SlideShare a Scribd company logo
Building
city and nationwide
Wi-Fi coverage
via cooperation
Karri Huhtanen
Arch Red Oy
27.9.2013
the traditional way
Picture by Karl-Ludwig G. Poggemann
In the beginning...
already a lot of separate,
overlapping Wi-Fi
networks interfering
with each other
Map by OpenStreetMap
already a lot of separate,
overlapping Wi-Fi
networks interfering
with each other
+
one more, the new
common Wi-Fi
network
Then...
Map by OpenStreetMap
So this is bad, because...
• more overlapping Wi-Fi networks => more radio
interference => all Wi-Fi network users suffer
• providing additional coverage, capacity and
bandwidth always generates costs to someone
• maintaining, upgrading and repairing additional
network always generates costs to someone
• often the additional coverage is also provided
outdoors and from outside => which means
excellent Wi-Fi coverage for magpies during
Finnish winters
Photo by Andrew King
What to do?
Photo by Sean Hobson
Try cooperation...
Photo by Sean Hobson
Instead of this...
Map by OpenStreetMap
Let’s try this...
Map by OpenStreetMap
unification
via
cooperation
We must be realistic...
• Somebody has to cover the costs of providing coverage, capacity,
bandwidth and maintaining, upgrading and repairing network =>
Dividing work and costs makes sense => Let everyone handle and
control their part of the network
• We need unified policies for network configuration, authentication,
access filtering, IP addressing etc. => Let’s just choose open
standard interfaces and policies, no specific vendors or service
providers
• There will still be overlapping private networks, home networks
etc. => interference cannot be removed but it can be reduced
• Coverage is not really needed everywhere, it is needed where the
existing networks already are => with unified network settings
around it is easier to access Internet in various places
So how can this be done?
Photo by Sean Hobson
two options
“Easy” “Proper”
Scale by winnifredxoxo
“Easy”
• use common but original Wi-Fi network name for all
cooperating networks, make the name neutral so that it is
easier to adopt
• leave Wi-Fi network without authentication or encryption
or specify common WPA2 pre-shared secret, share this
secret to everyone
• have and enforce a common policy for Internet filtering
and IP addressing everywhere
• wish for the best and believe in the goodness of the people
• that’s it: everyone controls and is responsible of their own
part of network and partially what happens through it
Photo by RobbyVan Moor
For few reasons “easy” option
has not catched on
• People want to have unauthenticated, unencrypted and unfiltered
networks to use, but very few want to provide such ones
themselves.
• People still want to have curtains for privacy, doors for access
control, pin codes for credit cards and mobile phones.
• People responsible of what happens in or through their networks
are even more careful.
• “easy” networks are often filtered so heavily that instead of ‘open’
they often should be called ‘broken’.
• Access and capacity control, monitoring and network
management are still needed, even in so called ‘open’ networks.
Photo by Thomas Guine
Photo by RobbyVan Moor
“Proper”
• use common but original Wi-Fi network name for all
cooperating networks, make the name neutral so that it is
easier to adopt
• use WPA2 encryption and authentication for everyone and
every network, connect networks into coverage area by
authentication federation, at the minimum use MAC address
control
• have and enforce a common policy for Internet filtering, IP
addressing and network configuration everywhere
• that’s it: everyone controls and is responsible of their own
part of network and partially what happens through it,
visitors leave trails that can be followed, device and visitor
access can be controlled
But has this then catched on?
• Short answer: Yes.
• eduroam(tm) (www.eduroam.org), the global authentication
federation for universities and research organisations is the world’s
3rd most advertised Wi-Fi network and the roaming standard of
academic world
• eduroam(tm) technologies and architecture have been applied in
Wireless Tampere community network, which is used already in
Tampere and neighboring cities
• Belnet has started a pilot in Belgium about government roaming
called govroam(tm) (www.govroam.be)
• The architecture is compatible with operator roaming and
technologies such as SIM card or certificate authentication, elliptic
curves etc. in addition to traditional username and password
What are the additional benefits?
• A common Wi-Fi network with same network configuration
accessible everywhere securely with home organisation credentials
but at the same time protecting the user privacy.
• Access to the network, used capacity and traffic can be controlled
and prioritized. Trail of accountability exists.
• The core infrastructure and architecture is field tested, it has already
been used and developed for over 10 years by operators, by
eduroam etc.
• The core infrastructure can be extended and evolved as
authentication and network technologies develop, in most times even
without changes to the core.
• All technologies and interfaces used are open standards, defined
mostly in IETF. There exists both open source and commercial
options for components and services from several suppliers.
What now and in the
future?
• All the components for building this kind of cooperative
Wi-Fi authentication federation exists.
• What is needed is the interest and will to do this kind of
cooperation and expand it from academic world and
regional cooperation to national cooperation between
cities, companies and government and beyond to connect
to similar initiatives abroad.
• If interested, come and discuss with me about details.
Thank you. Questions?
my contact information
Karri Huhtanen
firstname.surname@archred.com
http://www.archred.com/
these and more slides:
http://www.slideshare.net/
khuhtanen/

More Related Content

What's hot

Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless Fidelity
Gurpreet Singh
 
Wi fi / Wireless Fidelity
Wi fi / Wireless FidelityWi fi / Wireless Fidelity
Wi fi / Wireless Fidelity
Chiranjit Adhikary
 
Wi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank SaxenaWi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank Saxena
Mayank Saxena
 
WIFI Technology
WIFI TechnologyWIFI Technology
WIFI Technology
Mohamed Hafez
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
HasanMaster
 
Wireless Fidelity
Wireless FidelityWireless Fidelity
Wireless Fidelity
JAI MCA-STUDENT
 
Wi Fi
Wi FiWi Fi
The Impact of 5th Generation WiFi (802.11ac)
The Impact of 5th Generation WiFi (802.11ac)The Impact of 5th Generation WiFi (802.11ac)
The Impact of 5th Generation WiFi (802.11ac)
Dr. Mazlan Abbas
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
Hem Pokhrel
 
Michael Zirngibl's Presentation at Emerging Communication Conference & Awards...
Michael Zirngibl's Presentation at Emerging Communication Conference & Awards...Michael Zirngibl's Presentation at Emerging Communication Conference & Awards...
Michael Zirngibl's Presentation at Emerging Communication Conference & Awards...
eCommConf
 
Wireless Fidelity ppt
Wireless Fidelity pptWireless Fidelity ppt
Wifi Technology
Wifi TechnologyWifi Technology
Wifi Technology
Pak Cik Nan
 
Wi-Fi technology presentation
Wi-Fi technology presentationWi-Fi technology presentation
Wi-Fi technology presentationEyad Manna
 
Wifi
WifiWifi
Building the perfect Wi-Fi network with xirrus
Building the perfect Wi-Fi network with xirrusBuilding the perfect Wi-Fi network with xirrus
Building the perfect Wi-Fi network with xirrus
Xirrus
 
wi-fi technology
 wi-fi technology wi-fi technology
wi-fi technology
sai kumar R
 
Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558
Praveen Reddy
 
Wi Fi presentation
Wi Fi presentationWi Fi presentation
Wi Fi presentation
GOPAL BASAK
 

What's hot (20)

Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless Fidelity
 
Wi fi / Wireless Fidelity
Wi fi / Wireless FidelityWi fi / Wireless Fidelity
Wi fi / Wireless Fidelity
 
Wi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank SaxenaWi-fi (ppt) by Mayank Saxena
Wi-fi (ppt) by Mayank Saxena
 
WIFI Technology
WIFI TechnologyWIFI Technology
WIFI Technology
 
WiFi Technology
WiFi TechnologyWiFi Technology
WiFi Technology
 
Wireless Fidelity
Wireless FidelityWireless Fidelity
Wireless Fidelity
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
The Impact of 5th Generation WiFi (802.11ac)
The Impact of 5th Generation WiFi (802.11ac)The Impact of 5th Generation WiFi (802.11ac)
The Impact of 5th Generation WiFi (802.11ac)
 
Wi fi
Wi fiWi fi
Wi fi
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
 
Michael Zirngibl's Presentation at Emerging Communication Conference & Awards...
Michael Zirngibl's Presentation at Emerging Communication Conference & Awards...Michael Zirngibl's Presentation at Emerging Communication Conference & Awards...
Michael Zirngibl's Presentation at Emerging Communication Conference & Awards...
 
Wireless Fidelity ppt
Wireless Fidelity pptWireless Fidelity ppt
Wireless Fidelity ppt
 
Wifi Technology
Wifi TechnologyWifi Technology
Wifi Technology
 
Wi-Fi technology presentation
Wi-Fi technology presentationWi-Fi technology presentation
Wi-Fi technology presentation
 
Wifi
WifiWifi
Wifi
 
Building the perfect Wi-Fi network with xirrus
Building the perfect Wi-Fi network with xirrusBuilding the perfect Wi-Fi network with xirrus
Building the perfect Wi-Fi network with xirrus
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
wi-fi technology
 wi-fi technology wi-fi technology
wi-fi technology
 
Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558Wi-fi technology-ppt-13p61a0558
Wi-fi technology-ppt-13p61a0558
 
Wi Fi presentation
Wi Fi presentationWi Fi presentation
Wi Fi presentation
 

Similar to Building city and nationwide Wi-Fi coverage via cooperation

Wired Technology.pptx
Wired Technology.pptxWired Technology.pptx
Wired Technology.pptx
Shobhit Sahu
 
Wireless network
Wireless networkWireless network
Wireless network
mattglover0
 
wi-fi.pptx
wi-fi.pptxwi-fi.pptx
wi-fi.pptx
HemanthGowdaN1
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentation
Abhishek Das
 
4G wireless Network
4G wireless Network4G wireless Network
4G wireless Network
Masuma Akhatar
 
PST SC015 Chapter 3 Internet Technology (II) 2017/2018
PST SC015 Chapter 3 Internet Technology (II)  2017/2018PST SC015 Chapter 3 Internet Technology (II)  2017/2018
PST SC015 Chapter 3 Internet Technology (II) 2017/2018
Fizaril Amzari Omar
 
LIGHT FIDELITY TECHNOLOGY (LI - FI)
LIGHT FIDELITY TECHNOLOGY (LI - FI)LIGHT FIDELITY TECHNOLOGY (LI - FI)
LIGHT FIDELITY TECHNOLOGY (LI - FI)
AJITHKUMAR RAVI
 
Li fi
Li fiLi fi
Li fi
asharmaji
 
System and networkpresentation(sadaf noor)
System and networkpresentation(sadaf noor)System and networkpresentation(sadaf noor)
System and networkpresentation(sadaf noor)
SadafNoor13
 
5 g technology
5 g technology5 g technology
5 g technology
DurgaPrasadReddy35
 
Li-Fi (Light - Fedility) Technology New Version 2017
Li-Fi (Light - Fedility) Technology New Version 2017Li-Fi (Light - Fedility) Technology New Version 2017
Li-Fi (Light - Fedility) Technology New Version 2017
Ajith Kumar Ravi
 
Things Manchester Presentation for Leeds Digital Festival
Things Manchester Presentation for Leeds Digital FestivalThings Manchester Presentation for Leeds Digital Festival
Things Manchester Presentation for Leeds Digital Festival
Open Data Manchester
 
Cellular Data Offloading Through WIFI Mesh Network Utilizing White Space Freq...
Cellular Data Offloading Through WIFI Mesh Network Utilizing White Space Freq...Cellular Data Offloading Through WIFI Mesh Network Utilizing White Space Freq...
Cellular Data Offloading Through WIFI Mesh Network Utilizing White Space Freq...Roger Filomeno
 
3.2.1 The Internet
3.2.1 The Internet3.2.1 The Internet
3.2.1 The Internet
Fizaril Amzari Omar
 
Wi fi and it’s applications
Wi fi and it’s applicationsWi fi and it’s applications
Wi fi and it’s applicationsSaad Mazhar
 
5 g wireless technology ppt
5 g wireless technology ppt5 g wireless technology ppt
5 g wireless technology ppt
ChintalaMaanvitha
 
Siyavuyisa Township Networks 2011
Siyavuyisa Township Networks 2011Siyavuyisa Township Networks 2011
Siyavuyisa Township Networks 2011
siyavuyisa
 

Similar to Building city and nationwide Wi-Fi coverage via cooperation (20)

Wired Technology.pptx
Wired Technology.pptxWired Technology.pptx
Wired Technology.pptx
 
Wifi (2)
Wifi (2)Wifi (2)
Wifi (2)
 
Wireless network
Wireless networkWireless network
Wireless network
 
wi-fi.pptx
wi-fi.pptxwi-fi.pptx
wi-fi.pptx
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentation
 
4G wireless Network
4G wireless Network4G wireless Network
4G wireless Network
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
PST SC015 Chapter 3 Internet Technology (II) 2017/2018
PST SC015 Chapter 3 Internet Technology (II)  2017/2018PST SC015 Chapter 3 Internet Technology (II)  2017/2018
PST SC015 Chapter 3 Internet Technology (II) 2017/2018
 
LIGHT FIDELITY TECHNOLOGY (LI - FI)
LIGHT FIDELITY TECHNOLOGY (LI - FI)LIGHT FIDELITY TECHNOLOGY (LI - FI)
LIGHT FIDELITY TECHNOLOGY (LI - FI)
 
Li fi
Li fiLi fi
Li fi
 
System and networkpresentation(sadaf noor)
System and networkpresentation(sadaf noor)System and networkpresentation(sadaf noor)
System and networkpresentation(sadaf noor)
 
5 g technology
5 g technology5 g technology
5 g technology
 
Li-Fi (Light - Fedility) Technology New Version 2017
Li-Fi (Light - Fedility) Technology New Version 2017Li-Fi (Light - Fedility) Technology New Version 2017
Li-Fi (Light - Fedility) Technology New Version 2017
 
Things Manchester Presentation for Leeds Digital Festival
Things Manchester Presentation for Leeds Digital FestivalThings Manchester Presentation for Leeds Digital Festival
Things Manchester Presentation for Leeds Digital Festival
 
Cellular Data Offloading Through WIFI Mesh Network Utilizing White Space Freq...
Cellular Data Offloading Through WIFI Mesh Network Utilizing White Space Freq...Cellular Data Offloading Through WIFI Mesh Network Utilizing White Space Freq...
Cellular Data Offloading Through WIFI Mesh Network Utilizing White Space Freq...
 
Wi fi
Wi fiWi fi
Wi fi
 
3.2.1 The Internet
3.2.1 The Internet3.2.1 The Internet
3.2.1 The Internet
 
Wi fi and it’s applications
Wi fi and it’s applicationsWi fi and it’s applications
Wi fi and it’s applications
 
5 g wireless technology ppt
5 g wireless technology ppt5 g wireless technology ppt
5 g wireless technology ppt
 
Siyavuyisa Township Networks 2011
Siyavuyisa Township Networks 2011Siyavuyisa Township Networks 2011
Siyavuyisa Township Networks 2011
 

More from Karri Huhtanen

Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and Privacy
Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and PrivacyDisobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and Privacy
Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and Privacy
Karri Huhtanen
 
Wi-Fi Roaming Security and Privacy
Wi-Fi Roaming Security and PrivacyWi-Fi Roaming Security and Privacy
Wi-Fi Roaming Security and Privacy
Karri Huhtanen
 
OpenRoaming and CapPort
OpenRoaming and CapPortOpenRoaming and CapPort
OpenRoaming and CapPort
Karri Huhtanen
 
Suomen eduroam-juuripalvelun uudistukset
Suomen eduroam-juuripalvelun uudistuksetSuomen eduroam-juuripalvelun uudistukset
Suomen eduroam-juuripalvelun uudistukset
Karri Huhtanen
 
Adding OpenRoaming to existing IdP and roaming federation service
Adding OpenRoaming to existing IdP and roaming federation serviceAdding OpenRoaming to existing IdP and roaming federation service
Adding OpenRoaming to existing IdP and roaming federation service
Karri Huhtanen
 
OpenRoaming -- Wi-Fi Roaming for All
OpenRoaming -- Wi-Fi Roaming for AllOpenRoaming -- Wi-Fi Roaming for All
OpenRoaming -- Wi-Fi Roaming for All
Karri Huhtanen
 
Beyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoaming
Beyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoamingBeyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoaming
Beyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoaming
Karri Huhtanen
 
Routing host certificates in eduroam/govroam
Routing host certificates in eduroam/govroamRouting host certificates in eduroam/govroam
Routing host certificates in eduroam/govroam
Karri Huhtanen
 
Cooperative labs, testbeds and networks
Cooperative labs, testbeds and networksCooperative labs, testbeds and networks
Cooperative labs, testbeds and networks
Karri Huhtanen
 
Privacy and traceability in Wi-Fi networks
Privacy and traceability in Wi-Fi networksPrivacy and traceability in Wi-Fi networks
Privacy and traceability in Wi-Fi networks
Karri Huhtanen
 
EAP-TLS (extended version)
EAP-TLS (extended version)EAP-TLS (extended version)
EAP-TLS (extended version)
Karri Huhtanen
 
EAP-TLS
EAP-TLSEAP-TLS
Security issues in RADIUS based Wi-Fi AAA
Security issues in RADIUS based Wi-Fi AAASecurity issues in RADIUS based Wi-Fi AAA
Security issues in RADIUS based Wi-Fi AAA
Karri Huhtanen
 
TLS and Certificates
TLS and CertificatesTLS and Certificates
TLS and Certificates
Karri Huhtanen
 
What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?
Karri Huhtanen
 
What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?
Karri Huhtanen
 
Connecting the Dots: Integrating RADIUS to Network Measurement and Monitoring
Connecting the Dots: Integrating RADIUS to Network Measurement and MonitoringConnecting the Dots: Integrating RADIUS to Network Measurement and Monitoring
Connecting the Dots: Integrating RADIUS to Network Measurement and Monitoring
Karri Huhtanen
 
Using NoSQL databases to store RADIUS and Syslog data
Using NoSQL databases to store RADIUS and Syslog dataUsing NoSQL databases to store RADIUS and Syslog data
Using NoSQL databases to store RADIUS and Syslog data
Karri Huhtanen
 
Open WiFi or Broken WiFi?
Open WiFi or Broken WiFi?Open WiFi or Broken WiFi?
Open WiFi or Broken WiFi?
Karri Huhtanen
 
Cloud Based Identity Management
Cloud Based Identity ManagementCloud Based Identity Management
Cloud Based Identity Management
Karri Huhtanen
 

More from Karri Huhtanen (20)

Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and Privacy
Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and PrivacyDisobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and Privacy
Disobey 2024: Karri Huhtanen: Wi-Fi Roaming Security and Privacy
 
Wi-Fi Roaming Security and Privacy
Wi-Fi Roaming Security and PrivacyWi-Fi Roaming Security and Privacy
Wi-Fi Roaming Security and Privacy
 
OpenRoaming and CapPort
OpenRoaming and CapPortOpenRoaming and CapPort
OpenRoaming and CapPort
 
Suomen eduroam-juuripalvelun uudistukset
Suomen eduroam-juuripalvelun uudistuksetSuomen eduroam-juuripalvelun uudistukset
Suomen eduroam-juuripalvelun uudistukset
 
Adding OpenRoaming to existing IdP and roaming federation service
Adding OpenRoaming to existing IdP and roaming federation serviceAdding OpenRoaming to existing IdP and roaming federation service
Adding OpenRoaming to existing IdP and roaming federation service
 
OpenRoaming -- Wi-Fi Roaming for All
OpenRoaming -- Wi-Fi Roaming for AllOpenRoaming -- Wi-Fi Roaming for All
OpenRoaming -- Wi-Fi Roaming for All
 
Beyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoaming
Beyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoamingBeyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoaming
Beyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoaming
 
Routing host certificates in eduroam/govroam
Routing host certificates in eduroam/govroamRouting host certificates in eduroam/govroam
Routing host certificates in eduroam/govroam
 
Cooperative labs, testbeds and networks
Cooperative labs, testbeds and networksCooperative labs, testbeds and networks
Cooperative labs, testbeds and networks
 
Privacy and traceability in Wi-Fi networks
Privacy and traceability in Wi-Fi networksPrivacy and traceability in Wi-Fi networks
Privacy and traceability in Wi-Fi networks
 
EAP-TLS (extended version)
EAP-TLS (extended version)EAP-TLS (extended version)
EAP-TLS (extended version)
 
EAP-TLS
EAP-TLSEAP-TLS
EAP-TLS
 
Security issues in RADIUS based Wi-Fi AAA
Security issues in RADIUS based Wi-Fi AAASecurity issues in RADIUS based Wi-Fi AAA
Security issues in RADIUS based Wi-Fi AAA
 
TLS and Certificates
TLS and CertificatesTLS and Certificates
TLS and Certificates
 
What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?
 
What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?
 
Connecting the Dots: Integrating RADIUS to Network Measurement and Monitoring
Connecting the Dots: Integrating RADIUS to Network Measurement and MonitoringConnecting the Dots: Integrating RADIUS to Network Measurement and Monitoring
Connecting the Dots: Integrating RADIUS to Network Measurement and Monitoring
 
Using NoSQL databases to store RADIUS and Syslog data
Using NoSQL databases to store RADIUS and Syslog dataUsing NoSQL databases to store RADIUS and Syslog data
Using NoSQL databases to store RADIUS and Syslog data
 
Open WiFi or Broken WiFi?
Open WiFi or Broken WiFi?Open WiFi or Broken WiFi?
Open WiFi or Broken WiFi?
 
Cloud Based Identity Management
Cloud Based Identity ManagementCloud Based Identity Management
Cloud Based Identity Management
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 

Building city and nationwide Wi-Fi coverage via cooperation

  • 1. Building city and nationwide Wi-Fi coverage via cooperation Karri Huhtanen Arch Red Oy 27.9.2013
  • 2. the traditional way Picture by Karl-Ludwig G. Poggemann
  • 3. In the beginning... already a lot of separate, overlapping Wi-Fi networks interfering with each other Map by OpenStreetMap
  • 4. already a lot of separate, overlapping Wi-Fi networks interfering with each other + one more, the new common Wi-Fi network Then... Map by OpenStreetMap
  • 5. So this is bad, because... • more overlapping Wi-Fi networks => more radio interference => all Wi-Fi network users suffer • providing additional coverage, capacity and bandwidth always generates costs to someone • maintaining, upgrading and repairing additional network always generates costs to someone • often the additional coverage is also provided outdoors and from outside => which means excellent Wi-Fi coverage for magpies during Finnish winters Photo by Andrew King
  • 6. What to do? Photo by Sean Hobson
  • 8. Instead of this... Map by OpenStreetMap
  • 9. Let’s try this... Map by OpenStreetMap unification via cooperation
  • 10. We must be realistic... • Somebody has to cover the costs of providing coverage, capacity, bandwidth and maintaining, upgrading and repairing network => Dividing work and costs makes sense => Let everyone handle and control their part of the network • We need unified policies for network configuration, authentication, access filtering, IP addressing etc. => Let’s just choose open standard interfaces and policies, no specific vendors or service providers • There will still be overlapping private networks, home networks etc. => interference cannot be removed but it can be reduced • Coverage is not really needed everywhere, it is needed where the existing networks already are => with unified network settings around it is easier to access Internet in various places
  • 11. So how can this be done? Photo by Sean Hobson
  • 13. “Easy” • use common but original Wi-Fi network name for all cooperating networks, make the name neutral so that it is easier to adopt • leave Wi-Fi network without authentication or encryption or specify common WPA2 pre-shared secret, share this secret to everyone • have and enforce a common policy for Internet filtering and IP addressing everywhere • wish for the best and believe in the goodness of the people • that’s it: everyone controls and is responsible of their own part of network and partially what happens through it Photo by RobbyVan Moor
  • 14. For few reasons “easy” option has not catched on • People want to have unauthenticated, unencrypted and unfiltered networks to use, but very few want to provide such ones themselves. • People still want to have curtains for privacy, doors for access control, pin codes for credit cards and mobile phones. • People responsible of what happens in or through their networks are even more careful. • “easy” networks are often filtered so heavily that instead of ‘open’ they often should be called ‘broken’. • Access and capacity control, monitoring and network management are still needed, even in so called ‘open’ networks.
  • 15. Photo by Thomas Guine Photo by RobbyVan Moor “Proper” • use common but original Wi-Fi network name for all cooperating networks, make the name neutral so that it is easier to adopt • use WPA2 encryption and authentication for everyone and every network, connect networks into coverage area by authentication federation, at the minimum use MAC address control • have and enforce a common policy for Internet filtering, IP addressing and network configuration everywhere • that’s it: everyone controls and is responsible of their own part of network and partially what happens through it, visitors leave trails that can be followed, device and visitor access can be controlled
  • 16. But has this then catched on? • Short answer: Yes. • eduroam(tm) (www.eduroam.org), the global authentication federation for universities and research organisations is the world’s 3rd most advertised Wi-Fi network and the roaming standard of academic world • eduroam(tm) technologies and architecture have been applied in Wireless Tampere community network, which is used already in Tampere and neighboring cities • Belnet has started a pilot in Belgium about government roaming called govroam(tm) (www.govroam.be) • The architecture is compatible with operator roaming and technologies such as SIM card or certificate authentication, elliptic curves etc. in addition to traditional username and password
  • 17. What are the additional benefits? • A common Wi-Fi network with same network configuration accessible everywhere securely with home organisation credentials but at the same time protecting the user privacy. • Access to the network, used capacity and traffic can be controlled and prioritized. Trail of accountability exists. • The core infrastructure and architecture is field tested, it has already been used and developed for over 10 years by operators, by eduroam etc. • The core infrastructure can be extended and evolved as authentication and network technologies develop, in most times even without changes to the core. • All technologies and interfaces used are open standards, defined mostly in IETF. There exists both open source and commercial options for components and services from several suppliers.
  • 18. What now and in the future? • All the components for building this kind of cooperative Wi-Fi authentication federation exists. • What is needed is the interest and will to do this kind of cooperation and expand it from academic world and regional cooperation to national cooperation between cities, companies and government and beyond to connect to similar initiatives abroad. • If interested, come and discuss with me about details.
  • 19. Thank you. Questions? my contact information Karri Huhtanen firstname.surname@archred.com http://www.archred.com/ these and more slides: http://www.slideshare.net/ khuhtanen/