Talk:High-speed multimedia radio
Updating Information Slowly
[edit]27 OCT 2019 I am starting to update the HSMM page with info that reflects the newer FCC changes, including the new 802.11a 40mhz channels. If I get something wrong, please let me know. This will take a few days, as it requires reading through multiple technical documents for the info. Will add more references as I go along to address the "unclear references" TAG For the "does not represent a worldwide view" tag, I will do my best. kf4yfd (talk) 21:25, 27 October 2019 (UTC)
Security != encryption
[edit]It's a common assumption that security requires encryption. Even the FCC seems to have this belief, given that it allows encryption in space command communications.
In fact this is incorrect. I've pointed this out to some people involved in HSMM work (and hope to write an article about it one of these days). Access control needs strong authentication. That can be done quite easily, without encryption of any kind. IPsec in authentication-only mode has all the necessary mechanisms.
I suspect in the HSMM context the picture gets muddled because there isn't an authentication-only mode in WEP or WPA. Then again, WEP at least is junk. WPA seems to be better, but personally I would just turn all that stuff off and rely on IPsec, which definitely has been designed by skilled cryptographers (unlike WEP).
73, ni1d. Paul Koning (talk) 02:28, 26 January 2008 (UTC)
- I think the point is that if you've reason enough to use authentication, then you've reason enough to use encryption too. Correct me if I'm misunderstanding, but you wouldn't want anyone stealing your packets. --AB (talk) 00:40, 8 February 2008 (UTC)
Security != encryption
[edit]It's a common assumption that security requires encryption. Even the FCC seems to have this belief, given that it allows encryption in space command communications.
In fact this is incorrect. I've pointed this out to some people involved in HSMM work (and hope to write an article about it one of these days). Access control needs strong authentication. That can be done quite easily, without encryption of any kind. IPsec in authentication-only mode has all the necessary mechanisms.
I suspect in the HSMM context the picture gets muddled because there isn't an authentication-only mode in WEP or WPA. Then again, WEP at least is junk. WPA seems to be better, but personally I would just turn all that stuff off and rely on IPsec, which definitely has been designed by skilled cryptographers (unlike WEP).
73, ni1d. Paul Koning (talk) 02:28, 26 January 2008 (UTC)
- I think the point is that if you've reason enough to use authentication, then you've reason enough to use encryption too. Correct me if I'm misunderstanding, but you wouldn't want anyone stealing your packets. --AB (talk) 00:40, 8 February 2008 (UTC)
- Not necessarily. In network security they are different services and the reasons for using one vs. the other are not the same. In any case, amateur radio is a special case: by law, amateur radio communication is not allowed to hide the content of the communication. So encryption is prohibited. On the other hand, there is no prohibition on authentication, and in fact in some places the regulations imply you are supposed to use it (for example auxiliary links).
- Also, what do you mean by "stealing your packets"? If it means (a) reading the contents -- then the answer is that the amateur radio service specifically requires that the contents be readable, and if you need to communicate something that shouldn't be publicly visible, your only option is to avoid the amateur radio service. If it means (b) having Y take a copy of the packets sent by X and pretend they were created by Y -- I agree, and that is precisely what authentication does. In fact, only authentication does that -- encryption alone does not. That's why the FCC's rule allowing encryption in space command traffic is flat out technically wrong. (See Bellovin, Steven M. (1996). "Problem Areas for the IP Security Protocols". Proceedings of the Sixth Usenix Unix Security Symposium. San Jose, CA. pp. 1–16.
{{cite conference}}
: Unknown parameter|booktitle=
ignored (|book-title=
suggested) (help) for a detailed explanation of that point.) Paul Koning (talk) 18:19, 8 February 2008 (UTC)
- Also, what do you mean by "stealing your packets"? If it means (a) reading the contents -- then the answer is that the amateur radio service specifically requires that the contents be readable, and if you need to communicate something that shouldn't be publicly visible, your only option is to avoid the amateur radio service. If it means (b) having Y take a copy of the packets sent by X and pretend they were created by Y -- I agree, and that is precisely what authentication does. In fact, only authentication does that -- encryption alone does not. That's why the FCC's rule allowing encryption in space command traffic is flat out technically wrong. (See Bellovin, Steven M. (1996). "Problem Areas for the IP Security Protocols". Proceedings of the Sixth Usenix Unix Security Symposium. San Jose, CA. pp. 1–16.
Pros and cons??
[edit]Can the article be edited to remove the Pros and Cons sections? It currently reads like a product review rather than an encyclopedia article.--Kharker (talk) 23:02, 26 February 2008 (UTC)
"Also AMSAT has requested that HSMM operators stay away from 802.11b/g channel 1 to prevent interference to satellite operations. It was recommended in CQ magazine that users use channels 3 and 5."
This is no longer the case. In an email from John Champa he said "When the "Channel 1 is Ver Botten" message (HI) was sent out there was an active Phase 3 OSCAR using that band segment. That is no longer the case. So that guideline is outdated. Forget about it. ;o)" Kmoravec (talk) 14:48, 15 May 2008 (UTC)Kmoravec
1500 W ?!!
[edit]IEEE 802.11a is really allow 1500 Watts (1,5 Kilowatts)? BlackCatzilla (talk) 11:30, 14 July 2010 (UTC)
- The information in this article as it stands now (14 July 2010) about frequencies, modes and power limits is only applicable to the US. Roger (talk) 11:36, 14 July 2010 (UTC)
- This is bad information! Part 97 is not the same as Part 15! Part 97 is amateur radio. Part 15 is your COTS wifi router! — Preceding unsigned comment added by 128.173.94.136 (talk) 15:06, 22 August 2012 (UTC)
- This is good information! Mind you, it is USA centric... All Amateur Radio Operators can re-type accept (in a sense) part 15 equipment, as part 97, stripping the part 15 from it in the process. The only time this is not true is in the case of commercially built external power amplifiers which could be operated in the part 95 band of 11 meters (below 144 megahertz, much lower than 2.4 gigahertz). Those must be part 97 accepted at the factory (and have 11 meters summarily locked-out)[1](Section:97.315). All home-built, and commercial equipment outside that narrow scope is exempt.
- In amateur radio, since it is a competency licensed service, all amateurs are responsible to insure that their equipment is operating properly, and within restrictions of that band. 1500 watts, on 2.4 GHz is a bit extreme, but legal. However anything over about 10~20 watts is a waste as it will get you 2X the radio horizon. The only thing that it would be suitable for is deep space communications (a practical possibility with upcoming Mars missions!) AE7EC (talk) 19:19, 27 June 2013 (UTC)
Region 1
[edit]This article is too focused on USA rules.
All this "Part 97" and "Part 15" is irrelevant and unknown in region 1, for example OFCOM manages the UK spectrum. There is no regulation to say which equipment can be used for what, only that to qualify as amateur it must send a callsign and be under the appropriate power range (usually under 400W for a full licencee without an extended power NoV).
Probably best to include each different ruling section. In the UK at least, the RSGB has said of the "13cm" 2.31GHz-2.45GHz band, 2.4-2.45 GHz is for satellites but OFCOM do not restrict it.
There is also a 2.3-2.301 GHz band (requiring an NoV) which some wireless equipment may be able to use. Has anyone heard of such "negative channels"?
The 6cm band is 5.65-5.85 GHz so would only encompass channels 132-165.
420MHz, 900MHz and 1.2GHz don't exist but there is an allocation for 3.4GHz in region 1.
See: https://thersgb.org/services/bandplans/html/rsgb_band_plan_june_2016.htm
Dan Dart (talk) 22:24, 7 October 2016 (UTC)
CBRS
[edit]Citizens Broadband Radio Service is 3.55 to 3.7 GHz. That is within the 3.3 to 3.8 GHz band. Whether it belongs here I'm not sure, but some mention of the other band should be made. Someone has said the details might be WP:CRYSTAL but the proposal itself is three years old and the Navy is already using the band. — Vchimpanzee • talk • contributions • 20:52, 10 January 2018 (UTC)
- I see now that S band actually includes the spectrum involved. Apparently 3.3 to 3.8 GHz can be used for other purposes but it is those other purposes, not the spectrum, that is the topic of this article. Citizens Broadband Radio Service seems to have the potential to be notable.— Vchimpanzee • talk • contributions • 23:37, 11 January 2018 (UTC)
Related discussion copied from User talk:Wtshymanski
|
---|
Where would you put it?— Vchimpanzee • talk • contributions • 19:24, 10 January 2018 (UTC)
Wait. I did figure out how to find it, and I wasn't blocked. This is the source and I see it was "broadband" not "band".— Vchimpanzee • talk • contributions • 20:16, 10 January 2018 (UTC)
|
References
[edit]References
Way too US centric
[edit]This page is way too US centric and says next to nothing about hsmm outside the US (where most would be) Dan Dart (talk) 12:19, 22 March 2024 (UTC)
- C-Class amateur radio articles
- Low-importance amateur radio articles
- C-Class Computing articles
- Low-importance Computing articles
- C-Class Computer networking articles
- Low-importance Computer networking articles
- C-Class Computer networking articles of Low-importance
- All Computer networking articles
- C-Class software articles
- Low-importance software articles
- C-Class software articles of Low-importance
- All Software articles
- C-Class Computer hardware articles
- Low-importance Computer hardware articles
- C-Class Computer hardware articles of Low-importance
- All Computing articles