born   both   bottom   box   br0   bracket   braided   brctl   breaks   Breezy   bridge   bridges   Bridging   bridging   bring   brings   broad   Broadband   broadcast   brought   buck   Budget   budget   budgets   bug   build   builders   Building   building   buried   But   but   button   buying   buys   by   By   cable   cabled   cables   cabling   caching   calculate   calculation   called   came   can   Can   cannot   capabilities   capable   capitalize   captive   card   cards   care   case   cases   catalog   cause   caused   central   centric   certainly   ch   challenging   changes   changing   channel   chapter   Chapter5   characteristics   charge   charged   charges   charging   cheap   check   checked   chief   Chillispot   chipset   chipsets   choice   choose   Choosing   choosing   Cisco   cisco   claims   clearly   client   clients   close   closer   coating   coatings   coax   combined   Combining   comes   command   commands   Comment   commented   comments   Comments   Commercial   commercial   committing   common   commonly   communication   Communication   communications   Communications   Compact   companies   comparable   comparatively   compared   comparing   competent   competition   competitive   complaints   complete   complex   compliance   Component   component   components   computer   concentrator   conditioners   conductivity   conductor   conductors   conducts   configuration   configurations   configure   configured   confirm   connect   connected   connecting   connection   connectivity   connector   connectors   connects   conscious   Consider   consider   considerable   considered   considering   consist   consistent   consistently   consisting   consists   consulting   consume   consumer   contained   contents   Contents   continue   continuing   contributes   control   controls   convince   copper   Corporation   correct   corrosion   cost   costly   costs   couple   course   covering   creating   credentials   credit   critical   Cs   current   currently   currents   custom   customer   customers   customization   Cwireless   damage   database   day   Debian   debian   decide   decision   decisions   dedicated   default   defined   delbr   delif   deliver   demand   depending   depends   described   description   design   designed   designing   desirable   desktop   Despite   destroy   details   determined   determining   developed   developing   development   device   devices   dhcp   diagram   dial   different   differently   difficult   direct   Direct   directional   directly   disadvantage   discontinue   discontinued   discussed   disk   distance   distribution   distributions   distributors   divide   dnsmasq   doc   documentation   Does   does   doing   domain   don   done   Double   doubt   down   download   downside   drive   driven   driver   drivers   drives   E1   E505   each   earlier   early   earthing   easier   easiest   easily   easy   economic   economy   effective   effectively   effects   efficiency   effort   eg   Either   either   electrical   Electrical   electrically   electricity   electronics   electrons   eliminated   eliminates   else   embedded   emerge   en   enable   Enable   enabled   enc   encounter   encryption   ends   engines   enough   ensure   ensures   enterprise   entire   epitest   equally   equipment   equivalent   especially   essence   essentially   essid   established   establishing   estimate   etc   eth0   Ethernet   evaluating   evaluation   even   event   eventually   every   everyone   everything   exact   example   examples   exception   exist   existing   exists   expect   expecting   expended   expensive   Experience   experience   expires   exposed   extended   extending   external   extra   extreme   extremes   fabricated   fact   factor   factors   fail   failed   fails   fair   fall   familiar   far   fast   faster   Faster   fastest   favorites   feasible   feature   features   Fedora   fee   feed   feels   fees   few   fi   Fi   fictional   field   figure   Figure   figures   file   files   fill   final   Finally   find   Find   finding   finer   firestarter   firewall   Firewall   firewalls   firmware   Firmware   fit   fits   five   fixed   Flash   flash   flashing   flexible   flush   Follow   followed   following   for   For   form   forming   forth   forward   forwarding   found   foundation   fraction   freely   freifunk   Freifunk   frequency   frequently   friendly   from   From   front   frontends   full   function   functionality   further   fwbuilder   G11   G6   gain   galvanizing   gas   gateway   Gauge   gear   general   General   generic   get   gift   give   given   gives   giving   global   Gnome   Gnu   go   goal   goes   going   Good   good   goods   grade   graphical   great   greatest   ground   grounded   grounding   group   Gs   guarantee   guaranteed   guests   guide   hackers   hand   handle   handled   handles   handy   happen   hard   hassle   Having   having   heavy   Heliax   help   helpful   hex   hidden   high   higher   highest   historically   hits   hoc   holds   hole   hopping   Host   hostap   how   How   howto   huge   human   Hz   idea   ideal   identical   identify   if   If   iface   ifconfig   ill   images   Imagine   impact   implement   implementations   implemented   important   importing   imposed   impossible   inch   include   included   including   incompatible   incorporate   increase   increases   indeed   index   indicates   indirect   individual   indoor   Induction   induction   inet   inexpensive   inferior   information   infrastructure   inherent   Initial   initial   injectors   input   inside   installation   installations   installed   installing   installs   Instead   instead   institution   instructions   integrated   intelligent   intend   intended   interchangeable   interconnects   interest   interface   interfaces   Interfaces   interfere   internal   Interoperability   interoperate   into   intranet   introduce   involved   ip   iptables   issue   Its   its   itself   iwconfig   iwlist   job   just   keep   Keep   keeping   keeps   kept   kernel   key   kinds   kit   km   knetfilter   know   knowing   known   labor   lack   laid   laptop   laptops   large   largest   last   latency   later   layer   lead   leads   least   leave   led   leg   length   lessen   let   level   license   licensed   licenses   licensing   lie   lies   life   lifespan   lightning   like   likely   Likewise   limit   limitation   limited   limits   line   lines   linked   links   Linksys   linksysinfo   list   listed   little   live   ll   load   local   locally   lock   locked   log   logging   long   longer   look   looks   loss   lot   low   lower   Ls   lure   m0n0   m0n0wall   machine   machines   made   madwifi   main   mains   maintain   maintained   maintenance   make   Make   makes   making   manage   Managed   managed   management   manager   manipulate   manually   manufacturer   Manufacturers   manufacturers   many   Many   marginally   marked   market   marketing   Masquerading   masquerading   Master   master   match   materials   matter   Max   Mbps   mean   means   meant   measure   meet   members   mention   mentioned   mesh   message   metal   method   methods   Metrix   metrix   Microsoft   Microwave   miles   mind   minimum   minutes   mission   mixed   mode   Mode   model   models   modulation   module   money   monitor   monitoring   monthly   more   More   most   Most   mostly   motherboard   motherboards   mounted   mounts   move   moving   much   multiple   multiply   multipoint   My   my   name   names   natural   naturally   near   nearly   necessarily   necessary   need   needed   needs   negatively   negotiations   net   netmask   network   networkers   Networking   networking   networks   never   new   newer   newest   next   Next   node   nodes   noise   nor   normal   note   Note   notes   nothing   noticeably   now   Now   number   observed   obviously   Obviously   occasionally   occupies   off   offer   offered   offering   office   official   often   Ola   old   on   On   Once   one   One   ongoing   online   Only   only   opening   openwrt   operate   operating   operators   options   or   order   original   originally   others   our   out   outdoor   outdoors   output   over   P2   P54   package   packages   packaging   packet   packets   page   paid   Paid   paint   part   particular   particularly   parts   pass   password   past   patches   path   pay   Pebble   pebble   people   perfectly   perform   performance   performing   perhaps   period   perspective   php   physical   piece   pigtails   pipe   pitch   pitfalls   place   planned   planning   plastic   plate   platform   platforms   plenty   png   point   pointed   points   popular   popularity   port   portal   portals   ports   possible   post   potential   power   powerful   practically   pre   Pre   precaution   precisely   predator   prefer   preferential   preform   prepaid   Prerequisites   press   pressing   prevent   previous   price   prioritize   Prism   private   problem   problems   proceeding   procure   product   Products   products   Professional   program   programmers   prohibitively   project   projected   projects   promises   proof   properly   proprietary   protect   Protecting   protection   protocol   protocols   provide   provided   provides   providing   Ps   public   purchase   purchased   purchasing   purpose   pushed   put   quality   quantity   queries   question   questions   quite   rack   rad   Rad   radios   range   Range   rapidly   rate   rates   Rather   rather   rating   readable   reads   ready   real   realized   reason   reasons   rebooted   receive   receives   recipes   recommend   recycled   Red   Redline   redlinecommunications   refer   referred   reflected   refurbished   regardless   regions   related   relatively   relay   released   relevant   reliant   rely   relying   remember   Remember   removed   repainted   repeated   repeater   repel   replace   replacing   repurposed   require   Required   required   requirement   requirements   requires   researched   reseller   resellers   resolved   resources   rest   restarting   restore   results   retail   reverts   review   reviews   revision   right   ring   risks   risky   robust   rod   role   roles   root   route   routed   router   routers   Routing   routing   rugged   rule   rules   run   running   runs   rust   safe   sale   Sales   sales   same   satellite   save   Save   saving   saw   say   saying   scale   scenario   Scenario   scenarios   Schmidt   science   scope   scratch   scripts   sealed   seattlewireless   section   sections   secure   security   See   see   segment   selection   self   sell   sells   sensitive   sensitivity   separate   sequence   series   services   Set   set   sets   setting   Setting   settings   setup   several   share   shares   sharper   shelf   shield   ship   shipped   ships   shorewall   Shorewall   short   Should   should   show   shown   shows   side   sides   Siemens   signed   significant   significantly   similar   simple   simplest   simplicity   simply   Since   single   situation   situations   six   size   slightly   slowest   small   smaller   so   So   solid   solution   solutions   solve   some   Some   something   soon   sort   sorts   source   sourced   sources   space   span   spare   spares   specially   specific   specifications   specified   spectrum   speed   speeds   splurge   spread   sprinkler   Squid   stable   stack   stage   Stainless   standard   standards   started   starting   Starting   starts   startup   state   static   steel   still   stocked   stop   storage   store   stored   straightforward   strategy   strengths   strike   strikes   string   stripped   strong   stuff   subnet   subtract   such   suit   suited   superior   supplied   supplies   supply   support   supported   supports   sure   surface   surfacing   surge   surprised   surrounding   suspicious   Sven   swap   switch   symbol   syntax   system   Systems   systems   T1   T5   T54   Table   tag   tags   tailored   take   taken   task   team   teams   tech   technically   technician   technique   technology   telecommunications   temperatures   tends   term   terminal   terminated   terms   terrain   Terry   tested   testing   than   that   That   their   thekelleys   themselves   then   Then   theoretical   There   there   thereby   these   These   they   They   thicker   thicknesses   thing   things   think   thinking   this   This   those   three   through   throughout   throughput   Throughput   throwing   thumb   ticket   ticketing   time   Times   timing   tiny   to   To   tolerate   tone   tones   too   tool   Tools   tools   top   total   tower   towers   traffic   training   Trango   trangobroadband   transfer   transformer   translate   transmission   Transparent   transparent   tremendous   tried   trivial   troubleshoot   true   truth   try   tub   tube   tuned   tuning   turn   turns   two   Two   type   types   typical   typically   typing   Ubuntu   uk   unavailable   unclear   Uncomment   uncomment   under   understand   understanding   unfortunately   Unfortunately   unit   units   unless   unlicensed   Unlike   unlikely   unnecessary   unpaid   unprecedented   unprotected   unskilled   Until   until   up   upcoming   updated   upgradeable   uptime   us   Use   use   used   useful   user   users   userspace   uses   Using   using   usr   usually   utils   v4   v5   valid   variables   variety   various   vary   vendor   vendors   verbose   verifying   very   Very   via   viable   view   violating   virtually   vital   voltages   volume   vs   Vx   want   warranty   wasted   water   Waverider   waverider   way   ways   we   We   weak   weatherproof   weatherproofed   webmin   websites   well   what   What   whatever   when   Whenever   where   whether   which   while   While   who   why   Wi   wide   wider   Will   will   Windows   Wire   wire   Wired   wired   wireless   Wireless   wires   wise   wish   with   With   within   without   wlan   wlan0   wlan1   wndw   wondering   work   worked   working   Works   works   world   worldwide   worst   worth   would   writing   Wrt54g   x86   years   yes   yield   yourself  

Nascondi questo messaggio
Italiano English
Modifica History Actions

wndwFirstEdition/Chapter5


Add your comments


Networking Hardware

In the last couple of years, an unprecedented surge in interest in wireless networking hardware has brought a huge variety of inexpensive equipment to the market. So much variety, in fact, that it would be impossible to catalog every available component. In this chapter, we'll look at the sort of features and attributes that are desirable in a wireless component, and see several examples of commercial and DIY gear that has worked well in the past.

Wired wireless

With a name like "wireless", you may be surprised at how many wires are involved in making a simple point-to-point link. A wireless node consists of many components, which must all be connected to each other with appropriate cabling. You obviously need at least one computer connected to an Ethernet network, and a wireless router or bridge attached to the same network. Radio components need to be connected to antennas, but along the way they may need to interface with an amplifier, lightning arrestor, or other device. Many components require power, either via an AC mains line or using a DC transformer. All of these components use various sorts of connectors, not to mention a wide variety of cable types and thicknesses.

Now multiply those cables and connectors by the number of nodes you will bring online, and you may well be wondering why this stuff is referred to as "wireless". The diagram on the next page will give you some idea of the cabling required for a typical point-to-point link. Note that this diagram is not to scale, nor is it necessarily the best choice of network design. But it will introduce you to many common interconnects and components that you will likely encounter in the real world.

http://wiki.wndw.net/images/figures/en/figure-5.1.png

Figure 5.1: Component interconnects.

While the actual components used will vary from node to node, every installation will incorporate these parts:

  1. An existing computer or network connected to an Ethernet switch.
  2. A device that connects that network to a wireless device (a wireless router, bridge, or repeater).
  3. An antenna that is connected via feed line, or is integrated into the wireless device itself.
  4. Electrical components consisting of power supplies, conditioners, and lightning arrestors.

The actual selection of hardware should be determined by establishing the requirements for the project, determining the available budget, and verifying that the project is feasible using the available resources (including providing for spares and ongoing maintenance costs). As discussed in chapter one, establishing the scope of your project is critical before any purchasing decisions are made.

Choosing wireless components

Unfortunately, in a world of competitive hardware manufacturers and limited budgets, the price tag is the single factor that usually receives the most attention. The old saying that "you get what you pay for" often holds true when buying high tech equipment, but should not be considered an absolute truth. While the price tag is an important part of any purchasing decision, it is vital to understand precisely what you get for your money so you can make a choice that fits your needs.

When comparing wireless equipment for use in your network, be sure to consider these variables:

  • Interoperability. Will the equipment you are considering work with equipment from other manufacturers? If not, is this an important factor for this segment of your network? If the gear in question supports an open protocol (such as 802.11b/g), then it will likely interoperate with equipment from other sources.

  • Range. As we saw in chapter four, range is not something inherent in a particular piece of equipment. A device's range depends on the antenna connected to it, the surrounding terrain, the characteristics of the device at the other end of the link, and other factors. Rather than relying on a semi-fictional "range" rating supplied by the manufacturer, it is more useful to know the transmission power of the radio as well as the antenna gain (if an antenna is included). With this information, you can calculate the theoretical range as described in chapter three.

  • Radio sensitivity. How sensitive is the radio device at a given bit rate? The manufacturer should supply this information, at least at the fastest and slowest speeds. This can be used as a measure of the quality of the hardware, as well as allow you to complete a link budget calculation. As we saw in chapter three, a lower number is better for radio sensitivity.

  • Throughput. Manufacturers consistently list the highest possible bit rate as the "speed" of their equipment. Keep in mind that the radio symbol rate (eg. 54Mbps) is never the actual throughput rating of the device (eg. about 22Mbps for 802.11g). If throughput rate information is not available for the device you are evaluating, a good rule of thumb is to divide the device "speed" by two, and subtract 20% or so. When in doubt, perform throughput testing on an evaluation unit before committing to purchasing a large amount of equipment that has no official throughput rating.

  • Required accessories. To keep the initial price tag low, vendors often leave out accessories that are required for normal use. Does the price tag include all power adapters? (DC supplies are typically included; power over Ethernet injectors typically are not. Double-check input voltages as well, as equipment is often provided with a US-centric power supply). What about pigtails, adapters, cables, antennas, and radio cards? If you intend to use it outdoors, does the device include a weatherproof case?

  • Availability. Will you be able to easily replace failed components? Can you order the part in large quantity, should your project require it? What is the projected life span of this particular product, both in terms of useful running time in-the-field and likely availability from the vendor?

  • Other factors. Be sure that other needed features are provided for to meet your particular needs. For example, does the device include an external antenna connector? If so, what type is it? Are there user or throughput limits imposed by software, and if so, what is the cost to increase these limits? What is the physical form factor of the device? How much power does it consume? Does it support POE as a power source? Does the device provide encryption, NAT, bandwidth monitoring tools, or other features critical to the intended network design?

By answering these questions first, you will be able to make intelligent buying decisions when it comes time to choose networking hardware. It is unlikely that you will be able to answer every possible question before buying gear, but if you prioritize the questions and press the vendor to answer them before committing to a purchase, you will make the best use of your budget and build a network of components that are well suited to your needs.

Commercial vs. DIY solutions

Your network project will almost certainly consist of components purchased from vendors as well as parts that are sourced or even fabricated locally. This is a basic economic truth in most areas of the world. At this stage of human technology, global distribution of information is quite trivial compared to global distribution of goods. In many regions, importing every component needed to build a network is prohibitively expensive for all but the largest budgets. You can save considerable money in the short term by finding local sources for parts and labor, and only importing components that must be purchased.

Of course, there is a limit to how much work can be done by any individual or group in a given amount of time. To put it another way, by importing technology, you can exchange money for equipment that can solve a particular problem in a comparatively short amount of time. The art of building local telecommunications infrastructure lies in finding the right balance of money to effort needed to be expended to solve the problem at hand.

Some components, such as radio cards and antenna feed line, are likely far too complex to consider having them fabricated locally. Other components, such as antennas and towers, are relatively simple and can be made locally for a fraction of the cost of importing. Between these extremes lie the communication devices themselves.

By using off-the-shelf radio cards, motherboards, and other components, you can build devices that provide features comparable (or even superior) to most commercial implementations. Combining open hardware platforms with open source software can yield significant "bang for the buck" by providing custom, robust solutions for very low cost.

This is not to say that commercial equipment is inferior to a do-it-yourself solution. By providing so-called "turn-key solutions", manufacturers not only save development time, but they can also allow relatively unskilled people to install and maintain equipment. The chief strengths of commercial solutions are that they provide support and a (usually limited) equipment warranty. They also provide a consistent platform that tends to lead to very stable, often interchangeable network installations.

If a piece of equipment simply doesn't work or is difficult to configure or troubleshoot, a good manufacturer will assist you. Should the equipment fail in normal use (barring extreme damage, such as a lightning strike) then the manufacturer will typically replace it. Most will provide these services for a limited time as part of the purchase price, and many offer support and warranty for an extended period for a monthly fee. By providing a consistent platform, it is simple to keep spares on hand and simply "swap out" equipment that fails in the field, without the need for a technician to configure equipment on-site. Of course, all of this comes at comparatively higher initial cost for the equipment compared to off-the-shelf components.

From a network architect's point of view, the three greatest hidden risks when choosing commercial solutions are vendor lock-in, discontinued product lines, and ongoing licensing costs.

It can be costly to allow the lure of ill-defined new "features" drive the development of your network. Manufacturers will frequently provide features that are incompatible with their competition by design, and then issue marketing materials to convince you that you simply cannot live without them (regardless of whether the feature contributes to the solution of your communications problem). As you begin to rely on these features, you will likely decide to continue purchasing equipment from the same manufacturer in the future. This is the essence of vendor lock-in. If a large institution uses a significant amount of proprietary equipment, it is unlikely that they will simply abandon it to use a different vendor. Sales teams know this (and indeed, some rely on it) and use vendor lock-in as a strategy for price negotiations.

When combined with vendor lock-in, a manufacturer may eventually decide to discontinue a product line, regardless of its popularity. This ensures that customers, already reliant on the manufacturer's proprietary features, will purchase the newest (and nearly always more expensive) model. The long term effects of vendor lock-in and discontinued products are difficult to estimate when planning a networking project, but should be kept in mind.

Finally, if a particular piece of equipment uses proprietary computer code, you may need to license use of that code on an ongoing basis. The cost of these licenses may vary depending on features provided, number of users, connection speed, or other factors. If the license fee is unpaid, some equipment is designed to simply stop working until a valid, paid-up license is provided! Be sure that you understand the terms of use for any equipment you purchase, including ongoing licensing fees.

By using generic equipment that supports open standards and open source software, you can avoid some of these pitfalls. For example, it is very difficult to become locked-in to a vendor that uses open protocols (such as TCP/IP over 802.11a/b/g). If you encounter a problem with the equipment or the vendor, you can always purchase equipment from a different vendor that will interoperate with what you have already purchased. It is for these reasons that we recommend using proprietary protocols and licensed spectrum only in cases where the open equivalent (such as 802.11a/b/g) is not technically feasible.

Likewise, while individual products can always be discontinued at any time, you can limit the impact this will have on your network by using generic components. For example, a particular motherboard may become unavailable on the market, but you may have a number of PC motherboards on hand that will perform effectively the same task. We will see some examples of how to use these generic components to build a complete wireless node later in this chapter.

Obviously, there should be no ongoing licensing costs involved with open source software (with the exception of a vendor providing extended support or some other service, without charging for the use of the software itself). There have occasionally been vendors who capitalize on the gift that open source programmers have given to the world by offering the code for sale on an ongoing licensed basis, thereby violating the terms of distribution set forth by the original authors. It would be wise to avoid such vendors, and to be suspicious of claims of "free software" that come with an ongoing license fee.

The disadvantage of using open source software and generic hardware is clearly the question of support. As problems with the network arise, you will need to solve those problems for yourself. This is often accomplished by consulting free online resources and search engines, and applying code patches directly. If you do not have team members who are competent and dedicated to designing a solution to your communications problem, then it can take a considerable amount of time to get a network project off the ground. Of course, there is never a guarantee that simply "throwing money at the problem" will solve it either. While we provide many examples of how to do much of the work yourself, you may find this work very challenging. You will need to find the balance of commercial solution and do-it-yourself approach that works for project.

In short, always define the scope of your network first, identify the resources you can bring to bear on the problem, and allow the selection of equipment to naturally emerge from the results. Consider commercial solutions as well as open components, while keeping in mind the long-term costs of both.

Professional Wireless Products

There is an abundance of equipment on the market for long distance, point-to-point (P2P) links. Most of this equipment is ready to go right out of the box, only the antenna cables need to be attached and sealed. When thinking about a long distance link, there are three main factors to consider: total link distance, uptime requirements, and of course, link speed requirements.

Most of the commonly available commercial products for longer range links now use OFDM technology and operate in the 5.8 GHz ISM band. There are some products available that use open standards, but most use a proprietary protocol of some sort. This does mean that in order to form a link, the radios on both sides will have to be from the same manufacturer. For mission critical links it is a good idea to choose a system that uses the identical equipment on both sides of the link. This way only one spare unit needs to be stocked, and if need be, can replace either side of the link. There are some good products on the market that use different equipment at either end of a link. These can be used in a network as long as it is done with care, or else spares will need to be available in both kinds of radios.

This is not meant to be a sales pitch for any radio, or complaints about them either. These are just some notes that have come from more then five years of field experience all over the world with unlicensed commercial products. There is unfortunately no way to review every product, so some favorites are listed below.

Redline Communications

Redline first came to market with its AN-50 line of products. This was the first point-to-point product available with data rates above 50 Mbps that small operators could actually afford. They only use 20 MHz of spectrum per channel. There are three different models available in their AN-50 line. All three have the same basic feature sets, only the total bandwidth changes. The standard model has 36 Mbps throughput, the economy model has 18 Mbps, and the full version has 54 Mbps. The bandwidth controls are software upgradeable and can be added into the system as the demand for bandwidth increases.

Redline radios consist of an indoor unit, an outdoor unit, and an antenna. The indoor unit fits in a standard 19 inch rack, and occupies 1U. The outdoor unit mounts on the same bracket that holds the antenna in place. This outdoor unit is the actual radio. The two units are linked by a coax interface cable. Beldon RG6 or RG11 cable is used for this interface cable. This is the same cable used for satellite TV installations. It is inexpensive, easy to find, and eliminates the need for expensive low loss cable, like the Times Microwave LMR series or Andrew Corporation Heliax. Also, keeping the radio mounted so close to the antenna keeps the cable related loss to an absolute minimum.

There are two features to note on the Redline radios. The first is the General Alignment Mode, which turns on a beeper that changes tone as the modulation technique changes. Faster beeping means a faster connection. This allows for a much easier alignment as the link can be mostly aligned by the tones alone. Only a final tuning will be needed, and a graphical Windows application is available to help with this. The other feature is a Test button. Whenever radio changes are made but are not sure to be correct, pressing the test button instead of the Save button will make the new changes active for five minutes. After five minutes, the configuration reverts back to the setting before the test button was pushed. This allows the changes to be tried out, and if things don't work out and the link goes down, the link will come back after five minutes. Once the changes have been tried out, simply confirm the new settings in the configuration, and press the save button instead of the test button.

Redline has other models available. The AN-30 has four T1/E1 ports, in addition to a 30 Mbps Ethernet connection. The AN-100 follows the 802.16a standard, and the upcoming RedMax promises WiMax compliance.

For more information about Redline Communications products, see http://www.redlinecommunications.com/

Alvarion

One of the biggest advantages of working with Alvarion products is Alvarion's very well established worldwide distribution network. They also have one of the largest worldwide market shares for all kinds of wireless Internet connectivity hardware. There are distributors and resellers within most regions. For longer distance links there are two products of interest: The VL series, and the Link Blaster.

While the VL series is actually a point-to-multipoint system, a single client radio connecting to a single access point will function just fine for a point-to-point link. The only thing that should be considered is using a more directional antenna at the access point, unless there is a future link planned that could connect to that access point. There are two speeds available for the VL series, 24 Mbps and 6 Mbps. Budget, uptime, and speed requirements will guide the decision between which CPE to use.

The Link Blaster looks and feels a lot like a Redline AN-50. That's because it is one. Very soon after the Redline AN-50 came on the market, an OEM agreement between the two companies was signed, and the Link Blaster was born. Although the indoor unit is in a different case, and the antennas are marked differently, the electronics inside the units are identical. The Link Blaster does cost more then a Redline; this money buys you a more rugged design and an additional level of support. In many cases, an Alvarion reseller may be closer and easier to ship product from then some Redline resellers. This will be something that will have to be locally researched. It may be worth the extra money to have a product that is locally available and supported.

Alvarion does have some 2.4 GHz point-to-point products available. Most of their product range in the 2.4 GHz ISM band uses frequency hopping spread spectrum (FHSS) and will create a lot of noise for local direct sequence spread spectrum (DSSS) on the same tower. If a DSSS based distribution system is being planned for, then a FHSS backhaul is not going to be an effective option.

For more information about Alvarion products, see http://www.alvarion.com/

Rad Data Communications

The Rad Airmux product line is relatively new to the market, and has some great potential. The Airmux 200 is a 48 Mbps radio, uses CAT5 cable, and comes with one of the most friendly price tags of any commercial solution. The units are small and easy to handle on a tower. The downside that may be found is a lack of a local distribution system in the developing world. There are two models available within the Airmux line. One uses internal antennas, and the other uses external antennas.

Experience with Airmux radios in early 2005 shows there is an issue in the timing configurations. This only becomes apparent when the link distance is more then 12 miles, or 19 km. It doesn't matter which antennas are being used. Until this bug is fixed, these radios should only be used for links under 19 km. When that guide is followed these radios preform very well, especially for their price point.

For more information about Rad Data Communications products, see http://www.rad.com/

Cisco Systems

Cisco wireless solutions have two big advantages to their credit. They have a very well established distribution, support, and training network throughout most of the world. There are distributors and resellers all over the place. This can be a big help when it comes time to procure equipment, and even more important if equipment breaks and needs replacing. The next big advantage is that for the most part, they use open standards. Most of their available equipment follows 802.11a/b/g standards.

Experience has shown that their web based configuration tools are not as easy to understand as those found in many other products, and the equipment tends to come with a price tag that makes other non-commercial, open standard solutions more viable.

More information about Cisco can be found at http://www.cisco.com/

Any others?

There are many more solutions available on the market now, and more arriving all of the time. Good solutions are available from companies like Trango Broadband (http://www.trangobroadband.com/) and Waverider Communications (http://www.waverider.com/). When considering which solution to use, always remember the three main factors; distance, uptime and speed. Be sure to check and make sure that the radios operate in an unlicensed band where you are installing them.

Professional lightning protection

The only natural predator of wireless equipment is lightning. There are two different ways lightning can strike or damage equipment: direct hits or induction hits. Direct hits are when lightning actually hits the tower or antenna. Induction hits are caused when lightning strikes near the tower. Imagine a negatively charged lightning bolt. Since like charges repel each other, that bolt will cause the electrons in the cables to move away from the strike, creating current on the lines. This is much more current the the sensitive radio equipment can handle. Either type of strike will usually destroy unprotected equipment.

http://wiki.wndw.net/images/figures/en/figure-5.2.png

Figure 5.2: A tower with a heavy copper grounding wire.

Protecting wireless networks from lightning is not an exact science, and there is no guarantee that a lightning strike will not happen, even if every single precaution is taken. Many of the methods used will help prevent both direct and induction strikes. While it is not necessary to use every single lightning protection method, using more methods will help further protect the equipment. The amount of lightning historically observed within a service area will be the biggest guide to how much needs to be done.

Start at the very bottom of the tower. Remember, the bottom of the tower is below the ground. After the tower foundation is laid, but before the hole is backfilled, a ring of heavy braided ground wire should have been installed with the lead extending above ground surfacing near a tower leg. The wire should be American Wire Gauge (AWG) #4 or thicker. In addition, a backup ground or earthing rod should be driven into the ground, and a ground wire run from the rod to the lead from the buried ring.

It is important to note that not all steel conducts electricity the same way. Some types of steel act as better electrical conductors then others, and different surface coatings can also affect how tower steel handles electrical current. Stainless steel is one of the worst conductors, and rust proof coatings like galvanizing or paint lessen the conductivity of the steel. For this reason, a braided ground wire is run from the bottom of the tower all the way to the top. The bottom needs to be properly attached to the leads from both the ring and the backup ground rod. The top of the tower should have a lightning rod attached, and the top of that needs to be pointed. The finer and sharper the point, the more effective the rod will be. The braided ground wire from the bottom needs to be terminated at this grounding rod. It is very important to be sure that the ground wire is connected to the actual metal. Any sort of coating, such as paint, must be removed before the wire is attached. Once the connection is made, the exposed area can be repainted, covering the wire and connectors if necessary to save the tower from rust and other corrosion.

The above solution details the installation of the basic grounding system. It provides protection for the tower itself from direct hits, and installs the base system to which everything else will connect.

The ideal protection for indirect induction lightning strikes are gas tube arrestors at both ends of the cable. These arrestors need to be grounded directly to the ground wire installed on the tower if it is at the high end. The bottom end needs to be grounded to something electrically safe, like a ground plate or a copper pipe that is consistently full of water. It is important to make sure that the outdoor lightning arrestor is weatherproofed. Many arresters for coax cables are weatherproofed, while many arresters for CAT5 cable are not.

In the event that gas arrestors are not being used, and the cabling is coax based, then attaching one end of a wire to the shield of the cable and the other to the ground wire installed on the towers will provide some protection. This can provide a path for induction currents, and if the charge is weak enough, it will not affect the conductor wire of the cable. While this method is by no means as good of protection as using the gas arrestors, it is better then doing nothing at all.

Building an AP from a PC

Unlike consumer operating systems (such as Microsoft Windows), the GNU/Linux operating system gives a network administrator the potential for full access to the networking stack. One can access and manipulate network packets at any level from the data-link layer through the application layer. Routing decisions can be made based on any information contained in a network packet, from the routing addresses and ports to the contents of the data segment. A Linux-based access point can act as a router, bridge, firewall, VPN concentrator, application server, network monitor, or virtually any other networking role you can think of. It is freely available software, and requires no licensing fees. GNU/Linux is a very powerful tool that can fill a broad variety of roles in a network infrastructure.

Adding a wireless card and Ethernet device to a PC running Linux will give you a very flexible tool that can help you deliver bandwidth and manage your network for very little cost. The hardware could be anything from a recycled laptop or desktop machine to an embedded computer, such as a Linksys WRT54G or Metrix networking kit.

In this section we will see how to configure Linux in the following configurations:

  • As a wireless access point with Masquerading/NAT and a wired connection to the Internet (also referred to as a wireless gateway).
  • As a wireless access point that acts as a transparent bridge. The bridge can be used either as a simple access point, or as a repeater with 2 radios.

Consider these recipes as a starting point. By building on these simple examples, you can create a server that fits precisely into your network infrastructure.

Prerequisites

Before proceeding, you should already be familiar with Linux from a users perspective, and be capable of installing the Gnu/Linux distribution of your choice. A basic understanding of the command line interface (terminal) in Linux is also required.

You will need a computer with one or more wireless cards already installed, as well as a standard Ethernet interface. These examples use a specific card and driver, but there are a number of different cards that should work equally well. Wireless cards based on the Atheros and Prism chipsets work particularly well. These examples are based on Ubuntu Linux version 5.10 (Breezy Badger), with a wireless card that is supported by the HostAP or MADWiFi drivers. For more information about these drivers, see http://hostap.epitest.fi/ and http://madwifi.org/ .

The following software is required to complete these installations. It should be provided in your Linux distribution:

  • Wireless Tools (iwconfig, iwlist commands)
  • iptables firewall
  • dnsmasq (caching DNS server and DHCP server)

The CPU power required depends on how much work needs to be done beyond simple routing and NAT. For many applications, a 133MHz 486 is perfectly capable of routing packets at wireless speeds. If you intend to use a lot of encryption (such as WEP or a VPN server), then you will need something faster. If you also want to run a caching server (such as Squid, see chapter three) then you will need a computer with plenty of fast disk space and RAM. A typical router that is only performing NAT will operate will with as little as 64MB of RAM and storage.

When building a machine that is intended to be part of your network infrastructure, keep in mind that hard drives have a limited lifespan compared to most other components. You can often use solid state storage, such as a flash disk, in place of a hard drive. This could be a USB flash drive (assuming your PC will boot from USB), or a Compact Flash card using a CF to IDE adapter. These adapters are quite inexpensive, and will make a CF card appear act like standard IDE hard drive. They can be used in any PC that supports IDE hard drives. Since they have no moving parts, they will operate for many years through a much wider range of temperatures than a hard disk will tolerate.

Scenario 1: Masquerading access point

This is the simplest of the scenarios, and is especially useful in situations where you want a single access point for an office setting. This is easiest in a situation where:

  1. There is an existing dedicated firewall and gateway running Linux, and you just want to add a wireless interface.
  2. You have an old refurbished computer or laptop available, and prefer to use that as an access point.
  3. You require more power in terms of monitoring, logging and/or security than most commercial access points provide, but don't want to splurge on an enterprise access point.
  4. You would like a single machine to act as 2 access points (and firewall) so that you can offer both a secure network access to the intranet, as well as open access to guests.

Initial setup

Start of with an already configured computer running GNU/Linux. This could be an Ubuntu Server installation, or Fedora Core. The computer must have at least 2 interfaces for this to work, and at least one of these interfaces should be wireless. The rest of this description assumes that your cabled Ethernet port (eth0) is connected to the Internet, and that there is a wireless interface (wlan0) that will provide the access point functionality.

To find out if your chipset supports master mode, try the following command as root:

# iwconfig wlan0 mode Master

...replacing wlan0 with the name of your interface.

If you get an error message, then your wireless card doesn't support access point mode. You can still try the same setup in Ad-hoc mode, which is supported by all chipsets. This requires that you to set all the laptops that are connecting to this "access point" into Ad-hoc mode as well, and may not work quite the way you are expecting. It is usually better to find a wireless card that will support AP mode. See the HostAP and MADWiFi websites mentioned earlier for a list of supported cards.

Before continuing, make sure dnsmasq is installed on your machine. You can use the graphical package manager of your distribution to install it. In Ubuntu you can simply run the following as root:

# apt-get install dnsmasq

Setting up the interfaces

Set up your server so that eth0 is connected to the Internet. Use the graphical configuration tool that came with your distribution.

If your Ethernet network uses DHCP, you could try the following command as root:

# dhclient eth0

You should receive an IP address and default gateway. Next, set your wireless interface to Master mode and give it a name of your choice:

# iwconfig wlan0 essidmy networkmode Master enc off 

The enc off switch turns off WEP encryption. To enable WEP, add a hex-key string of the correct length:

# iwconfig wlan0 essidmy networkmode Master enc 1A2B3C4D5E 

Alternately, you can use a readable string by starting with "s:"

# iwconfig wlan0 essidmy networkmode Master enc "s:apple"

Now give your wireless interface an IP address in a private subnet, but make sure it is not the same subnet as that of your Ethernet adapter:

# ifconfig wlan0 10.0.0.1 netmask 255.255.255.0 broadcast 10.0.0.255 up

Setting up masquerading in the kernel

In order for us to be able to translate addresses between the two interfaces on the computer, we need to enable masquerading (NAT) in the linux kernel. First we load the relevant kernel module:

# modprobe ipt_MASQUERADE

Now we will flush all existing firewall rules to ensure that the firewall is not blocking us from forwarding packets between the two interfaces. If you have an existing firewall running, make sure you know how to restore the existing rules later before proceeding.

# iptables -F

Enable the NAT functionality between the two interfaces

# iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE

Finally we need to enable the kernel to forward packets between interfaces:

# echo 1 > /proc/sys/net/ipv4/ip_forward

On Debian-based Linux distributions such as Ubuntu, this change can also be made by editing the file /etc/network/options, and changing the line

ip_forward=no

to

ip_forward=yes

and then restarting the network interfaces with:

# /etc/init.d/network restart 

or

# /etc/init.d/networking restart 

Setting up the DHCP server

At this point we actually should have a working access point. It can be tested by connecting to the wireless network "my network" with a separate machine and giving that machine an address in the same address range as our wireless interface on the server (10.0.0.0/24 if you followed the examples). If you have enabled WEP, be sure to use the same key that you specified on the AP.

In order to make it easier for people to connect to the server without knowing the IP address range, we will set up a DHCP server to automatically hand out addresses to wireless clients.

We use the program dnsmasq for this purpose. As the name indicates, it provides a caching DNS server as well as a DHCP server. This program was developed especially for use with firewalls performing NAT. Having a caching DNS server is especially helpful if your Internet connection is a high-latency and/or low-bandwidth connection, such as a VSAT or dial-up. It means that many DNS queries can be resolved locally, saving a lot of traffic on the Internet connection, and also making the connection feel noticeably faster for those connecting.

Install dnsmasq with your distributions package manager. If dnsmasq is not available as a package, download the source code and install it manually. It is available from http://thekelleys.org.uk/dnsmasq/doc.html.

All that is required for us to run dnsmasq is to edit a few lines of the dnsmasq configuration file,

The configuration file is well commented, and has many options for various types of configuration. To get the basic DHCP server up and running we just need to uncomment and/or edit two lines.

Find the lines that starts:

interface= 

...and make sure it reads:

interface=wlan0

...changing wlan0 to match name of your wireless interface. Then find the line that starts with:

#dhcp-range=

Uncomment the line and edit it to suit the match addresses being used, i.e.

dhcp-range=10.0.0.10,10.0.0.110,255.255.255.0,6h

Then save the file and start dnsmasq:

# /etc/init.d/dnsmasq start

That's it, you should now be able to connect to the server as an access point, and get an IP address using DHCP. This should let you connect to the Internet through the server.

Adding extra security: Setting up a Firewall

Once this is set up and tested, you can add extra firewall rules using whatever firewall tool is included in your distribution. Some typical front-ends for setting up firewall rules include:

  • firestarter - a graphical client for Gnome, which requires that your server is running Gnome

  • knetfilter - a graphical client for KDE, which requires that your server is running KDE

  • Shorewall - a set of scripts and configuration files that will make it easier to setup an iptables firewall. There are also frontends for shorewall, such as webmin-shorewall

  • fwbuilder - a powerful, but slightly complex graphical tool that will let you create iptables scripts on a machine separate from your server, and then transfer them to the server later. This does not require you to be running a graphical desktop on the server, and is a strong option for the security conscious.

Once everything is configured properly, make sure that all settings are reflected in the system startup scripts. This way, your changes will continue to work should the machine need to be rebooted.

Scenario 2: Transparent Bridging access point

This scenario can either be used for a two-radio repeater, or for an access point connected to an Ethernet. We use a bridge instead of routing when we want both interfaces on the access point to share the same subnet. This can be particularly useful in networks with multiple access points where we prefer to have a single, central firewall and perhaps authentication server. Because all clients share the same subnet they, can easily be managed with a single DHCP server and firewall without the need for DHCP relay.

For example, you could setup a server as the first scenario, but use two wired Ethernet interfaces instead of one wired and one wireless. One interface would be your Internet connection, and the other would connect to a switch. Then connect as many access points as you require to the same switch, set them up as transparent bridges, and everyone will pass through the same firewall and use the same DHCP server.

The simplicity of bridging comes at a cost of efficiency. Since all clients share the same subnet, broadcast traffic will be repeated throughout the network. This is usually fine for small networks, but as the number of clients increases, more wireless bandwidth will be wasted on broadcast network traffic.

Initial setup

The initial setup for a bridging access point is similar to that of a masquerading access point, without the requirement of dnsmasq. Follow the initial setup instructions from the previous example.

In addition, the bridge-utils package is required for bridging. This package exists for Ubuntu and other Debian-based distributions, as well as for Fedora Core. Make sure it is installed and that the command brctl is available before proceeding.

Setting up the Interfaces

On Ubuntu or Debian we set up the interfaces by editing the file

Add a section like the following, but change the names of interfaces and the IP addresses accordingly. The IP address and netmask must match that of your existing network. This example assumes you are building a wireless repeater with two wireless interfaces, wlan0 and wlan1. The wlan0 interface will be a client to the "office" network, and wlan1 will create a network called "repeater".

Add the following to /etc/network/interfaces:

auto br0 
iface br0 inet static 
  address 192.168.1.2 
  network 192.168.1.0 
  netmask 255.255.255.0 
  broadcast 192.168.1.255 
  gateway 192.168.1.1 
  pre-up ifconfig wlan 0 0.0.0.0 up 
  pre-up ifconfig wlan1 0.0.0.0 up 
  pre-up iwconfig wlan0 essidofficemode Managed 
  pre-up iwconfig wlan1 essidrepeatermode Master 
  bridge_ports wlan0 wlan1 
  post-down ifconfig wlan1 down 
  post-down ifconfig wlan0 down 

Comment out any other sections in the file that refer to wlan0 or wlan1 to make sure that they don't interfere with our setup.

This syntax for setting up bridges via the interfaces file is specific to Debian-based distributions, and the details of actually setting up the bridge are handled by a couple of scripts: /etc/network/if-pre-up.d/bridge and /etc/network/if-post-down.d/bridge. The documentation for these scripts is found in /usr/share/doc/bridge-utils/.

If those scripts don't exist on your distribution (such as Fedora Core), here is an alternative setup for which will achieve the same thing with only marginally more hassle:

iface br0 inet static 
  pre-up ifconfig wlan 0 0.0.0.0 up 
  pre-up ifconfig wlan1 0.0.0.0 up 
  pre-up iwconfig wlan0 essidofficemode Managed 
  pre-up iwconfig wlan1 essidrepeatermode Master 
  pre-up brctl addbr br0 
  pre-up brctl addif br0 wlan0 
  pre-up brctl addif br0 wlan1 
  post-down ifconfig wlan1 down 
  post-down ifconfig wlan0 down 
  post-down brctl delif br0 wlan0 
  post-down brctl delif br0 wlan1 
  post-down brctl delbr br0 

Starting the bridge

Once the bridge is defined as an interface, starting the bridge is as simple as typing:

# ifup -v br0

The "-v" means verbose output and will give you information to what is going on.

On Fedora Core (i.e. non-debian distributions) you still need to give your bridge interface an ip address and add a default route to the rest of the network:

# ifconfig br0 192.168.1.2 netmask 255.255.255.0 broadcast 192.168.1.255 
# route add default gw 192.168.1.1 

You should now be able to connect a wireless laptop to this new access point, and connect to the Internet (or at least to the rest of your network) through this box.

If you want more information about what your bridge and what it is doing, take a look at the brctl command. For example try this command:

# brctl show br0 

That should show you some information about what your bridge is doing.

Scenario 1 & 2 the easy way

Instead of setting up your computer as an access point from scratch, you may wish to use a dedicated Linux distribution that is specially tailored for this purpose. These distributions can make the job as simple as booting from a particular CD on a computer with a wireless interface. See the following section, "Wireless-friendly operating systems" for more information.

As you can see, it is straightforward to provide access point services from a standard Linux router. Using Linux gives you significantly more control over how packets are routed through your network, and allows for features that simply aren't possible on consumer grade access point hardware.

For example, you could start with either of the above two examples and implement a private wireless network where users are authenticated using a standard web browser. Using a captive portal such as Chillispot, wireless users can be checked against credentials in an existing database (say, a Windows domain server accessible via RADIUS). This arrangement could allow for preferential access to users in the database, while providing a very limited level of access for the general public.

Another popular application is the prepaid commercial model. In this model, users must purchase a ticket before accessing the network. This ticket provides a password that is valid for a limited amount of time (typically one day). When the ticket expires, the user must purchase another. This ticketing feature is only available on relatively expensive commercial networking equipment, but can be implemented using free software such as Chillispot and phpMyPrePaid. We will see more about captive portal technology and ticketing systems in the Authentication section in chapter six.

Wireless-friendly operating systems

There are a number of open source operating system that provide useful tools for working with wireless networks. These are intended to be used on repurposed PCs or other networking hardware (rather than on a laptop or server) and are fine-tuned for building wireless networks. Some of these projects include:

  • Freifunk. Based on the OpenWRT project (http://openwrt.org/), the Freifunk firmware brings easy OLSR support to MIPS-based consumer access points, such as the Linksys WRT54G / WRT54GS / WAP54G, Siemens SE505, and others. By simply flashing one of these APs with the Freifunk firmware, you can rapidly build a self-forming OLSR mesh. Freifunk is not currently available for x86 architecture machines. It is maintained by Sven Ola of the Freifunk wireless group in Berlin. You can download the firmware from http://www.freifunk.net/wiki/FreifunkFirmware .

  • Metrix Pebble. The Pebble Linux project was started in 2002 by Terry Schmidt of the NYCwireless group. It was originally a stripped-down version of the Debian Linux distribution that included wireless, firewall, traffic management, and routing tools. Since 2004, Metrix Communication has been extending Pebble to include updated drivers, bandwidth monitoring, and a web-based configuration tool. The aim of Metrix Pebble is to provide a complete platform for wireless development. It works on x86 hardware with at least 64MB of flash or hard disk storage. You can download Metrix Pebble from http://metrix.net/metrix/howto/metrix-pebble.html .

  • m0n0wall. Based on FreeBSD, m0n0wall is a very tiny but complete firewall package that provides AP services. It is configured from a web interface and the entire system configuration is stored in a single XML file. Its tiny size (less than 6MB) makes it attractive for use in very small embedded systems. Its goal is to provide a secure firewall, and as such does not include userspace tools (it is not even possible to log into the machine over the network). Despite this limitation, it is a popular choice for wireless networkers, particularly those with a background in FreeBSD. You can download m0n0wall from http://www.m0n0.ch/ .

All of these distributions are designed to fit in machines with limited storage. If you are using a very large flash disk or hard drive, you can certainly install a more complete OS (such as Ubuntu or Debian) and use the machine as a router or access point. It will likely take a fair amount of development time to be sure all needed tools are included, without installing unnecessary packages. By using one of these projects as a starting point for building a wireless node, you will save yourself considerable time and effort.

The Linksys WRT54G

One of the most popular consumer access points currently on the market is the Linksys WRT54G. This access point features two external RP-TNC antenna connectors, a four port Ethernet switch, and an 802.11b/g radio. It is configured through a simple web interface. While it is not designed as an outdoor solution, it can be installed in a large sprinkler box or plastic tub for relatively little cost. As of this writing, the WRT54G sells for about $60.

Back in 2003, network hackers realized that the firmware that shipped with the WRT54G was actually a version of Linux. This led to a tremendous interest in building custom firmware that extended the capabilities of the router significantly. Some of these new features include client radio mode support, captive portals, and mesh networking. Two popular alternative firmware packages for the WRT54G are OpenWRT (http://openwrt.org/) and Freifunk (http://www.freifunk.net/wiki/FreifunkFirmware).

Unfortunately, in the fall of 2005, Linksys released version 5 of the WRT54G. This hardware revision eliminated some RAM and flash storage on the motherboard, making it practically impossible to run Linux (it ships with VxWorks, a much smaller operating system that does not allow easy customization). Since the WRT54G v5 cannot run custom Linux-based firmware, this makes it a less attractive alternative for network builders. Linksys has also released the WRT54GL, which is essentially the WRT54G v4 (which runs Linux) at a slightly higher price tag.

A number of other Linksys access points also run Linux, including the WRT54GS and WAP54G. While these also have relatively low price tags, the hardware specifications may change at any time. It is difficult to know which hardware revision is used without opening the packaging, making it risky to purchase them at a retail store and practically impossible to order online. While the WRT54GL is guaranteed to run Linux, Linksys has made it known that it does not expect to sell this model in large volume, and it is unclear how long it will be offered for sale.

If you can find a source of earlier revision WRT54Gs or WRT54GLs, they are handy and inexpensive routers. With custom firmware, they can be configured to work as an OLSR mesh or in client mode, and work very well as a cheap customer side solution. While the newer v5 model will work as an access point, it cannot be configured is a client, and it has mixed performance reviews compared to the v4 and earlier models.

For more information, see one of these websites: