๕/๒๐/๒๕๕๐

What is WiMAX?

What is WiMAX?

• WiMAX is an industry trade organization formed by leading communications component
and equipment companies to promote and certify compatibility and interoperability of
broadband wireless access equipment that conforms to the IEEE* 802.16 and ETSI*
HIPERMAN standards.
• The 802.16a standard is a wireless metropolitan area network (MAN) technology that will
provide a wireless alternative to cable, DSL and T1/E1 for last mile broadband access. It
will also be used as complimentary technology to connect 802.11 hot spots to the Internet.
• WiMAX will accelerate and increase the success of future interoperability testing by
providing tools for conformance testing. Tools can be used during the equipment maker's
system development process to ensure conformance with the standards-based product
roadmap as it evolves.
• Members include leading Operators, Equipment and Component makers (see list at end)
• WiMAX was formed in April 2001, in anticipation of the publication of the original 10-66
GHz IEEE 802.16 specifications. WiMAX is to 802.16 as the Wi-Fi Alliance is to 802.11.

WiMAX Goals

• A standard by itself is not enough to enable mass adoption. WiMAX has stepped forward
to help solve barriers to adoption, such as interoperability and cost of deployment. WiMAX
will help ignite the wireless MAN industry, by defining and conducting interoperability
testing and labeling vendor systems with a "WiMAX Certified™" label once testing hasbeen completed successfully.

How a Stateful Firewall Works

How a Stateful Firewall Works

The stateful firewall spends most of its cycles examining packet information in Layer 4 (transport) and lower. However, it also offers more advanced inspection capabilities by targeting vital packets for Layer 7 (application) examination, such as the packet that initializes a connection. If the inspected packet matches an existing firewall rule that permits it, the packet is passed and an entry is added to the state table. From that point forward, because the packets in that particular communication session match an existing state table entry, they are allowed access without call for further application layer inspection. Those packets only need to have their Layer 3 and 4 information (IP address and TCP/UDP port number) verified against the information stored in the state table to confirm that they are indeed part of the current exchange. This method increases overall firewall performance (versus proxy-type systems, which examine all packets) because only initiating packets need to be unencapsulated the whole way to the application layer.
Conversely, because these firewalls use such filtering techniques, they don't consider the application layer commands for the entire communications session, as a proxy firewall would. This equates to an inability to really control sessions based on application-level traffic, making it a less secure alternative to a proxy. However, because of the stateful firewall's speed advantage and its ability to handle just about any traffic flow (as opposed to the limited number of protocols supported by an application-level proxy); it can be an excellent choice as the only perimeter protection device for a site or as a role player in a more complex network environment.

Using a Firewall as a Means of Control

An important point that should be considered when discussing perimeter security is the concept of a firewall as a network chokepoint. A chokepoint is a controllable, single entry point where something is funneled for greater security. However, as the name implies, this area of limited entry also can be a place where bandwidth is restricted. A good example of a chokepoint in the real world is a metal detector at an airport. Imagine if the metal detector was the size of an entire hallway in the airport, and 20 or more people could walk through a single gate at one time. If the detector goes off, it would be difficult for the inspectors to determine which party had triggered it and to be able to stop that person to examine him or her further. More fine-grained traffic control is needed in such a situation. That is why the concept of a chokepoint is necessary in such a case; it allows one inspector to watch one party go through one metal detector at a time. The chokepoint offers additional control of the parties entering the airport. Like other chokepoints, this channeling of people for additional control can also lead to slowdowns in the process; therefore, lines often form at airport metal detectors.


Article Source: Informit Network