Welcome to WIFI Antennas

Register now to gain access to all of our features. Once registered and logged in, you will be able to contribute to this site by submitting your own content or replying to existing content. You'll be able to customize your profile, receive reputation points as a reward for submitting content, while also communicating with other members via your own private inbox, plus much more! This message will be removed once you have signed in.

Admin

Administrators
  • Content count

    4637
  • Joined

  • Last visited

Everything posted by Admin

  1. A circularly polarized cross dipole antenna includes a cross dipole antenna element formed of two pairs of inverted-V-shaped dipole antenna elements, which are bent like an inverted “V” at a set angle(30 degree), so as to cross each other on a ground plane, and a feeding mechanism provided to perform a single-point feed through a feeding section common to the inverted-V-shaped dipole antenna elements of the cross dipole antenna element. General antenna calculation formula Dimensions closer to the truth
  2. X-DiPol with adaptive line
  3. ,,,and a wideband transformer on PCB...
  4. Another form of transformer 75:50 coax can be made by using the impedance transforming effects of transmission lines. Two sections of 1/12 wavelength feed line will transform one impedance to another. Figure shows how it is done. For short lengths it might be easier to use RG-11 or similar coax instead of hard line for the 75 ohm segment. Normally you would want to put one of these at each end of the 75 ohm run. Don’t forget to include the coax velocity factor when calculating the length of the 1/12 wave sections. Where L = Length in meters or feet depending on value used for S S = speed of light in free space, use 300 if you want L in meters, 984 if you want L in feet W = number of wavelengths desired, 1 = 1 wavelength, 0.5 for half wavelength, etc
  5. ,,,yes, the VSWR it"s bad...!!!! ,,, but isolation between ports and impedances is good !!! !!!
  6. so you want it?
  7. ,,,, of efficiency I'm a little in doubt ...!!!!
  8. Buddy, if you wait a little, I'll fix this too...!!! But why do not you put two such antennas at 90 degrees,,,====>>>>MiMo Antenna
  9. Anyway, my antenna is better...!!!!
  10. lower patch(vibrator) =40,5mm....???
  11. ,,,and the ground, where it is...???
  12. ,,,,it can see this too ...
  13. ,,,from...https://apollo.open-resource.org/mission:log:2012:08:02:active-wideband-receiver-antenna-for-sdr,I make a simulation....
  14. ok, I will try, but tell me the diameter at sxt2,,,??
  15. ,,,as I understand that you want the MiMo antenna...??
  16. Games through Wi-Fi • Wi-Fi is compatible with gaming consoles and PDAs, and allows network play via any access point. • Iwata, President of Nintendo announced the Nintendo Wii, compatible with Wi-Fi, also saying that games like Super Smash Brothers will be available. Nintendo DS is also compatible with Wi-Fi. • Sony PSP has wireless support, which is activated by pressing one button for connecting to Wi-Fi hotspots or other wireless connections. Wi-Fi and free • OS family BSD (FreeBSD, NetBSD, OpenBSD) can work with most adapters since 1998. Drivers for chips from Atheros, Prism, Harris/Intersil and Aironet (from the respective manufacturers Wi-Fi devices) is usually included in BSD since version 3. Darwin and Mac OS X, despite the overlap with FreeBSD, have their own unique implementation. In OpenBSD 3.7, it was included more drivers for wireless chips, including RealTek RTL8180L, Ralink RT25x0, Atmel AT76C50x, and Intel 2100 and 2200BG/2225BG/2915ABG. Thanks partly managed to solve the problem of lack of open drivers for wireless chips for OpenBSD. Perhaps some drivers that are implemented on other BSD systems may be transferred if they have not yet been created. Ndiswrapper is also available for FreeBSD. • Linux: Starting from version 2.6, some Wi-Fi devices appeared directly in the Linux kernel. Support for chips Orinoco, Prism, Aironet and Atmel are included in the main kernel, chips ADMtek and Realtek RTL8180L are both supported closed drivers, manufacturers and public, written by the community. Intel Calexico supported open drivers available on Sourceforge. Atheros and Ralink RT2x00 supported through open-source projects. Support for other wireless devices are available using the open source driver ndiswrapper, which allows Linux systems running on computers with Intel x86 architecture to "wrap" the driver manufacturer for Windows for the direct use. Known at least one commercial implementation of this idea. The FSF has created a list of recommended adapters, more information can be found on the Linux wireless site. Wireless networking standards There are currently four major Wi-Fi standard is 802.11 a, 802.11 b, 802.11 g and 802.11 i. there are two of them: 802.11 b and 802.11 g. In 2006, and 802.11 i. By 2007 it is planned to start implementation of another standard – 802.11 n. 802.11 b The transmission speed is quite low, and the safety to be on a fairly low level. If desired, the attacker could take less than an hour to decrypt the network key and entering your local network. For protection is used the WEP Protocol, which described itself not with the best hand and was hacked a few years ago. We recommend not to use the data standard is not at home nor even in corporate computer networks. The exception may be those cases where the hardware does not support other, more secure standard. - Speed: 11 Mbps - Effective range: 50 m - Security protocols: WEP - Security level: low 802.11 g This is a more advanced standard that has replaced 802.11 b. Was increased data transfer rate nearly 5 times and now she is 54 Mbps. When using equipment which supports superG* or True MIMO* limit the maximum achievable speed is 125 Mpbs. Increased the level of protection: subject to all necessary conditions when properly configured, it can be assessed as high. This standard is compatible with the new WPA and WPA2*. They provide a higher level of protection than WEP. Cases of hacking WPA2* is not yet known. *- Not supported by all hardware - 54 Mbps, up to 125* Mbps - Effective range: 50 m - Security protocols: WEP, WPA, WPA2* - Security level: high 802.11 i This new standard, the implementation of which is just beginning. In this case, directly into the standard built-in support for most modern technologies, such as True MIMO WPA2. Therefore, the need for a more careful selection of equipment is eliminated. It is expected that this standard will replace the 802.11 g and will bring to nothing all attempts of hacking. - Speed: 125 Mbps? - Effective range: 50 m - Security protocols: WEP, WPA, WPA2 - Security level: High 802.11 n The future standard, development of which is underway at the moment. This standard needs to provide long distance coverage wireless networks and higher speed, up to 540 Mbit/sec. - Speed: 540 Mbps? - Radius of action: unknown m - Security protocols: WEP, WPA, WPA2 - Security level: High However, remember that improper setup of equipment to support even the most modern security technology, will not provide the proper level of security to your network. Each standard has additional technologies and settings to maximize security. We therefore recommend to entrust the setup of Wi-Fi equipment only to professionals. Wireless security Wireless security should be given special attention. Because wi-fi is a wireless network and, moreover, with a large radius of action. Accordingly, the attacker can intercept information, or to attack Your network, from a safe distance. Fortunately currently there are many different ways to protect and with proper setup you can be confident in providing the necessary level of security. WEP Encryption Protocol that uses a fairly strong algorithm RC4 with static key. There are 64-, 128-, 256 - and 512-bit wep encryption. The more bits used to store the key, the more possible key combinations, and a correspondingly higher resistance of the network to hacking. Part of the wep key is static (40-bit in a 64-bit encryption) and the other part (24-bit) – dinamica (initialization vector), that is, changing in the process network. The main vulnerability in wep is that the initialization vector is repeated after a certain period of time and the attacker only need to collect these repetitions and calculate thereon the static part of the key. To increase the level of security in addition to wep encryption use 802.1 x or VPN. WPA Stronger encryption Protocol than wep, although it uses the same RC4 algorithm. A higher level of security is achieved through the use of protocols TKIP and MIC. - TKIP (Temporal Key Integrity Protocol). Protocol for dynamic key of a network, which change quite often. In this case, each device is also assigned a key that is also changing. - MIC (Message Integrity Check). The Protocol for checking the integrity of packages. Protects against packet sniffing and redirecting. It is also possible and the use of 802.1 x and VPN, as in the case of wep. There are two types of WPA: - WPA-PSK (Pre-shared key). For key generation networks and to enter network passphrase. Best option for a home or small office network. - WPA-802.1 x. Logging on to the network through the authentication server. Optimal for the network of a large company. WPA2 Improvement of WPA. In contrast, WPA uses stronger AES encryption algorithm. By analogy with WPA, WPA2 is also divided into two types: WPA2-PSK, and WPA2-802.1 x. 802.1 X Security standard that includes many protocols: - Extensible Authentication Protocol (EAP). Protocol extended authentication. Used in conjunction with a RADIUS server in large networks. - TLS (Transport Layer Security). The Protocol that ensures the integrity and encryption of transmitted data between server and client mutual authentication, preventing interception and substitution messages. - RADIUS (Remote Authentication Dial-In User Server). Server authenticate user by login and password. VPN VPN (Virtual Private Network) a Virtual private network. This Protocol was originally created to securely connect clients to the network via a public Internet channels. The principle of operation of VPN – creating a secure "tunnel" from the user to the access node or server. Although VPNs were originally created not for WI-Fi, it can be used in any type of networks. To encrypt traffic in a VPN is most often used IPSec. It provides almost one hundred percent security. Instances of hacking VPN is currently unknown. We recommend you to use this technology for corporate networks. Additional methods of protection - Filtering by MAC address. MAC address is a unique identifier for the device (network adapter), "hardwired" into it by the manufacturer. On some equipment it is possible to use this function and allow access to the necessary network addresses. It will create an additional barrier to the attacker, although not very serious – the MAC address can be spoofed. - Hide the SSID. The SSID is the ID of your wireless network. Most of the equipment allows it to hide, so when scanning wi-fi networks your network will not be seen. But then again, it's not a serious obstacle if an attacker uses a more advanced scanner networks than a standard utility in Windows. - Restrict access to the settings of the access point or router through a wireless network.
  17. "with translation, please ... in English...!!~!
  18. ,,,it is a simple dipole short-circuited with an adaptation loop...!!!
  19. do not you have them?
  20. ,,,these are the files that can be imported...
  21. Buddy, I can not open your files, can you send another file format?
  22. Does the dipole make contact with the ground?
  23. ok, then post some more details about the Litebeam M5 antenna...!!!