<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="http://wiki.cas.mcmaster.ca/skins/common/feed.css?207"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>http://wiki.cas.mcmaster.ca/index.php?feed=atom&amp;target=Colbyl2&amp;title=Special%3AContributions</id>
		<title>Computing and Software Wiki - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="http://wiki.cas.mcmaster.ca/index.php?feed=atom&amp;target=Colbyl2&amp;title=Special%3AContributions"/>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Special:Contributions/Colbyl2"/>
		<updated>2026-04-08T18:57:41Z</updated>
		<subtitle>From Computing and Software Wiki</subtitle>
		<generator>MediaWiki 1.15.1</generator>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)</id>
		<title>Digital Enhanced Cordless Telecommunications (DECT)</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)"/>
				<updated>2009-04-13T02:10:38Z</updated>
		
		<summary type="html">&lt;p&gt;Colbyl2:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Panasonic_handset.jpg|thumb|right|The base unit and handset of a Panasonic DECT cordless telephone]]&lt;br /&gt;
'''DECT''' or '''Digital Enhanced Cordless Telecommunications''' is a radio standard for short-range cordless communications. It is commonly used for domestic or corporate purposes. It is suited to voice, data and networking applications with a range of up to 500 metres.&lt;br /&gt;
&lt;br /&gt;
DECT was developed by the European Telecommunications Standards Institute (ETSI); an independent, non-profit, standardization organization in the telecommunications industry in Europe. Although DECT was developed by ETSI it has since been adopted by many countries all over the world.&lt;br /&gt;
&lt;br /&gt;
While the original DECT frequency band is 1880 MHz - 1900 MHz, the frequency allocation has changed in some countries like the United States so that DECT devices can be sold there. Since these channels are reserved exclusively for voice communication applications, they are much less likely to experience interference from other wireless devices such as wireless networks or baby monitors. DECT devices are therefore known as being ''interference free''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Applications ==&lt;br /&gt;
[[Image:Dect_solutions.jpg|thumb|right|400px|DECT wireless technology targets homes, businesses, industry and public areas [http://www.deviceforge.com/news/NS9790688989.html?regen=yes&amp;amp;display=yes 3]]]&lt;br /&gt;
&lt;br /&gt;
DECT has numerous applications and services. The range of DECT applications are listed below:&lt;br /&gt;
&lt;br /&gt;
*Residential&lt;br /&gt;
*Public Switched Telephone Network (PSTN) access&lt;br /&gt;
*Integrated Services Digital Network (ISDN) access&lt;br /&gt;
*Wireless Private Branch Exchange (PABX)&lt;br /&gt;
*Global System for Mobile communications (GSM) access&lt;br /&gt;
*Wireless Local Loop&lt;br /&gt;
*Cordless Terminal Mobility (CTM)&lt;br /&gt;
*Local Area Network access supporting voice telephony, fax, modem, E-mail, Internet, X.25 and many other services&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The DECT standard originally envisaged three major areas of application:[http://en.wikipedia.org/wiki/DECT 1]&lt;br /&gt;
&lt;br /&gt;
# domestic cordless telephony, using a single base station to connect one or more handsets to the public telecoms network, which is now available&lt;br /&gt;
# enterprise premises cordless PABXs and wireless LANs, using many base stations for coverage. Calls continue as users move between different coverage cells, through a mechanism called handover. Traffic both within the system and to the public telecoms network&lt;br /&gt;
# public access, using large numbers of base stations to provide building or urban area coverage as part of a public telecoms network.&lt;br /&gt;
&lt;br /&gt;
The domestic application, or cordless home telephones, has been very successful. The enterprise PABX market has had some success, but the public access application has not succeeded, since public cellular networks have fulfilled the need better.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== DECT Features ==&lt;br /&gt;
&lt;br /&gt;
Common features of the DECT Standard include:[http://einstein.informatik.uni-oldenburg.de/rechnernetze/dect.htm 2]&lt;br /&gt;
&lt;br /&gt;
*Flexible bandwidth&lt;br /&gt;
*High subscriber densities&lt;br /&gt;
*Interoperability&lt;br /&gt;
*Mobility&lt;br /&gt;
*High Quality Voice&lt;br /&gt;
*Robust self organizing real time radio channel selection&lt;br /&gt;
*Cost efficiency&lt;br /&gt;
*High level of security&lt;br /&gt;
*Coexistence&lt;br /&gt;
*Standard interworking profiles&lt;br /&gt;
*Multiple access rights&lt;br /&gt;
*Seamless handover&lt;br /&gt;
*Multi-mode terminals&lt;br /&gt;
*Extended battery talk time&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Digital Radio Techniques ===&lt;br /&gt;
&lt;br /&gt;
The DECT standard allows for the proficient use of the radio spectrum through several advanced digital radio techniques. Delivering low risk of radio interference and low power technology, the DECT standard still ensures high speech quality and security. &lt;br /&gt;
DECT digital radio techniques include: [http://www.deviceforge.com/news/NS9790688989.html?regen=yes&amp;amp;display=yes 3]&lt;br /&gt;
&lt;br /&gt;
*'''TDMA (Time Division Multiple Access)''' radio access – low radio interference and high system capacity; is capable of handling up to 100'000 users per km² floor space in an office.&lt;br /&gt;
*'''ADPCM (Adaptive Differential Pulse Code Modulation)''' speech encoding – ensures that DECT phones have very high speech quality, which is similar to wireline telephony&lt;br /&gt;
*'''DCS/DCA (Dynamic Channel Selection / Allocation)''' is a unique DECT capability that guarantees that the best radio channels available are used; For example, this happens when a cordless phone is in standby mode as well as throughout the call; this feature also ensures that DECT telephony can coexist with other DECT applications, and with other systems in the same frequency, with high-quality, robust and secure communications for end-users &lt;br /&gt;
*'''Some other features''' - Encryption for maximum call security and optimized radio transmission for maximum battery life.&lt;br /&gt;
&lt;br /&gt;
DECT basic technology and the various profiles enhance the DECT standard, introducing evolutionary applications and services. The GAP profile, for example, ensures interoperability of equipment from different providers for voice applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Technical Details ==&lt;br /&gt;
&lt;br /&gt;
Some DECT properties:[http://en.wikipedia.org/wiki/DECT 1]&lt;br /&gt;
&lt;br /&gt;
* Audio codec: G.726&lt;br /&gt;
* Net bit rate: 32 kbit/s&lt;br /&gt;
* Frequency: 1880 MHz–1900 MHz in Europe, 1900 MHz-1920 MHz in China, 1910 MHz-1930 MHz in Latin America and 1920 MHz–1930 MHz in the US&lt;br /&gt;
* Carriers: 10 (1,728 kHz spacing) in Europe, 5 (1,728 kHz spacing) in the US&lt;br /&gt;
* Time slots: 2 x 12 (up and down stream)&lt;br /&gt;
* Channel allocation: dynamic&lt;br /&gt;
* Average transmission power: 10 mW (250 mW peak) in Europe, 4 mW (100 mW peak) in the US&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The table below shows some of the important layers of the DECT standard:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;5&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|+ '''Parts 1 to 8 of the DECT CI standard ETS 300 175'''  [http://einstein.informatik.uni-oldenburg.de/rechnernetze/seite24.htm 4]&lt;br /&gt;
!'''Title'''&lt;br /&gt;
!'''Description'''&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!1. Overview&lt;br /&gt;
!General introduction to the other parts of ETS 300 175&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!2. Physical Layer&lt;br /&gt;
!Radio requirements of DECT, e.g. carrier frequency allocation, modulation method, transmission frame structure, transmitted power limits, spurious emission requirements etc.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!3. Medium Access Control Layer&lt;br /&gt;
!Description of procedures, messages, and protocols for radio resource man-cess Control agement i.e. link set-up, channel selection, handover, link release and link layer quality maintenance etc.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!4. Data Link&lt;br /&gt;
!Description of provisions to secure a reliable data link to the network layer Control layer.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!5. Network layer &lt;br /&gt;
!Description of the signalling layer with call control and mobility management functions and protocols.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!6. Identities and Adressing&lt;br /&gt;
!Description of the portable and fixed part identities requirements for all Addressing DECT application environments.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!7. Security aspects&lt;br /&gt;
!Procedures to prevent eavesdropping, unauthorised access and fraudulent use.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!8. Telephony&lt;br /&gt;
!Telephony requirements for systems supporting the 3.1 kHz speech service to ensure proper interworking with public telecommunications networks. De-fines transmission levels, loudness ratings, sidetone levels, frequency re-sponse, echo control requirements etc.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== DECT Technologies ==&lt;br /&gt;
&lt;br /&gt;
=== DECT 6.0 === &lt;br /&gt;
&lt;br /&gt;
DECT devices that are made in the U.S are termed '''DECT 6.0''' to distinguish them from other DECT devices. Some other U.S cordless devices operate in the 900 MHz, 2.4GHz and 5.8GHz bands. DECT 6.0 is not a spectrum band reference but rather a marketing term coined when DECT was accepted in the U.S. The term 6.0 GHz is actually incorrect for DECT 6.0 because it operates at 1.9 GHz. DECT 1.9 may have confused customers because they associate a larger number with a better or later product. [http://en.wikipedia.org/wiki/DECT 1]&lt;br /&gt;
&lt;br /&gt;
=== DECT Data Networks ===&lt;br /&gt;
&lt;br /&gt;
There are other possibilities that exist with the DECT standard, particularly the DPRS (DECT Packet Radio Services). It allows DECT to be a wireless LAN and wireless internet access service. It has good range of up to 200 m indoors and 6 km using directional antennae outdoors. It also has a dedicated spectrum, high interference immunity, open interoperability and data speeds of around 500 kbit/s. At one time DECT appeared to be a superior alternative to Wi-Fi. &lt;br /&gt;
&lt;br /&gt;
The timing of the availability of DECT, in the mid 1990s, was too early to find wide application for wireless data outside niche industrial applications. While providers of Wi-Fi struggled with the same problems, providers of DECT went back to the more immediately successful market for cordless telephones. When mass applications for wireless Internet emerged, and the U.S. opened up to DECT, well into the new century, the industry had moved far ahead in terms of performance and DECT's time as a wireless data transport was past.&lt;br /&gt;
&lt;br /&gt;
The failure of DECT as a data protocol became a strength when DECT 6.0 phones finally appeared in the U.S. in late 2005. By then, the ISM bands had become crowded in the U.S., especially the 2.4 GHz band. However, since Wi-Fi doesn't operate in the UPCS band and DECT devices negotiate with each other for the available spectrum, not only are DECT 6.0 phones immune from this type of interference, their operation does not impair other nearby devices operating on the same frequency, which is a common issue with 2.4 GHz cordless phones.[http://en.wikipedia.org/wiki/DECT 1]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== The New Generation of DECT ===&lt;br /&gt;
&lt;br /&gt;
Due to its ability to integrate multimedia applications – such as voice, data, internet services and multi-operator services, DECT is in prime position to be utilized in the newest technologies. &lt;br /&gt;
The newest features available include the following: [http://www.etsi.org/WebSite/Technologies/DECT.aspx 5]&lt;br /&gt;
&lt;br /&gt;
*Video telephony capability&lt;br /&gt;
*Plug &amp;amp; Play functionality of all components&lt;br /&gt;
*Automatic device detection and configuration.&lt;br /&gt;
*Superior voice quality better than any existing (Wideband Speech)&lt;br /&gt;
*Support of Broadband Data and Audio Streaming&lt;br /&gt;
*Streaming CD Quality Audio Content&lt;br /&gt;
*Home Monitoring, Door phone, Baby monitor, Mailbox&lt;br /&gt;
&lt;br /&gt;
These new specifications first became available in March 2007, following the publication of an Overview Report. Themes of other publications related to New Generation DECT include Wideband speech, Extended Wideband speech services and IP Packet data.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Comparison to Other Technologies ==&lt;br /&gt;
&lt;br /&gt;
The following is a graph that shows DECT in comparison to other wireless technologies in terms of Bit rate vs. distance:&lt;br /&gt;
&lt;br /&gt;
[[Image:Dect_wireless.gif|thumb|center|600px|Comparison of DECT to other wireless technologies [http://einstein.informatik.uni-oldenburg.de/rechnernetze/dect.htm 2]]]&lt;br /&gt;
&lt;br /&gt;
The following is a table comparing various features of DECT to other wireless technologies:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;5&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|+ '''Comparison of wireless technologies'''  [http://www.deviceforge.com/news/NS9790688989.html?regen=yes&amp;amp;display=yes 3]&lt;br /&gt;
!'''Feature'''&lt;br /&gt;
!'''Home RF'''&lt;br /&gt;
!'''802.11a'''	&lt;br /&gt;
!'''802.11b'''&lt;br /&gt;
!'''Bluetooth'''&lt;br /&gt;
!'''DECT'''&lt;br /&gt;
!'''IrDA'''&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!Technology	&lt;br /&gt;
!Radio	&lt;br /&gt;
!Radio&lt;br /&gt;
!Radio&lt;br /&gt;
!Radio&lt;br /&gt;
!Radio&lt;br /&gt;
!Optical&lt;br /&gt;
|-&lt;br /&gt;
						&lt;br /&gt;
|+&lt;br /&gt;
!Frequency&lt;br /&gt;
!2.4 GHz	&lt;br /&gt;
!5 GHz&lt;br /&gt;
!2.4 GHz&lt;br /&gt;
!2.4 GHz&lt;br /&gt;
!1.9 GHz&lt;br /&gt;
!850 nm&lt;br /&gt;
|-&lt;br /&gt;
						&lt;br /&gt;
|+&lt;br /&gt;
!Basic data rate bits/sec&lt;br /&gt;
!0.8/1.6 M	&lt;br /&gt;
!54 M&lt;br /&gt;
!11 M&lt;br /&gt;
!1 M&lt;br /&gt;
!552 K&lt;br /&gt;
!4 M/115 K&lt;br /&gt;
|-&lt;br /&gt;
						&lt;br /&gt;
|+&lt;br /&gt;
!Range, meters&lt;br /&gt;
!50	&lt;br /&gt;
!150&lt;br /&gt;
!30&lt;br /&gt;
!10&lt;br /&gt;
!300&lt;br /&gt;
!3&lt;br /&gt;
|-&lt;br /&gt;
						&lt;br /&gt;
|+&lt;br /&gt;
!Max terminals&lt;br /&gt;
!128&lt;br /&gt;
!128+&lt;br /&gt;
!128&lt;br /&gt;
!8&lt;br /&gt;
!12&lt;br /&gt;
!10&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
#DECT: [http://en.wikipedia.org/wiki/DECT Wikipedia] Digital Enhanced Cordless Telecommunications  &lt;br /&gt;
#Prof. Dr. W. Kowalk (2007-03-13). [http://einstein.informatik.uni-oldenburg.de/rechnernetze/dect.htm Rechnernetze – DECT] An introduction to DECT.&lt;br /&gt;
#DECT wireless telephony arrives in the US: [http://www.deviceforge.com/news/NS9790688989.html?regen=yes&amp;amp;display=yes deviceforge.com]&lt;br /&gt;
#Prof. Dr. W. Kowalk (2007-03-13). [http://einstein.informatik.uni-oldenburg.de/rechnernetze/seite24.htm Rechnernetze – The DECT Standard] An introduction to DECT standardization.&lt;br /&gt;
#ETSI World Class Standards [http://www.etsi.org/WebSite/Technologies/DECT.aspx  etsi.org] DECT Introduction&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
* [[Cell BE - A Network on a Chip]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Internet Control Message Protocol]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Denial Of Service Attacks]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Wi-Fi]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Cryptography in Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Tools for conducting denial-of-service attacks ]]&lt;br /&gt;
* [[Hypertext Transfer Protocol over Secure Socket Layer (HTTPS)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Bluetooth]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[The practicality of IPv6]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Dynamic Host Configuration Protocol]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Social network service ]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Keystroke Logging: Are You Next]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Latency]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Onion Routing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[Radio Frequency Identification (RFID)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[3G Communications]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Security in Smartphones]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Credit Card Chip Technology and Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Address Resolution Protocol (ARP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[How to Connect to the Internet via an ISP]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[CAPTCHA]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Security for Small Home Networks]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Rootkits]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Proxy Server]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network firewall]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Steganography and Digital Watermarking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Malware]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Peer To Peer Network Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[High-Speed Downlink Packet Access (HSDPA)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Man in the Middle Attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Attached Storage]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[RSA Encryption Algorithm]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Corporate Security and IT Policies]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Ethical Hacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Extensible Messaging and Presence Protocol (XMPP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Cloud Computing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Ethernet Routing Devices]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Personal Data Protection and Privacy]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Public Key Authentication]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[AJAX Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Topology]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[IP Spoofing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[WLAN Standard 802.11n]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Domain Name System]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Web 2.0]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Local area network]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Bots &amp;amp; Botnets]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Trivial File Transfer Protocol]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Load Balancing for Network Servers]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Simple Mail Transfer Protocol (SMTP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Email Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Data Encryption for Storage Devices]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Statistics of Internet Threats]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[VoIP]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Deep packet inspection]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Fingerprint Authentication]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Multicasting]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[MD5 Rainbow Tables]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Interplanetary Internet]]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/DECT Wikipedia: DECT]&lt;br /&gt;
*[http://www.etsi.org/WebSite/Technologies/DECT.aspx DECT information at ETSI]&lt;br /&gt;
*[http://www.dect.org/content.aspx?id=18 DECT Forum at dect.org]&lt;br /&gt;
*[http://www.deviceforge.com/news/NS9790688989.html?regen=yes&amp;amp;display=yes DECT on deviceforge.com]&lt;br /&gt;
*[http://www.dectweb.com/default.html DECTWeb.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Colbyl2|Colbyl2]] 22:00, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Colbyl2</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)</id>
		<title>Digital Enhanced Cordless Telecommunications (DECT)</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)"/>
				<updated>2009-04-13T02:00:41Z</updated>
		
		<summary type="html">&lt;p&gt;Colbyl2:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Panasonic_handset.jpg|thumb|right|The base unit and handset of a Panasonic DECT cordless telephone]]&lt;br /&gt;
'''DECT''' or '''Digital Enhanced Cordless Telecommunications''' is a radio standard for short-range cordless communications. It is commonly used for domestic or corporate purposes. It is suited to voice, data and networking applications with a range of up to 500 metres.&lt;br /&gt;
&lt;br /&gt;
DECT was developed by the European Telecommunications Standards Institute (ETSI); an independent, non-profit, standardization organization in the telecommunications industry in Europe. Although DECT was developed by ETSI it has since been adopted by many countries all over the world.&lt;br /&gt;
&lt;br /&gt;
While the original DECT frequency band is 1880 MHz - 1900 MHz, the frequency allocation has changed in some countries like the United States so that DECT devices can be sold there. Since these channels are reserved exclusively for voice communication applications, they are much less likely to experience interference from other wireless devices such as wireless networks or baby monitors. DECT devices are therefore known as being ''interference free''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Applications ==&lt;br /&gt;
[[Image:Dect_solutions.jpg|thumb|right|400px|DECT wireless technology targets homes, businesses, industry and public areas [http://www.deviceforge.com/news/NS9790688989.html?regen=yes&amp;amp;display=yes 3]]]&lt;br /&gt;
&lt;br /&gt;
DECT has numerous applications and services. The range of DECT applications are listed below:&lt;br /&gt;
&lt;br /&gt;
*Residential&lt;br /&gt;
*Public Switched Telephone Network (PSTN) access&lt;br /&gt;
*Integrated Services Digital Network (ISDN) access&lt;br /&gt;
*Wireless Private Branch Exchange (PABX)&lt;br /&gt;
*Global System for Mobile communications (GSM) access&lt;br /&gt;
*Wireless Local Loop&lt;br /&gt;
*Cordless Terminal Mobility (CTM)&lt;br /&gt;
*Local Area Network access supporting voice telephony, fax, modem, E-mail, Internet, X.25 and many other services&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The DECT standard originally envisaged three major areas of application:[http://en.wikipedia.org/wiki/DECT 1]&lt;br /&gt;
&lt;br /&gt;
# domestic cordless telephony, using a single base station to connect one or more handsets to the public telecoms network, which is now available&lt;br /&gt;
# enterprise premises cordless PABXs and wireless LANs, using many base stations for coverage. Calls continue as users move between different coverage cells, through a mechanism called handover. Traffic both within the system and to the public telecoms network&lt;br /&gt;
# public access, using large numbers of base stations to provide building or urban area coverage as part of a public telecoms network.&lt;br /&gt;
&lt;br /&gt;
The domestic application, or cordless home telephones, has been very successful. The enterprise PABX market has had some success, but the public access application has not succeeded, since public cellular networks have fulfilled the need better.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== DECT Features ==&lt;br /&gt;
&lt;br /&gt;
Common features of the DECT Standard include:[http://einstein.informatik.uni-oldenburg.de/rechnernetze/dect.htm 2]&lt;br /&gt;
&lt;br /&gt;
*Flexible bandwidth&lt;br /&gt;
*High subscriber densities&lt;br /&gt;
*Interoperability&lt;br /&gt;
*Mobility&lt;br /&gt;
*High Quality Voice&lt;br /&gt;
*Robust self organizing real time radio channel selection&lt;br /&gt;
*Cost efficiency&lt;br /&gt;
*High level of security&lt;br /&gt;
*Coexistence&lt;br /&gt;
*Standard interworking profiles&lt;br /&gt;
*Multiple access rights&lt;br /&gt;
*Seamless handover&lt;br /&gt;
*Multi-mode terminals&lt;br /&gt;
*Extended battery talk time&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Digital Radio Techniques ===&lt;br /&gt;
&lt;br /&gt;
The DECT standard allows for the proficient use of the radio spectrum through several advanced digital radio techniques. Delivering low risk of radio interference and low power technology, the DECT standard still ensures high speech quality and security. &lt;br /&gt;
DECT digital radio techniques include: &lt;br /&gt;
&lt;br /&gt;
*'''TDMA (Time Division Multiple Access)''' radio access – low radio interference and high system capacity; is capable of handling up to 100'000 users per km² floor space in an office.&lt;br /&gt;
*'''ADPCM (Adaptive Differential Pulse Code Modulation)''' speech encoding – ensures that DECT phones have very high speech quality, which is similar to wireline telephony&lt;br /&gt;
*'''DCS/DCA (Dynamic Channel Selection / Allocation)''' is a unique DECT capability that guarantees that the best radio channels available are used; For example, this happens when a cordless phone is in standby mode as well as throughout the call; this feature also ensures that DECT telephony can coexist with other DECT applications, and with other systems in the same frequency, with high-quality, robust and secure communications for end-users &lt;br /&gt;
*'''Some other features''' - Encryption for maximum call security and optimized radio transmission for maximum battery life.&lt;br /&gt;
&lt;br /&gt;
DECT basic technology and the various profiles enhance the DECT standard, introducing evolutionary applications and services. The GAP profile, for example, ensures interoperability of equipment from different providers for voice applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Technical Details ==&lt;br /&gt;
&lt;br /&gt;
Some DECT properties:[http://en.wikipedia.org/wiki/DECT 1]&lt;br /&gt;
&lt;br /&gt;
* Audio codec: G.726&lt;br /&gt;
* Net bit rate: 32 kbit/s&lt;br /&gt;
* Frequency: 1880 MHz–1900 MHz in Europe, 1900 MHz-1920 MHz in China, 1910 MHz-1930 MHz in Latin America and 1920 MHz–1930 MHz in the US&lt;br /&gt;
* Carriers: 10 (1,728 kHz spacing) in Europe, 5 (1,728 kHz spacing) in the US&lt;br /&gt;
* Time slots: 2 x 12 (up and down stream)&lt;br /&gt;
* Channel allocation: dynamic&lt;br /&gt;
* Average transmission power: 10 mW (250 mW peak) in Europe, 4 mW (100 mW peak) in the US&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The table below shows some of the important layers of the DECT standard:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;5&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|+ '''Parts 1 to 8 of the DECT CI standard ETS 300 175'''  [http://einstein.informatik.uni-oldenburg.de/rechnernetze/seite24.htm 4]&lt;br /&gt;
!'''Title'''&lt;br /&gt;
!'''Description'''&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!1. Overview&lt;br /&gt;
!General introduction to the other parts of ETS 300 175&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!2. Physical Layer&lt;br /&gt;
!Radio requirements of DECT, e.g. carrier frequency allocation, modulation method, transmission frame structure, transmitted power limits, spurious emission requirements etc.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!3. Medium Access Control Layer&lt;br /&gt;
!Description of procedures, messages, and protocols for radio resource man-cess Control agement i.e. link set-up, channel selection, handover, link release and link layer quality maintenance etc.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!4. Data Link&lt;br /&gt;
!Description of provisions to secure a reliable data link to the network layer Control layer.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!5. Network layer &lt;br /&gt;
!Description of the signalling layer with call control and mobility management functions and protocols.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!6. Identities and Adressing&lt;br /&gt;
!Description of the portable and fixed part identities requirements for all Addressing DECT application environments.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!7. Security aspects&lt;br /&gt;
!Procedures to prevent eavesdropping, unauthorised access and fraudulent use.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!8. Telephony&lt;br /&gt;
!Telephony requirements for systems supporting the 3.1 kHz speech service to ensure proper interworking with public telecommunications networks. De-fines transmission levels, loudness ratings, sidetone levels, frequency re-sponse, echo control requirements etc.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== DECT Technologies ==&lt;br /&gt;
&lt;br /&gt;
=== DECT 6.0 === &lt;br /&gt;
&lt;br /&gt;
DECT devices that are made in the U.S are termed '''DECT 6.0''' to distinguish them from other DECT devices. Some other U.S cordless devices operate in the 900 MHz, 2.4GHz and 5.8GHz bands. DECT 6.0 is not a spectrum band reference but rather a marketing term coined when DECT was accepted in the U.S. The term 6.0 GHz is actually incorrect for DECT 6.0 because it operates at 1.9 GHz. DECT 1.9 may have confused customers because they associate a larger number with a better or later product. [http://en.wikipedia.org/wiki/DECT 1]&lt;br /&gt;
&lt;br /&gt;
=== DECT Data Networks ===&lt;br /&gt;
&lt;br /&gt;
There are other possibilities that exist with the DECT standard, particularly the DPRS (DECT Packet Radio Services). It allows DECT to be a wireless LAN and wireless internet access service. It has good range of up to 200 m indoors and 6 km using directional antennae outdoors. It also has a dedicated spectrum, high interference immunity, open interoperability and data speeds of around 500 kbit/s. At one time DECT appeared to be a superior alternative to Wi-Fi. &lt;br /&gt;
&lt;br /&gt;
The timing of the availability of DECT, in the mid 1990s, was too early to find wide application for wireless data outside niche industrial applications. While providers of Wi-Fi struggled with the same problems, providers of DECT went back to the more immediately successful market for cordless telephones. When mass applications for wireless Internet emerged, and the U.S. opened up to DECT, well into the new century, the industry had moved far ahead in terms of performance and DECT's time as a wireless data transport was past.&lt;br /&gt;
&lt;br /&gt;
The failure of DECT as a data protocol became a strength when DECT 6.0 phones finally appeared in the U.S. in late 2005. By then, the ISM bands had become crowded in the U.S., especially the 2.4 GHz band. However, since Wi-Fi doesn't operate in the UPCS band and DECT devices negotiate with each other for the available spectrum, not only are DECT 6.0 phones immune from this type of interference, their operation does not impair other nearby devices operating on the same frequency, which is a common issue with 2.4 GHz cordless phones.[http://en.wikipedia.org/wiki/DECT 1]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== The New Generation of DECT ===&lt;br /&gt;
&lt;br /&gt;
Due to its ability to integrate multimedia applications – such as voice, data, internet services and multi-operator services, DECT is in prime position to be utilized in the newest technologies. &lt;br /&gt;
The newest features available include the following:&lt;br /&gt;
&lt;br /&gt;
*Video telephony capability&lt;br /&gt;
*Plug &amp;amp; Play functionality of all components&lt;br /&gt;
*Automatic device detection and configuration.&lt;br /&gt;
*Superior voice quality better than any existing (Wideband Speech)&lt;br /&gt;
*Support of Broadband Data and Audio Streaming&lt;br /&gt;
*Streaming CD Quality Audio Content&lt;br /&gt;
*Home Monitoring, Door phone, Baby monitor, Mailbox&lt;br /&gt;
&lt;br /&gt;
These new specifications first became available in March 2007, following the publication of an Overview Report. Themes of other publications related to New Generation DECT include Wideband speech, Extended Wideband speech services and IP Packet data.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Comparison to Other Technologies ==&lt;br /&gt;
&lt;br /&gt;
The following is a graph that shows DECT in comparison to other wireless technologies in terms of Bit rate vs. distance:&lt;br /&gt;
&lt;br /&gt;
[[Image:Dect_wireless.gif|thumb|center|600px|Comparison of DECT to other wireless technologies [http://einstein.informatik.uni-oldenburg.de/rechnernetze/dect.htm 2]]]&lt;br /&gt;
&lt;br /&gt;
The following is a table comparing various features of DECT to other wireless technologies:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;5&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|+ '''Comparison of wireless technologies'''  [http://www.deviceforge.com/news/NS9790688989.html?regen=yes&amp;amp;display=yes 3]&lt;br /&gt;
!'''Feature'''&lt;br /&gt;
!'''Home RF'''&lt;br /&gt;
!'''802.11a'''	&lt;br /&gt;
!'''802.11b'''&lt;br /&gt;
!'''Bluetooth'''&lt;br /&gt;
!'''DECT'''&lt;br /&gt;
!'''IrDA'''&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!Technology	&lt;br /&gt;
!Radio	&lt;br /&gt;
!Radio&lt;br /&gt;
!Radio&lt;br /&gt;
!Radio&lt;br /&gt;
!Radio&lt;br /&gt;
!Optical&lt;br /&gt;
|-&lt;br /&gt;
						&lt;br /&gt;
|+&lt;br /&gt;
!Frequency&lt;br /&gt;
!2.4 GHz	&lt;br /&gt;
!5 GHz&lt;br /&gt;
!2.4 GHz&lt;br /&gt;
!2.4 GHz&lt;br /&gt;
!1.9 GHz&lt;br /&gt;
!850 nm&lt;br /&gt;
|-&lt;br /&gt;
						&lt;br /&gt;
|+&lt;br /&gt;
!Basic data rate bits/sec&lt;br /&gt;
!0.8/1.6 M	&lt;br /&gt;
!54 M&lt;br /&gt;
!11 M&lt;br /&gt;
!1 M&lt;br /&gt;
!552 K&lt;br /&gt;
!4 M/115 K&lt;br /&gt;
|-&lt;br /&gt;
						&lt;br /&gt;
|+&lt;br /&gt;
!Range, meters&lt;br /&gt;
!50	&lt;br /&gt;
!150&lt;br /&gt;
!30&lt;br /&gt;
!10&lt;br /&gt;
!300&lt;br /&gt;
!3&lt;br /&gt;
|-&lt;br /&gt;
						&lt;br /&gt;
|+&lt;br /&gt;
!Max terminals&lt;br /&gt;
!128&lt;br /&gt;
!128+&lt;br /&gt;
!128&lt;br /&gt;
!8&lt;br /&gt;
!12&lt;br /&gt;
!10&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
#DECT: [http://en.wikipedia.org/wiki/DECT Wikipedia] Digital Enhanced Cordless Telecommunications  &lt;br /&gt;
#Prof. Dr. W. Kowalk (2007-03-13). [http://einstein.informatik.uni-oldenburg.de/rechnernetze/dect.htm Rechnernetze – DECT] An introduction to DECT.&lt;br /&gt;
#DECT wireless telephony arrives in the US: [http://www.deviceforge.com/news/NS9790688989.html?regen=yes&amp;amp;display=yes deviceforge.com]&lt;br /&gt;
#Prof. Dr. W. Kowalk (2007-03-13). [http://einstein.informatik.uni-oldenburg.de/rechnernetze/seite24.htm Rechnernetze – The DECT Standard] An introduction to DECT standardization.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
* [[Cell BE - A Network on a Chip]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Internet Control Message Protocol]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Denial Of Service Attacks]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Wi-Fi]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Cryptography in Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Tools for conducting denial-of-service attacks ]]&lt;br /&gt;
* [[Hypertext Transfer Protocol over Secure Socket Layer (HTTPS)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Bluetooth]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[The practicality of IPv6]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Dynamic Host Configuration Protocol]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Social network service ]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Keystroke Logging: Are You Next]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Latency]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Onion Routing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[Radio Frequency Identification (RFID)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[3G Communications]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Security in Smartphones]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Credit Card Chip Technology and Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Address Resolution Protocol (ARP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[How to Connect to the Internet via an ISP]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[CAPTCHA]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Security for Small Home Networks]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Rootkits]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Proxy Server]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network firewall]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Steganography and Digital Watermarking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Malware]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Peer To Peer Network Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[High-Speed Downlink Packet Access (HSDPA)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Man in the Middle Attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Attached Storage]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[RSA Encryption Algorithm]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Corporate Security and IT Policies]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Ethical Hacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Extensible Messaging and Presence Protocol (XMPP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Cloud Computing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Ethernet Routing Devices]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Personal Data Protection and Privacy]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Public Key Authentication]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[AJAX Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Topology]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[IP Spoofing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[WLAN Standard 802.11n]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Domain Name System]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Web 2.0]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Local area network]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Bots &amp;amp; Botnets]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Trivial File Transfer Protocol]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Load Balancing for Network Servers]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Simple Mail Transfer Protocol (SMTP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Email Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Data Encryption for Storage Devices]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Statistics of Internet Threats]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[VoIP]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Deep packet inspection]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Fingerprint Authentication]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Multicasting]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[MD5 Rainbow Tables]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Interplanetary Internet]]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/DECT Wikipedia: DECT]&lt;br /&gt;
*[http://www.etsi.org/WebSite/Technologies/DECT.aspx DECT information at ETSI]&lt;br /&gt;
*[http://www.dect.org/content.aspx?id=18 DECT Forum at dect.org]&lt;br /&gt;
*[http://www.deviceforge.com/news/NS9790688989.html?regen=yes&amp;amp;display=yes DECT on deviceforge.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Colbyl2|Colbyl2]] 22:00, 12 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Colbyl2</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)</id>
		<title>Digital Enhanced Cordless Telecommunications (DECT)</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)"/>
				<updated>2009-04-13T01:58:19Z</updated>
		
		<summary type="html">&lt;p&gt;Colbyl2:&amp;#32;/* See also */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Panasonic_handset.jpg|thumb|right|The base unit and handset of a Panasonic DECT cordless telephone]]&lt;br /&gt;
'''DECT''' or '''Digital Enhanced Cordless Telecommunications''' is a radio standard for short-range cordless communications. It is commonly used for domestic or corporate purposes. It is suited to voice, data and networking applications with a range of up to 500 metres.&lt;br /&gt;
&lt;br /&gt;
DECT was developed by the European Telecommunications Standards Institute (ETSI); an independent, non-profit, standardization organization in the telecommunications industry in Europe. Although DECT was developed by ETSI it has since been adopted by many countries all over the world.&lt;br /&gt;
&lt;br /&gt;
While the original DECT frequency band is 1880 MHz - 1900 MHz, the frequency allocation has changed in some countries like the United States so that DECT devices can be sold there. Since these channels are reserved exclusively for voice communication applications, they are much less likely to experience interference from other wireless devices such as wireless networks or baby monitors. DECT devices are therefore known as being ''interference free''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Applications ==&lt;br /&gt;
[[Image:Dect_solutions.jpg|thumb|right|400px|DECT wireless technology targets homes, businesses, industry and public areas [http://www.deviceforge.com/news/NS9790688989.html?regen=yes&amp;amp;display=yes 3]]]&lt;br /&gt;
&lt;br /&gt;
DECT has numerous applications and services. The range of DECT applications are listed below:&lt;br /&gt;
&lt;br /&gt;
*Residential&lt;br /&gt;
*Public Switched Telephone Network (PSTN) access&lt;br /&gt;
*Integrated Services Digital Network (ISDN) access&lt;br /&gt;
*Wireless Private Branch Exchange (PABX)&lt;br /&gt;
*Global System for Mobile communications (GSM) access&lt;br /&gt;
*Wireless Local Loop&lt;br /&gt;
*Cordless Terminal Mobility (CTM)&lt;br /&gt;
*Local Area Network access supporting voice telephony, fax, modem, E-mail, Internet, X.25 and many other services&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The DECT standard originally envisaged three major areas of application:[http://en.wikipedia.org/wiki/DECT 1]&lt;br /&gt;
&lt;br /&gt;
# domestic cordless telephony, using a single base station to connect one or more handsets to the public telecoms network, which is now available&lt;br /&gt;
# enterprise premises cordless PABXs and wireless LANs, using many base stations for coverage. Calls continue as users move between different coverage cells, through a mechanism called handover. Traffic both within the system and to the public telecoms network&lt;br /&gt;
# public access, using large numbers of base stations to provide building or urban area coverage as part of a public telecoms network.&lt;br /&gt;
&lt;br /&gt;
The domestic application, or cordless home telephones, has been very successful. The enterprise PABX market has had some success, but the public access application has not succeeded, since public cellular networks have fulfilled the need better.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== DECT Features ==&lt;br /&gt;
&lt;br /&gt;
Common features of the DECT Standard include:[http://einstein.informatik.uni-oldenburg.de/rechnernetze/dect.htm 2]&lt;br /&gt;
&lt;br /&gt;
*Flexible bandwidth&lt;br /&gt;
*High subscriber densities&lt;br /&gt;
*Interoperability&lt;br /&gt;
*Mobility&lt;br /&gt;
*High Quality Voice&lt;br /&gt;
*Robust self organizing real time radio channel selection&lt;br /&gt;
*Cost efficiency&lt;br /&gt;
*High level of security&lt;br /&gt;
*Coexistence&lt;br /&gt;
*Standard interworking profiles&lt;br /&gt;
*Multiple access rights&lt;br /&gt;
*Seamless handover&lt;br /&gt;
*Multi-mode terminals&lt;br /&gt;
*Extended battery talk time&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Digital Radio Techniques ===&lt;br /&gt;
&lt;br /&gt;
The DECT standard allows for the proficient use of the radio spectrum through several advanced digital radio techniques. Delivering low risk of radio interference and low power technology, the DECT standard still ensures high speech quality and security. &lt;br /&gt;
DECT digital radio techniques include: &lt;br /&gt;
&lt;br /&gt;
*'''TDMA (Time Division Multiple Access)''' radio access – low radio interference and high system capacity; is capable of handling up to 100'000 users per km² floor space in an office.&lt;br /&gt;
*'''ADPCM (Adaptive Differential Pulse Code Modulation)''' speech encoding – ensures that DECT phones have very high speech quality, which is similar to wireline telephony&lt;br /&gt;
*'''DCS/DCA (Dynamic Channel Selection / Allocation)''' is a unique DECT capability that guarantees that the best radio channels available are used; For example, this happens when a cordless phone is in standby mode as well as throughout the call; this feature also ensures that DECT telephony can coexist with other DECT applications, and with other systems in the same frequency, with high-quality, robust and secure communications for end-users &lt;br /&gt;
*'''Some other features''' - Encryption for maximum call security and optimized radio transmission for maximum battery life.&lt;br /&gt;
&lt;br /&gt;
DECT basic technology and the various profiles enhance the DECT standard, introducing evolutionary applications and services. The GAP profile, for example, ensures interoperability of equipment from different providers for voice applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Technical Details ==&lt;br /&gt;
&lt;br /&gt;
Some DECT properties:[http://en.wikipedia.org/wiki/DECT 1]&lt;br /&gt;
&lt;br /&gt;
* Audio codec: G.726&lt;br /&gt;
* Net bit rate: 32 kbit/s&lt;br /&gt;
* Frequency: 1880 MHz–1900 MHz in Europe, 1900 MHz-1920 MHz in China, 1910 MHz-1930 MHz in Latin America and 1920 MHz–1930 MHz in the US&lt;br /&gt;
* Carriers: 10 (1,728 kHz spacing) in Europe, 5 (1,728 kHz spacing) in the US&lt;br /&gt;
* Time slots: 2 x 12 (up and down stream)&lt;br /&gt;
* Channel allocation: dynamic&lt;br /&gt;
* Average transmission power: 10 mW (250 mW peak) in Europe, 4 mW (100 mW peak) in the US&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The table below shows some of the important layers of the DECT standard:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;5&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|+ '''Parts 1 to 8 of the DECT CI standard ETS 300 175'''  [http://einstein.informatik.uni-oldenburg.de/rechnernetze/seite24.htm 4]&lt;br /&gt;
!'''Title'''&lt;br /&gt;
!'''Description'''&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!1. Overview&lt;br /&gt;
!General introduction to the other parts of ETS 300 175&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!2. Physical Layer&lt;br /&gt;
!Radio requirements of DECT, e.g. carrier frequency allocation, modulation method, transmission frame structure, transmitted power limits, spurious emission requirements etc.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!3. Medium Access Control Layer&lt;br /&gt;
!Description of procedures, messages, and protocols for radio resource man-cess Control agement i.e. link set-up, channel selection, handover, link release and link layer quality maintenance etc.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!4. Data Link&lt;br /&gt;
!Description of provisions to secure a reliable data link to the network layer Control layer.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!5. Network layer &lt;br /&gt;
!Description of the signalling layer with call control and mobility management functions and protocols.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!6. Identities and Adressing&lt;br /&gt;
!Description of the portable and fixed part identities requirements for all Addressing DECT application environments.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!7. Security aspects&lt;br /&gt;
!Procedures to prevent eavesdropping, unauthorised access and fraudulent use.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!8. Telephony&lt;br /&gt;
!Telephony requirements for systems supporting the 3.1 kHz speech service to ensure proper interworking with public telecommunications networks. De-fines transmission levels, loudness ratings, sidetone levels, frequency re-sponse, echo control requirements etc.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== DECT Technologies ==&lt;br /&gt;
&lt;br /&gt;
=== DECT 6.0 === &lt;br /&gt;
&lt;br /&gt;
DECT devices that are made in the U.S are termed '''DECT 6.0''' to distinguish them from other DECT devices. Some other U.S cordless devices operate in the 900 MHz, 2.4GHz and 5.8GHz bands. DECT 6.0 is not a spectrum band reference but rather a marketing term coined when DECT was accepted in the U.S. The term 6.0 GHz is actually incorrect for DECT 6.0 because it operates at 1.9 GHz. DECT 1.9 may have confused customers because they associate a larger number with a better or later product. [http://en.wikipedia.org/wiki/DECT 1]&lt;br /&gt;
&lt;br /&gt;
=== DECT Data Networks ===&lt;br /&gt;
&lt;br /&gt;
There are other possibilities that exist with the DECT standard, particularly the DPRS (DECT Packet Radio Services). It allows DECT to be a wireless LAN and wireless internet access service. It has good range of up to 200 m indoors and 6 km using directional antennae outdoors. It also has a dedicated spectrum, high interference immunity, open interoperability and data speeds of around 500 kbit/s. At one time DECT appeared to be a superior alternative to Wi-Fi. &lt;br /&gt;
&lt;br /&gt;
The timing of the availability of DECT, in the mid 1990s, was too early to find wide application for wireless data outside niche industrial applications. While providers of Wi-Fi struggled with the same problems, providers of DECT went back to the more immediately successful market for cordless telephones. When mass applications for wireless Internet emerged, and the U.S. opened up to DECT, well into the new century, the industry had moved far ahead in terms of performance and DECT's time as a wireless data transport was past.&lt;br /&gt;
&lt;br /&gt;
The failure of DECT as a data protocol became a strength when DECT 6.0 phones finally appeared in the U.S. in late 2005. By then, the ISM bands had become crowded in the U.S., especially the 2.4 GHz band. However, since Wi-Fi doesn't operate in the UPCS band and DECT devices negotiate with each other for the available spectrum, not only are DECT 6.0 phones immune from this type of interference, their operation does not impair other nearby devices operating on the same frequency, which is a common issue with 2.4 GHz cordless phones.[http://en.wikipedia.org/wiki/DECT 1]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== The New Generation of DECT ===&lt;br /&gt;
&lt;br /&gt;
Due to its ability to integrate multimedia applications – such as voice, data, internet services and multi-operator services, DECT is in prime position to be utilized in the newest technologies. &lt;br /&gt;
The newest features available include the following:&lt;br /&gt;
&lt;br /&gt;
*Video telephony capability&lt;br /&gt;
*Plug &amp;amp; Play functionality of all components&lt;br /&gt;
*Automatic device detection and configuration.&lt;br /&gt;
*Superior voice quality better than any existing (Wideband Speech)&lt;br /&gt;
*Support of Broadband Data and Audio Streaming&lt;br /&gt;
*Streaming CD Quality Audio Content&lt;br /&gt;
*Home Monitoring, Door phone, Baby monitor, Mailbox&lt;br /&gt;
&lt;br /&gt;
These new specifications first became available in March 2007, following the publication of an Overview Report. Themes of other publications related to New Generation DECT include Wideband speech, Extended Wideband speech services and IP Packet data.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Comparison to Other Technologies ==&lt;br /&gt;
&lt;br /&gt;
The following is a graph that shows DECT in comparison to other wireless technologies in terms of Bit rate vs. distance:&lt;br /&gt;
&lt;br /&gt;
[[Image:Dect_wireless.gif|thumb|center|600px|Comparison of DECT to other wireless technologies [http://einstein.informatik.uni-oldenburg.de/rechnernetze/dect.htm 2]]]&lt;br /&gt;
&lt;br /&gt;
The following is a table comparing various features of DECT to other wireless technologies:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;5&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|+ '''Comparison of wireless technologies'''  [http://www.deviceforge.com/news/NS9790688989.html?regen=yes&amp;amp;display=yes 3]&lt;br /&gt;
!'''Feature'''&lt;br /&gt;
!'''Home RF'''&lt;br /&gt;
!'''802.11a'''	&lt;br /&gt;
!'''802.11b'''&lt;br /&gt;
!'''Bluetooth'''&lt;br /&gt;
!'''DECT'''&lt;br /&gt;
!'''IrDA'''&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!Technology	&lt;br /&gt;
!Radio	&lt;br /&gt;
!Radio&lt;br /&gt;
!Radio&lt;br /&gt;
!Radio&lt;br /&gt;
!Radio&lt;br /&gt;
!Optical&lt;br /&gt;
|-&lt;br /&gt;
						&lt;br /&gt;
|+&lt;br /&gt;
!Frequency&lt;br /&gt;
!2.4 GHz	&lt;br /&gt;
!5 GHz&lt;br /&gt;
!2.4 GHz&lt;br /&gt;
!2.4 GHz&lt;br /&gt;
!1.9 GHz&lt;br /&gt;
!850 nm&lt;br /&gt;
|-&lt;br /&gt;
						&lt;br /&gt;
|+&lt;br /&gt;
!Basic data rate bits/sec&lt;br /&gt;
!0.8/1.6 M	&lt;br /&gt;
!54 M&lt;br /&gt;
!11 M&lt;br /&gt;
!1 M&lt;br /&gt;
!552 K&lt;br /&gt;
!4 M/115 K&lt;br /&gt;
|-&lt;br /&gt;
						&lt;br /&gt;
|+&lt;br /&gt;
!Range, meters&lt;br /&gt;
!50	&lt;br /&gt;
!150&lt;br /&gt;
!30&lt;br /&gt;
!10&lt;br /&gt;
!300&lt;br /&gt;
!3&lt;br /&gt;
|-&lt;br /&gt;
						&lt;br /&gt;
|+&lt;br /&gt;
!Max terminals&lt;br /&gt;
!128&lt;br /&gt;
!128+&lt;br /&gt;
!128&lt;br /&gt;
!8&lt;br /&gt;
!12&lt;br /&gt;
!10&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
#DECT: [http://en.wikipedia.org/wiki/DECT Wikipedia] Digital Enhanced Cordless Telecommunications  &lt;br /&gt;
#Prof. Dr. W. Kowalk (2007-03-13). [http://einstein.informatik.uni-oldenburg.de/rechnernetze/dect.htm Rechnernetze – DECT] An introduction to DECT.&lt;br /&gt;
#DECT wireless telephony arrives in the US: [http://www.deviceforge.com/news/NS9790688989.html?regen=yes&amp;amp;display=yes deviceforge.com]&lt;br /&gt;
#Prof. Dr. W. Kowalk (2007-03-13). [http://einstein.informatik.uni-oldenburg.de/rechnernetze/seite24.htm Rechnernetze – The DECT Standard] An introduction to DECT standardization.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
* [[Cell BE - A Network on a Chip]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Internet Control Message Protocol]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Denial Of Service Attacks]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Wi-Fi]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Cryptography in Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Tools for conducting denial-of-service attacks ]]&lt;br /&gt;
* [[Hypertext Transfer Protocol over Secure Socket Layer (HTTPS)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Bluetooth]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[The practicality of IPv6]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Dynamic Host Configuration Protocol]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Social network service ]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Keystroke Logging: Are You Next]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Latency]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Onion Routing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[Radio Frequency Identification (RFID)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[3G Communications]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Security in Smartphones]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Credit Card Chip Technology and Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Address Resolution Protocol (ARP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[How to Connect to the Internet via an ISP]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[CAPTCHA]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Security for Small Home Networks]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Rootkits]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Proxy Server]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network firewall]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Steganography and Digital Watermarking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Malware]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Peer To Peer Network Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[High-Speed Downlink Packet Access (HSDPA)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Man in the Middle Attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Attached Storage]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[RSA Encryption Algorithm]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Corporate Security and IT Policies]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Ethical Hacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Extensible Messaging and Presence Protocol (XMPP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Cloud Computing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Ethernet Routing Devices]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Personal Data Protection and Privacy]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Public Key Authentication]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[AJAX Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Topology]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[IP Spoofing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[WLAN Standard 802.11n]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Domain Name System]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Web 2.0]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Local area network]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Bots &amp;amp; Botnets]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Trivial File Transfer Protocol]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Load Balancing for Network Servers]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Simple Mail Transfer Protocol (SMTP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Email Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Data Encryption for Storage Devices]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Statistics of Internet Threats]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[VoIP]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Deep packet inspection]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Fingerprint Authentication]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Multicasting]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[MD5 Rainbow Tables]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Interplanetary Internet]]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/DECT Wikipedia: DECT]&lt;br /&gt;
*[http://www.etsi.org/WebSite/Technologies/DECT.aspx DECT information at ETSI]&lt;br /&gt;
*[http://www.dect.org/content.aspx?id=18 DECT Forum at dect.org]&lt;br /&gt;
*[http://www.deviceforge.com/news/NS9790688989.html?regen=yes&amp;amp;display=yes DECT on deviceforge.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Colbyl2|Colbyl2]] 17:32, 8 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Colbyl2</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)</id>
		<title>Digital Enhanced Cordless Telecommunications (DECT)</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)"/>
				<updated>2009-04-13T01:50:13Z</updated>
		
		<summary type="html">&lt;p&gt;Colbyl2:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Panasonic_handset.jpg|thumb|right|The base unit and handset of a Panasonic DECT cordless telephone]]&lt;br /&gt;
'''DECT''' or '''Digital Enhanced Cordless Telecommunications''' is a radio standard for short-range cordless communications. It is commonly used for domestic or corporate purposes. It is suited to voice, data and networking applications with a range of up to 500 metres.&lt;br /&gt;
&lt;br /&gt;
DECT was developed by the European Telecommunications Standards Institute (ETSI); an independent, non-profit, standardization organization in the telecommunications industry in Europe. Although DECT was developed by ETSI it has since been adopted by many countries all over the world.&lt;br /&gt;
&lt;br /&gt;
While the original DECT frequency band is 1880 MHz - 1900 MHz, the frequency allocation has changed in some countries like the United States so that DECT devices can be sold there. Since these channels are reserved exclusively for voice communication applications, they are much less likely to experience interference from other wireless devices such as wireless networks or baby monitors. DECT devices are therefore known as being ''interference free''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Applications ==&lt;br /&gt;
[[Image:Dect_solutions.jpg|thumb|right|400px|DECT wireless technology targets homes, businesses, industry and public areas [http://www.deviceforge.com/news/NS9790688989.html?regen=yes&amp;amp;display=yes 3]]]&lt;br /&gt;
&lt;br /&gt;
DECT has numerous applications and services. The range of DECT applications are listed below:&lt;br /&gt;
&lt;br /&gt;
*Residential&lt;br /&gt;
*Public Switched Telephone Network (PSTN) access&lt;br /&gt;
*Integrated Services Digital Network (ISDN) access&lt;br /&gt;
*Wireless Private Branch Exchange (PABX)&lt;br /&gt;
*Global System for Mobile communications (GSM) access&lt;br /&gt;
*Wireless Local Loop&lt;br /&gt;
*Cordless Terminal Mobility (CTM)&lt;br /&gt;
*Local Area Network access supporting voice telephony, fax, modem, E-mail, Internet, X.25 and many other services&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The DECT standard originally envisaged three major areas of application:[http://en.wikipedia.org/wiki/DECT 1]&lt;br /&gt;
&lt;br /&gt;
# domestic cordless telephony, using a single base station to connect one or more handsets to the public telecoms network, which is now available&lt;br /&gt;
# enterprise premises cordless PABXs and wireless LANs, using many base stations for coverage. Calls continue as users move between different coverage cells, through a mechanism called handover. Traffic both within the system and to the public telecoms network&lt;br /&gt;
# public access, using large numbers of base stations to provide building or urban area coverage as part of a public telecoms network.&lt;br /&gt;
&lt;br /&gt;
The domestic application, or cordless home telephones, has been very successful. The enterprise PABX market has had some success, but the public access application has not succeeded, since public cellular networks have fulfilled the need better.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== DECT Features ==&lt;br /&gt;
&lt;br /&gt;
Common features of the DECT Standard include:[http://einstein.informatik.uni-oldenburg.de/rechnernetze/dect.htm 2]&lt;br /&gt;
&lt;br /&gt;
*Flexible bandwidth&lt;br /&gt;
*High subscriber densities&lt;br /&gt;
*Interoperability&lt;br /&gt;
*Mobility&lt;br /&gt;
*High Quality Voice&lt;br /&gt;
*Robust self organizing real time radio channel selection&lt;br /&gt;
*Cost efficiency&lt;br /&gt;
*High level of security&lt;br /&gt;
*Coexistence&lt;br /&gt;
*Standard interworking profiles&lt;br /&gt;
*Multiple access rights&lt;br /&gt;
*Seamless handover&lt;br /&gt;
*Multi-mode terminals&lt;br /&gt;
*Extended battery talk time&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Digital Radio Techniques ===&lt;br /&gt;
&lt;br /&gt;
The DECT standard allows for the proficient use of the radio spectrum through several advanced digital radio techniques. Delivering low risk of radio interference and low power technology, the DECT standard still ensures high speech quality and security. &lt;br /&gt;
DECT digital radio techniques include: &lt;br /&gt;
&lt;br /&gt;
*'''TDMA (Time Division Multiple Access)''' radio access – low radio interference and high system capacity; is capable of handling up to 100'000 users per km² floor space in an office.&lt;br /&gt;
*'''ADPCM (Adaptive Differential Pulse Code Modulation)''' speech encoding – ensures that DECT phones have very high speech quality, which is similar to wireline telephony&lt;br /&gt;
*'''DCS/DCA (Dynamic Channel Selection / Allocation)''' is a unique DECT capability that guarantees that the best radio channels available are used; For example, this happens when a cordless phone is in standby mode as well as throughout the call; this feature also ensures that DECT telephony can coexist with other DECT applications, and with other systems in the same frequency, with high-quality, robust and secure communications for end-users &lt;br /&gt;
*'''Some other features''' - Encryption for maximum call security and optimized radio transmission for maximum battery life.&lt;br /&gt;
&lt;br /&gt;
DECT basic technology and the various profiles enhance the DECT standard, introducing evolutionary applications and services. The GAP profile, for example, ensures interoperability of equipment from different providers for voice applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Technical Details ==&lt;br /&gt;
&lt;br /&gt;
Some DECT properties:[http://en.wikipedia.org/wiki/DECT 1]&lt;br /&gt;
&lt;br /&gt;
* Audio codec: G.726&lt;br /&gt;
* Net bit rate: 32 kbit/s&lt;br /&gt;
* Frequency: 1880 MHz–1900 MHz in Europe, 1900 MHz-1920 MHz in China, 1910 MHz-1930 MHz in Latin America and 1920 MHz–1930 MHz in the US&lt;br /&gt;
* Carriers: 10 (1,728 kHz spacing) in Europe, 5 (1,728 kHz spacing) in the US&lt;br /&gt;
* Time slots: 2 x 12 (up and down stream)&lt;br /&gt;
* Channel allocation: dynamic&lt;br /&gt;
* Average transmission power: 10 mW (250 mW peak) in Europe, 4 mW (100 mW peak) in the US&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The table below shows some of the important layers of the DECT standard:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;5&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|+ '''Parts 1 to 8 of the DECT CI standard ETS 300 175'''  [http://einstein.informatik.uni-oldenburg.de/rechnernetze/seite24.htm 4]&lt;br /&gt;
!'''Title'''&lt;br /&gt;
!'''Description'''&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!1. Overview&lt;br /&gt;
!General introduction to the other parts of ETS 300 175&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!2. Physical Layer&lt;br /&gt;
!Radio requirements of DECT, e.g. carrier frequency allocation, modulation method, transmission frame structure, transmitted power limits, spurious emission requirements etc.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!3. Medium Access Control Layer&lt;br /&gt;
!Description of procedures, messages, and protocols for radio resource man-cess Control agement i.e. link set-up, channel selection, handover, link release and link layer quality maintenance etc.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!4. Data Link&lt;br /&gt;
!Description of provisions to secure a reliable data link to the network layer Control layer.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!5. Network layer &lt;br /&gt;
!Description of the signalling layer with call control and mobility management functions and protocols.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!6. Identities and Adressing&lt;br /&gt;
!Description of the portable and fixed part identities requirements for all Addressing DECT application environments.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!7. Security aspects&lt;br /&gt;
!Procedures to prevent eavesdropping, unauthorised access and fraudulent use.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!8. Telephony&lt;br /&gt;
!Telephony requirements for systems supporting the 3.1 kHz speech service to ensure proper interworking with public telecommunications networks. De-fines transmission levels, loudness ratings, sidetone levels, frequency re-sponse, echo control requirements etc.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== DECT Technologies ==&lt;br /&gt;
&lt;br /&gt;
=== DECT 6.0 === &lt;br /&gt;
&lt;br /&gt;
DECT devices that are made in the U.S are termed '''DECT 6.0''' to distinguish them from other DECT devices. Some other U.S cordless devices operate in the 900 MHz, 2.4GHz and 5.8GHz bands. DECT 6.0 is not a spectrum band reference but rather a marketing term coined when DECT was accepted in the U.S. The term 6.0 GHz is actually incorrect for DECT 6.0 because it operates at 1.9 GHz. DECT 1.9 may have confused customers because they associate a larger number with a better or later product. [http://en.wikipedia.org/wiki/DECT 1]&lt;br /&gt;
&lt;br /&gt;
=== DECT Data Networks ===&lt;br /&gt;
&lt;br /&gt;
There are other possibilities that exist with the DECT standard, particularly the DPRS (DECT Packet Radio Services). It allows DECT to be a wireless LAN and wireless internet access service. It has good range of up to 200 m indoors and 6 km using directional antennae outdoors. It also has a dedicated spectrum, high interference immunity, open interoperability and data speeds of around 500 kbit/s. At one time DECT appeared to be a superior alternative to Wi-Fi. &lt;br /&gt;
&lt;br /&gt;
The timing of the availability of DECT, in the mid 1990s, was too early to find wide application for wireless data outside niche industrial applications. While providers of Wi-Fi struggled with the same problems, providers of DECT went back to the more immediately successful market for cordless telephones. When mass applications for wireless Internet emerged, and the U.S. opened up to DECT, well into the new century, the industry had moved far ahead in terms of performance and DECT's time as a wireless data transport was past.&lt;br /&gt;
&lt;br /&gt;
The failure of DECT as a data protocol became a strength when DECT 6.0 phones finally appeared in the U.S. in late 2005. By then, the ISM bands had become crowded in the U.S., especially the 2.4 GHz band. However, since Wi-Fi doesn't operate in the UPCS band and DECT devices negotiate with each other for the available spectrum, not only are DECT 6.0 phones immune from this type of interference, their operation does not impair other nearby devices operating on the same frequency, which is a common issue with 2.4 GHz cordless phones.[http://en.wikipedia.org/wiki/DECT 1]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== The New Generation of DECT ===&lt;br /&gt;
&lt;br /&gt;
Due to its ability to integrate multimedia applications – such as voice, data, internet services and multi-operator services, DECT is in prime position to be utilized in the newest technologies. &lt;br /&gt;
The newest features available include the following:&lt;br /&gt;
&lt;br /&gt;
*Video telephony capability&lt;br /&gt;
*Plug &amp;amp; Play functionality of all components&lt;br /&gt;
*Automatic device detection and configuration.&lt;br /&gt;
*Superior voice quality better than any existing (Wideband Speech)&lt;br /&gt;
*Support of Broadband Data and Audio Streaming&lt;br /&gt;
*Streaming CD Quality Audio Content&lt;br /&gt;
*Home Monitoring, Door phone, Baby monitor, Mailbox&lt;br /&gt;
&lt;br /&gt;
These new specifications first became available in March 2007, following the publication of an Overview Report. Themes of other publications related to New Generation DECT include Wideband speech, Extended Wideband speech services and IP Packet data.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Comparison to Other Technologies ==&lt;br /&gt;
&lt;br /&gt;
The following is a graph that shows DECT in comparison to other wireless technologies in terms of Bit rate vs. distance:&lt;br /&gt;
&lt;br /&gt;
[[Image:Dect_wireless.gif|thumb|center|600px|Comparison of DECT to other wireless technologies [http://einstein.informatik.uni-oldenburg.de/rechnernetze/dect.htm 2]]]&lt;br /&gt;
&lt;br /&gt;
The following is a table comparing various features of DECT to other wireless technologies:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;5&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|+ '''Comparison of wireless technologies'''  [http://www.deviceforge.com/news/NS9790688989.html?regen=yes&amp;amp;display=yes 3]&lt;br /&gt;
!'''Feature'''&lt;br /&gt;
!'''Home RF'''&lt;br /&gt;
!'''802.11a'''	&lt;br /&gt;
!'''802.11b'''&lt;br /&gt;
!'''Bluetooth'''&lt;br /&gt;
!'''DECT'''&lt;br /&gt;
!'''IrDA'''&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!Technology	&lt;br /&gt;
!Radio	&lt;br /&gt;
!Radio&lt;br /&gt;
!Radio&lt;br /&gt;
!Radio&lt;br /&gt;
!Radio&lt;br /&gt;
!Optical&lt;br /&gt;
|-&lt;br /&gt;
						&lt;br /&gt;
|+&lt;br /&gt;
!Frequency&lt;br /&gt;
!2.4 GHz	&lt;br /&gt;
!5 GHz&lt;br /&gt;
!2.4 GHz&lt;br /&gt;
!2.4 GHz&lt;br /&gt;
!1.9 GHz&lt;br /&gt;
!850 nm&lt;br /&gt;
|-&lt;br /&gt;
						&lt;br /&gt;
|+&lt;br /&gt;
!Basic data rate bits/sec&lt;br /&gt;
!0.8/1.6 M	&lt;br /&gt;
!54 M&lt;br /&gt;
!11 M&lt;br /&gt;
!1 M&lt;br /&gt;
!552 K&lt;br /&gt;
!4 M/115 K&lt;br /&gt;
|-&lt;br /&gt;
						&lt;br /&gt;
|+&lt;br /&gt;
!Range, meters&lt;br /&gt;
!50	&lt;br /&gt;
!150&lt;br /&gt;
!30&lt;br /&gt;
!10&lt;br /&gt;
!300&lt;br /&gt;
!3&lt;br /&gt;
|-&lt;br /&gt;
						&lt;br /&gt;
|+&lt;br /&gt;
!Max terminals&lt;br /&gt;
!128&lt;br /&gt;
!128+&lt;br /&gt;
!128&lt;br /&gt;
!8&lt;br /&gt;
!12&lt;br /&gt;
!10&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
#DECT: [http://en.wikipedia.org/wiki/DECT Wikipedia] Digital Enhanced Cordless Telecommunications  &lt;br /&gt;
#Prof. Dr. W. Kowalk (2007-03-13). [http://einstein.informatik.uni-oldenburg.de/rechnernetze/dect.htm Rechnernetze – DECT] An introduction to DECT.&lt;br /&gt;
#DECT wireless telephony arrives in the US: [http://www.deviceforge.com/news/NS9790688989.html?regen=yes&amp;amp;display=yes deviceforge.com]&lt;br /&gt;
#Prof. Dr. W. Kowalk (2007-03-13). [http://einstein.informatik.uni-oldenburg.de/rechnernetze/seite24.htm Rechnernetze – The DECT Standard] An introduction to DECT standardization.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
* [[Cell BE - A Network on a Chip]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Internet Control Message Protocol]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Denial Of Service Attacks]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Wi-Fi]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Cryptography in Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Tools for Conducting Denial Of Service Attacks ]]&lt;br /&gt;
* [[Hypertext Transfer Protocol over Secure Socket Layer (HTTPS)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Bluetooth]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[The practicality of IPv6]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Dynamic Host Configuration Protocol (DHCP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Social Network Service ]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Keystroke Logging: Are You Next]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Latency]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Onion Routing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[Radio Frequency Identification (RFID)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[3G Communications]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Security in Smartphones]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Credit Card Chip Security and Technology]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Address Resolution Protocol (ARP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[How to Connect to the Internet via an ISP]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[CAPTCHA]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Security for Small Home Networks]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Rootkits]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Proxy Server]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Firewall]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Steganography and Digital Watermarking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Malware]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Peer-to-Peer Network Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[High-Speed Downlink Packet Access (HSDPA)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Man in the Middle Attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Attached Storage]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[RSA Encryption Algorithm]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Corporate Security and IT Policies]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Ethical Hacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Extensible Messaging and Presence Protocol (XMPP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Cloud Computing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Ethernet Routing Devices]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Personal Data Protection and Privacy]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Public Key Authentication]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[AJAX Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Network Topology]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[IP Spoofing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[WLAN Standard 802.11n]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Domain Name System]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Web 2.0]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Local Area Network]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Bots &amp;amp; Botnets]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Trivial File Transfer Protocol]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Load Balancing for Network Servers]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Simple Mail Transfer Protocol (SMTP)]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Email Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Data Encryption for Storage Devices]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Statistics of Internet Threats]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[VoIP]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Deep Packet Inspection]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Fingerprint Authentication]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[Multicasting]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[MD5 Rainbow Tables]]&amp;lt;BR&amp;gt;&lt;br /&gt;
* [[The Interplanetary Internet]]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/DECT Wikipedia: DECT]&lt;br /&gt;
*[http://www.etsi.org/WebSite/Technologies/DECT.aspx DECT information at ETSI]&lt;br /&gt;
*[http://www.dect.org/content.aspx?id=18 DECT Forum at dect.org]&lt;br /&gt;
*[http://www.deviceforge.com/news/NS9790688989.html?regen=yes&amp;amp;display=yes DECT on deviceforge.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Colbyl2|Colbyl2]] 17:32, 8 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Colbyl2</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)</id>
		<title>Digital Enhanced Cordless Telecommunications (DECT)</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)"/>
				<updated>2009-04-13T01:21:59Z</updated>
		
		<summary type="html">&lt;p&gt;Colbyl2:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Panasonic_handset.jpg|thumb|right|The base unit and handset of a Panasonic DECT cordless telephone]]&lt;br /&gt;
'''DECT''' or '''Digital Enhanced Cordless Telecommunications''' is a radio standard for short-range cordless communications. It is commonly used for domestic or corporate purposes. It is suited to voice, data and networking applications with a range of up to 500 metres.&lt;br /&gt;
&lt;br /&gt;
DECT was developed by the European Telecommunications Standards Institute (ETSI); an independent, non-profit, standardization organization in the telecommunications industry in Europe. Although DECT was developed by ETSI it has since been adopted by many countries all over the world.&lt;br /&gt;
&lt;br /&gt;
While the original DECT frequency band is 1880 MHz - 1900 MHz, the frequency allocation has changed in some countries like the United States so that DECT devices can be sold there. Since these channels are reserved exclusively for voice communication applications, they are much less likely to experience interference from other wireless devices such as wireless networks or baby monitors. DECT devices are therefore known as being ''interference free''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Applications ==&lt;br /&gt;
[[Image:Dect_solutions.jpg|thumb|right|400px|DECT wireless technology targets homes, businesses, industry and public areas [http://www.deviceforge.com/news/NS9790688989.html?regen=yes&amp;amp;display=yes 2]]]&lt;br /&gt;
&lt;br /&gt;
DECT has numerous applications and services. The range of DECT applications are listed below:&lt;br /&gt;
&lt;br /&gt;
*Residential&lt;br /&gt;
*Public Switched Telephone Network (PSTN) access&lt;br /&gt;
*Integrated Services Digital Network (ISDN) access&lt;br /&gt;
*Wireless Private Branch Exchange (PABX)&lt;br /&gt;
*Global System for Mobile communications (GSM) access&lt;br /&gt;
*Wireless Local Loop&lt;br /&gt;
*Cordless Terminal Mobility (CTM)&lt;br /&gt;
*Local Area Network access supporting voice telephony, fax, modem, E-mail, Internet, X.25 and many other services&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The DECT standard originally envisaged three major areas of application:[http://en.wikipedia.org/wiki/DECT]&lt;br /&gt;
&lt;br /&gt;
# domestic cordless telephony, using a single base station to connect one or more handsets to the public telecoms network, which is now available&lt;br /&gt;
# enterprise premises cordless PABXs and wireless LANs, using many base stations for coverage. Calls continue as users move between different coverage cells, through a mechanism called handover. Traffic both within the system and to the public telecoms network&lt;br /&gt;
# public access, using large numbers of base stations to provide building or urban area coverage as part of a public telecoms network.&lt;br /&gt;
&lt;br /&gt;
The domestic application, or cordless home telephones, has been very successful. The enterprise PABX market has had some success, but the public access application has not succeeded, since public cellular networks have fulfilled the need better.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== DECT Features ==&lt;br /&gt;
&lt;br /&gt;
Common features of the DECT Standard include:[http://einstein.informatik.uni-oldenburg.de/rechnernetze/dect.htm 3]&lt;br /&gt;
&lt;br /&gt;
*Flexible bandwidth&lt;br /&gt;
*High subscriber densities&lt;br /&gt;
*Interoperability&lt;br /&gt;
*Mobility&lt;br /&gt;
*High Quality Voice&lt;br /&gt;
*Robust self organizing real time radio channel selection&lt;br /&gt;
*Cost efficiency&lt;br /&gt;
*High level of security&lt;br /&gt;
*Coexistence&lt;br /&gt;
*Standard interworking profiles&lt;br /&gt;
*Multiple access rights&lt;br /&gt;
*Seamless handover&lt;br /&gt;
*Multi-mode terminals&lt;br /&gt;
*Extended battery talk time&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Digital Radio Techniques ===&lt;br /&gt;
&lt;br /&gt;
The DECT standard allows for the proficient use of the radio spectrum through several advanced digital radio techniques. Delivering low risk of radio interference and low power technology, the DECT standard still ensures high speech quality and security. &lt;br /&gt;
DECT digital radio techniques include: &lt;br /&gt;
&lt;br /&gt;
*'''TDMA (Time Division Multiple Access)''' radio access – low radio interference and high system capacity; is capable of handling up to 100'000 users per km² floor space in an office.&lt;br /&gt;
*'''ADPCM (Adaptive Differential Pulse Code Modulation)''' speech encoding – ensures that DECT phones have very high speech quality, which is similar to wireline telephony&lt;br /&gt;
*'''DCS/DCA (Dynamic Channel Selection / Allocation)''' is a unique DECT capability that guarantees that the best radio channels available are used; For example, this happens when a cordless phone is in standby mode as well as throughout the call; this feature also ensures that DECT telephony can coexist with other DECT applications, and with other systems in the same frequency, with high-quality, robust and secure communications for end-users &lt;br /&gt;
*'''Some other features''' - Encryption for maximum call security and optimized radio transmission for maximum battery life.&lt;br /&gt;
&lt;br /&gt;
DECT basic technology and the various profiles enhance the DECT standard, introducing evolutionary applications and services. The GAP profile, for example, ensures interoperability of equipment from different providers for voice applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Technical Details ==&lt;br /&gt;
&lt;br /&gt;
Some DECT properties:[http://en.wikipedia.org/wiki/DECT 4]&lt;br /&gt;
&lt;br /&gt;
* Audio codec: G.726&lt;br /&gt;
* Net bit rate: 32 kbit/s&lt;br /&gt;
* Frequency: 1880 MHz–1900 MHz in Europe, 1900 MHz-1920 MHz in China, 1910 MHz-1930 MHz in Latin America and 1920 MHz–1930 MHz in the US&lt;br /&gt;
* Carriers: 10 (1,728 kHz spacing) in Europe, 5 (1,728 kHz spacing) in the US&lt;br /&gt;
* Time slots: 2 x 12 (up and down stream)&lt;br /&gt;
* Channel allocation: dynamic&lt;br /&gt;
* Average transmission power: 10 mW (250 mW peak) in Europe, 4 mW (100 mW peak) in the US&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The table below shows some of the important layers of the DECT standard:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;5&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|+ '''Parts 1 to 8 of the DECT CI standard ETS 300 175'''  [http://einstein.informatik.uni-oldenburg.de/rechnernetze/seite24.htm 5]&lt;br /&gt;
!'''Title'''&lt;br /&gt;
!'''Description'''&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!1. Overview&lt;br /&gt;
!General introduction to the other parts of ETS 300 175&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!2. Physical Layer&lt;br /&gt;
!Radio requirements of DECT, e.g. carrier frequency allocation, modulation method, transmission frame structure, transmitted power limits, spurious emission requirements etc.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!3. Medium Access Control Layer&lt;br /&gt;
!Description of procedures, messages, and protocols for radio resource man-cess Control agement i.e. link set-up, channel selection, handover, link release and link layer quality maintenance etc.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!4. Data Link&lt;br /&gt;
!Description of provisions to secure a reliable data link to the network layer Control layer.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!5. Network layer &lt;br /&gt;
!Description of the signalling layer with call control and mobility management functions and protocols.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!6. Identities and Adressing&lt;br /&gt;
!Description of the portable and fixed part identities requirements for all Addressing DECT application environments.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!7. Security aspects&lt;br /&gt;
!Procedures to prevent eavesdropping, unauthorised access and fraudulent use.&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!8. Telephony&lt;br /&gt;
!Telephony requirements for systems supporting the 3.1 kHz speech service to ensure proper interworking with public telecommunications networks. De-fines transmission levels, loudness ratings, sidetone levels, frequency re-sponse, echo control requirements etc.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== DECT Technologies ==&lt;br /&gt;
&lt;br /&gt;
=== DECT 6.0 === &lt;br /&gt;
&lt;br /&gt;
DECT devices that are made in the U.S are termed '''DECT 6.0''' to distinguish them from other DECT devices. Some other U.S cordless devices operate in the 900 MHz, 2.4GHz and 5.8GHz bands. DECT 6.0 is not a spectrum band reference but rather a marketing term coined when DECT was accepted in the U.S. The term 6.0 GHz is actually incorrect for DECT 6.0 because it operates at 1.9 GHz. DECT 1.9 may have confused customers because they associate a larger number with a better or later product. [http://en.wikipedia.org/wiki/DECT 6]&lt;br /&gt;
&lt;br /&gt;
=== DECT Data Networks ===&lt;br /&gt;
&lt;br /&gt;
There are other possibilities that exist with the DECT standard, particularly the DPRS (DECT Packet Radio Services). It allows DECT to be a wireless LAN and wireless internet access service. It has good range of up to 200 m indoors and 6 km using directional antennae outdoors. It also has a dedicated spectrum, high interference immunity, open interoperability and data speeds of around 500 kbit/s. At one time DECT appeared to be a superior alternative to Wi-Fi. &lt;br /&gt;
&lt;br /&gt;
The timing of the availability of DECT, in the mid 1990s, was too early to find wide application for wireless data outside niche industrial applications. While providers of Wi-Fi struggled with the same problems, providers of DECT went back to the more immediately successful market for cordless telephones. When mass applications for wireless Internet emerged, and the U.S. opened up to DECT, well into the new century, the industry had moved far ahead in terms of performance and DECT's time as a wireless data transport was past.&lt;br /&gt;
&lt;br /&gt;
The failure of DECT as a data protocol became a strength when DECT 6.0 phones finally appeared in the U.S. in late 2005. By then, the ISM bands had become crowded in the U.S., especially the 2.4 GHz band. However, since Wi-Fi doesn't operate in the UPCS band and DECT devices negotiate with each other for the available spectrum, not only are DECT 6.0 phones immune from this type of interference, their operation does not impair other nearby devices operating on the same frequency, which is a common issue with 2.4 GHz cordless phones.[http://en.wikipedia.org/wiki/DECT 6]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== The New Generation of DECT ===&lt;br /&gt;
&lt;br /&gt;
Due to its ability to integrate multimedia applications – such as voice, data, internet services and multi-operator services, DECT is in prime position to be utilized in the newest technologies. &lt;br /&gt;
The newest features available include the following:&lt;br /&gt;
&lt;br /&gt;
*Video telephony capability&lt;br /&gt;
*Plug &amp;amp; Play functionality of all components&lt;br /&gt;
*Automatic device detection and configuration.&lt;br /&gt;
*Superior voice quality better than any existing (Wideband Speech)&lt;br /&gt;
*Support of Broadband Data and Audio Streaming&lt;br /&gt;
*Streaming CD Quality Audio Content&lt;br /&gt;
*Home Monitoring, Door phone, Baby monitor, Mailbox&lt;br /&gt;
&lt;br /&gt;
These new specifications first became available in March 2007, following the publication of an Overview Report. Themes of other publications related to New Generation DECT include Wideband speech, Extended Wideband speech services and IP Packet data.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Comparison to Other Technologies ==&lt;br /&gt;
&lt;br /&gt;
The following is a graph that shows DECT in comparison to other wireless technologies in terms of Bit rate vs. distance:&lt;br /&gt;
&lt;br /&gt;
[[Image:Dect_wireless.gif|thumb|center|600px|Comparison of DECT to other wireless technologies [http://einstein.informatik.uni-oldenburg.de/rechnernetze/dect.htm 6]]]&lt;br /&gt;
&lt;br /&gt;
The following is a table comparing various features of DECT to other wireless technologies:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;5&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|+ '''Comparison of wireless technologies'''  [http://www.deviceforge.com/news/NS9790688989.html?regen=yes&amp;amp;display=yes 5]&lt;br /&gt;
!'''Feature'''&lt;br /&gt;
!'''Home RF'''&lt;br /&gt;
!'''802.11a'''	&lt;br /&gt;
!'''802.11b'''&lt;br /&gt;
!'''Bluetooth'''&lt;br /&gt;
!'''DECT'''&lt;br /&gt;
!'''IrDA'''&lt;br /&gt;
|-&lt;br /&gt;
|+&lt;br /&gt;
!Technology	&lt;br /&gt;
!Radio	&lt;br /&gt;
!Radio&lt;br /&gt;
!Radio&lt;br /&gt;
!Radio&lt;br /&gt;
!Radio&lt;br /&gt;
!Optical&lt;br /&gt;
|-&lt;br /&gt;
						&lt;br /&gt;
|+&lt;br /&gt;
!Frequency&lt;br /&gt;
!2.4 GHz	&lt;br /&gt;
!5 GHz&lt;br /&gt;
!2.4 GHz&lt;br /&gt;
!2.4 GHz&lt;br /&gt;
!1.9 GHz&lt;br /&gt;
!850 nm&lt;br /&gt;
|-&lt;br /&gt;
						&lt;br /&gt;
|+&lt;br /&gt;
!Basic data rate bits/sec&lt;br /&gt;
!0.8/1.6 M	&lt;br /&gt;
!54 M&lt;br /&gt;
!11 M&lt;br /&gt;
!1 M&lt;br /&gt;
!552 K&lt;br /&gt;
!4 M/115 K&lt;br /&gt;
|-&lt;br /&gt;
						&lt;br /&gt;
|+&lt;br /&gt;
!Range, meters&lt;br /&gt;
!50	&lt;br /&gt;
!150&lt;br /&gt;
!30&lt;br /&gt;
!10&lt;br /&gt;
!300&lt;br /&gt;
!3&lt;br /&gt;
|-&lt;br /&gt;
						&lt;br /&gt;
|+&lt;br /&gt;
!Max terminals&lt;br /&gt;
!128&lt;br /&gt;
!128+&lt;br /&gt;
!128&lt;br /&gt;
!8&lt;br /&gt;
!12&lt;br /&gt;
!10&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
# Prof. Dr. W. Kowalk (2007-03-13). [http://einstein.informatik.uni-oldenburg.de/rechnernetze/dect.htm Rechnernetze – DECT] Retrieved on 2009-04-09. An introduction to DECT.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/DECT Wikipedia: DECT]&lt;br /&gt;
*[http://www.etsi.org/WebSite/Technologies/DECT.aspx DECT information at ETSI]&lt;br /&gt;
*[http://www.dect.org/content.aspx?id=18 DECT Forum at dect.org]&lt;br /&gt;
*[http://www.deviceforge.com/news/NS9790688989.html?regen=yes&amp;amp;display=yes DECT on deviceforge.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Colbyl2|Colbyl2]] 17:32, 8 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Colbyl2</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)</id>
		<title>Digital Enhanced Cordless Telecommunications (DECT)</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)"/>
				<updated>2009-04-12T22:37:33Z</updated>
		
		<summary type="html">&lt;p&gt;Colbyl2:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Panasonic_handset.jpg|thumb|right|The base unit and handset of a Panasonic DECT cordless telephone]]&lt;br /&gt;
'''DECT''' or '''Digital Enhanced Cordless Telecommunications''' is a radio standard for short-range cordless communications. It is commonly used for domestic or corporate purposes. It is suited to voice, data and networking applications with a range of up to 500 metres.&lt;br /&gt;
&lt;br /&gt;
DECT was developed by the European Telecommunications Standards Institute (ETSI); an independent, non-profit, standardization organization in the telecommunications industry in Europe. Although DECT was developed by ETSI it has since been adopted by many countries all over the world.&lt;br /&gt;
&lt;br /&gt;
While the original DECT frequency band is 1880 MHz - 1900 MHz, the frequency allocation has changed in some countries like the United States so that DECT devices can be sold there. Since these channels are reserved exclusively for voice communication applications, they are much less likely to experience interference from other wireless devices such as wireless networks or baby monitors. DECT devices are therefore known as being ''interference free''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Applications ==&lt;br /&gt;
[[Image:Dect_solutions.jpg|thumb|right|400px|DECT wireless technology targets homes, businesses, industry and public areas [http://www.deviceforge.com/news/NS9790688989.html?regen=yes&amp;amp;display=yes 2]]]&lt;br /&gt;
&lt;br /&gt;
DECT has numerous applications and services. The range of DECT applications are listed below:&lt;br /&gt;
&lt;br /&gt;
*Residential&lt;br /&gt;
*Public Switched Telephone Network (PSTN) access&lt;br /&gt;
*Integrated Services Digital Network (ISDN) access&lt;br /&gt;
*Wireless Private Branch Exchange (PABX)&lt;br /&gt;
*Global System for Mobile communications (GSM) access&lt;br /&gt;
*Wireless Local Loop&lt;br /&gt;
*Cordless Terminal Mobility (CTM)&lt;br /&gt;
*Local Area Network access supporting voice telephony, fax, modem, E-mail, Internet, X.25 and many other services&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The DECT standard originally envisaged three major areas of application:[http://en.wikipedia.org/wiki/DECT]&lt;br /&gt;
&lt;br /&gt;
# domestic cordless telephony, using a single base station to connect one or more handsets to the public telecoms network, which is now available&lt;br /&gt;
# enterprise premises cordless PABXs and wireless LANs, using many base stations for coverage. Calls continue as users move between different coverage cells, through a mechanism called handover. Traffic both within the system and to the public telecoms network&lt;br /&gt;
# public access, using large numbers of base stations to provide building or urban area coverage as part of a public telecoms network.&lt;br /&gt;
&lt;br /&gt;
The domestic application, or cordless home telephones, has been very successful. The enterprise PABX market has had some success, but the public access application has not succeeded, since public cellular networks have fulfilled the need better.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== DECT Features ==&lt;br /&gt;
&lt;br /&gt;
The DECT standard allows for the proficient use of the radio spectrum through several advanced digital radio techniques. Delivering low risk of radio interference and low power technology, the DECT standard still ensures high speech quality and security. &lt;br /&gt;
DECT Features include: &lt;br /&gt;
&lt;br /&gt;
*'''TDMA (Time Division Multiple Access)''' radio access – low radio interference and high system capacity; is capable of handling up to 100'000 users per km² floor space in an office.&lt;br /&gt;
*'''ADPCM (Adaptive Differential Pulse Code Modulation)''' speech encoding – ensures that DECT phones have very high speech quality, which is similar to wireline telephony&lt;br /&gt;
*'''DCS/DCA (Dynamic Channel Selection / Allocation)''' is a unique DECT capability that guarantees that the best radio channels available are used; For example, this happens when a cordless phone is in standby mode as well as throughout the call; this feature also ensures that DECT telephony can coexist with other DECT applications, and with other systems in the same frequency, with high-quality, robust and secure communications for end-users &lt;br /&gt;
*'''Some other features''' - Encryption for maximum call security and optimized radio transmission for maximum battery life.&lt;br /&gt;
&lt;br /&gt;
DECT basic technology and the various profiles enhance the DECT standard, introducing evolutionary applications and services. The GAP profile, for example, ensures interoperability of equipment from different providers for voice applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Technical Details ==&lt;br /&gt;
[[Image:Dect_wireless.gif|thumb|center|600px|Comparison of DECT to other wireless technologies [http://einstein.informatik.uni-oldenburg.de/rechnernetze/dect.htm 3]]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== DECT Technologies ==&lt;br /&gt;
&lt;br /&gt;
=== DECT 6.0 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== DECT Data Networks ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== VoIP/IP-DECT ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== The New Generation of DECT ===&lt;br /&gt;
&lt;br /&gt;
Due to its ability to integrate multimedia applications – such as voice, data, internet services and multi-operator services, DECT is in prime position to be utilized in the newest technologies. &lt;br /&gt;
The newest features available include the following:&lt;br /&gt;
&lt;br /&gt;
*Video telephony capability&lt;br /&gt;
*Plug &amp;amp; Play functionality of all components&lt;br /&gt;
*Automatic device detection and configuration.&lt;br /&gt;
*Superior voice quality better than any existing (Wideband Speech)&lt;br /&gt;
*Support of Broadband Data and Audio Streaming&lt;br /&gt;
*Streaming CD Quality Audio Content&lt;br /&gt;
*Home Monitoring, Door phone, Baby monitor, Mailbox&lt;br /&gt;
&lt;br /&gt;
These new specifications first became available in March 2007, following the publication of an Overview Report. Themes of other publications related to New Generation DECT include Wideband speech, Extended Wideband speech services and IP Packet data.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
# Prof. Dr. W. Kowalk (2007-03-13). [http://einstein.informatik.uni-oldenburg.de/rechnernetze/dect.htm Rechnernetze – DECT] Retrieved on 2009-04-09. An introduction to DECT.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/DECT Wikipedia: DECT]&lt;br /&gt;
*[http://www.etsi.org/WebSite/Technologies/DECT.aspx DECT information at ETSI]&lt;br /&gt;
*[http://www.dect.org/content.aspx?id=18 DECT Forum at dect.org]&lt;br /&gt;
*[http://www.deviceforge.com/news/NS9790688989.html?regen=yes&amp;amp;display=yes DECT on deviceforge.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Colbyl2|Colbyl2]] 17:32, 8 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Colbyl2</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Dect_solutions.jpg</id>
		<title>File:Dect solutions.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Dect_solutions.jpg"/>
				<updated>2009-04-12T21:59:50Z</updated>
		
		<summary type="html">&lt;p&gt;Colbyl2:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Colbyl2</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)</id>
		<title>Digital Enhanced Cordless Telecommunications (DECT)</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)"/>
				<updated>2009-04-12T21:58:30Z</updated>
		
		<summary type="html">&lt;p&gt;Colbyl2:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Panasonic_handset.jpg|thumb|right|The base unit and handset of a Panasonic DECT cordless telephone]]&lt;br /&gt;
'''DECT''' or '''Digital Enhanced Cordless Telecommunications''' is a radio standard for short-range cordless communications. It is commonly used for domestic or corporate purposes. It is suited to voice, data and networking applications with a range of up to 500 metres.&lt;br /&gt;
&lt;br /&gt;
DECT was developed by the European Telecommunications Standards Institute (ETSI); an independent, non-profit, standardization organization in the telecommunications industry in Europe. Although DECT was developed by ETSI it has since been adopted by many countries all over the world.&lt;br /&gt;
&lt;br /&gt;
While the original DECT frequency band is 1880 MHz - 1900 MHz, the frequency allocation has changed in some countries like the United States so that DECT devices can be sold there. Since these channels are reserved exclusively for voice communication applications, they are much less likely to experience interference from other wireless devices such as wireless networks or baby monitors. DECT devices are therefore known as being ''interference free''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Applications ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== DECT Features ==&lt;br /&gt;
&lt;br /&gt;
The DECT standard allows for the proficient use of the radio spectrum through several advanced digital radio techniques. Delivering low risk of radio interference and low power technology, the DECT standard still ensures high speech quality and security. &lt;br /&gt;
DECT Features include: &lt;br /&gt;
&lt;br /&gt;
*'''TDMA (Time Division Multiple Access)''' radio access – low radio interference and high system capacity; is capable of handling up to 100'000 users per km² floor space in an office.&lt;br /&gt;
*'''ADPCM (Adaptive Differential Pulse Code Modulation)''' speech encoding – ensures that DECT phones have very high speech quality, which is similar to wireline telephony&lt;br /&gt;
*'''DCS/DCA (Dynamic Channel Selection / Allocation)''' is a unique DECT capability that guarantees that the best radio channels available are used; For example, this happens when a cordless phone is in standby mode as well as throughout the call; this feature also ensures that DECT telephony can coexist with other DECT applications, and with other systems in the same frequency, with high-quality, robust and secure communications for end-users &lt;br /&gt;
*'''Some other features''' - Encryption for maximum call security and optimized radio transmission for maximum battery life.&lt;br /&gt;
&lt;br /&gt;
DECT basic technology and the various profiles enhance the DECT standard, introducing evolutionary applications and services. The GAP profile, for example, ensures interoperability of equipment from different providers for voice applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Technical Details ==&lt;br /&gt;
[[Image:Dect_wireless.gif|thumb|center|600px|Comparison of DECT to other wireless technologies [http://einstein.informatik.uni-oldenburg.de/rechnernetze/dect.htm]]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== DECT Technologies ==&lt;br /&gt;
&lt;br /&gt;
=== DECT 6.0 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== DECT Data Networks ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== VoIP/IP-DECT ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== The New Generation of DECT ===&lt;br /&gt;
&lt;br /&gt;
Due to its ability to integrate multimedia applications – such as voice, data, internet services and multi-operator services, DECT is in prime position to be utilized in the newest technologies. &lt;br /&gt;
The newest features available include the following:&lt;br /&gt;
&lt;br /&gt;
*Video telephony capability&lt;br /&gt;
*Plug &amp;amp; Play functionality of all components&lt;br /&gt;
*Automatic device detection and configuration.&lt;br /&gt;
*Superior voice quality better than any existing (Wideband Speech)&lt;br /&gt;
*Support of Broadband Data and Audio Streaming&lt;br /&gt;
*Streaming CD Quality Audio Content&lt;br /&gt;
*Home Monitoring, Door phone, Baby monitor, Mailbox&lt;br /&gt;
&lt;br /&gt;
These new specifications first became available in March 2007, following the publication of an Overview Report. Themes of other publications related to New Generation DECT include Wideband speech, Extended Wideband speech services and IP Packet data.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
# Prof. Dr. W. Kowalk (2007-03-13). [http://einstein.informatik.uni-oldenburg.de/rechnernetze/dect.htm Rechnernetze – DECT] Retrieved on 2009-04-09. An introduction to DECT.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/DECT Wikipedia: DECT]&lt;br /&gt;
*[http://www.etsi.org/WebSite/Technologies/DECT.aspx DECT information at ETSI]&lt;br /&gt;
*[http://www.dect.org/content.aspx?id=18 DECT Forum at dect.org]&lt;br /&gt;
*[http://www.deviceforge.com/news/NS9790688989.html?regen=yes&amp;amp;display=yes DECT on deviceforge.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Colbyl2|Colbyl2]] 17:32, 8 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Colbyl2</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)</id>
		<title>Digital Enhanced Cordless Telecommunications (DECT)</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)"/>
				<updated>2009-04-12T21:26:34Z</updated>
		
		<summary type="html">&lt;p&gt;Colbyl2:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Panasonic_handset.jpg|thumb|right|The base unit and handset of a Panasonic DECT cordless telephone]]&lt;br /&gt;
'''DECT''' or '''Digital Enhanced Cordless Telecommunications''' is a radio standard for short-range cordless communications. It is commonly used for domestic or corporate purposes. It is suited to voice, data and networking applications with a range of up to 500 metres.&lt;br /&gt;
&lt;br /&gt;
DECT was developed by the European Telecommunications Standards Institute (ETSI); an independent, non-profit, standardization organization in the telecommunications industry in Europe. Although DECT was developed by ETSI it has since been adopted by many countries all over the world.&lt;br /&gt;
&lt;br /&gt;
While the original DECT frequency band is 1880 MHz - 1900 MHz, the frequency allocation has changed in some countries like the United States so that DECT devices can be sold there. Since these channels are reserved exclusively for voice communication applications, they are much less likely to experience interference from other wireless devices such as wireless networks or baby monitors. DECT devices are therefore known as being ''interference free''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Applications ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== DECT Features ==&lt;br /&gt;
&lt;br /&gt;
The DECT standard allows for the proficient use of the radio spectrum through several advanced digital radio techniques. Delivering low risk of radio interference and low power technology, the DECT standard still ensures high speech quality and security. &lt;br /&gt;
DECT Features include: &lt;br /&gt;
&lt;br /&gt;
*'''TDMA (Time Division Multiple Access)''' radio access – low radio interference and high system capacity; is capable of handling up to 100'000 users per km² floor space in an office.&lt;br /&gt;
*'''ADPCM (Adaptive Differential Pulse Code Modulation)''' speech encoding – ensures that DECT phones have very high speech quality, which is similar to wireline telephony&lt;br /&gt;
*'''DCS/DCA (Dynamic Channel Selection / Allocation)''' is a unique DECT capability that guarantees that the best radio channels available are used; For example, this happens when a cordless phone is in standby mode as well as throughout the call; this feature also ensures that DECT telephony can coexist with other DECT applications, and with other systems in the same frequency, with high-quality, robust and secure communications for end-users &lt;br /&gt;
*'''Some other features''' - Encryption for maximum call security and optimized radio transmission for maximum battery life.&lt;br /&gt;
&lt;br /&gt;
DECT basic technology and the various profiles enhance the DECT standard, introducing evolutionary applications and services. The GAP profile, for example, ensures interoperability of equipment from different providers for voice applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Technical Details ==&lt;br /&gt;
[[Image:Dect_wireless.gif|thumb|center|600px|Comparison of DECT to other wireless technologies [http://einstein.informatik.uni-oldenburg.de/rechnernetze/dect.htm]]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== The New Generation of DECT ==&lt;br /&gt;
&lt;br /&gt;
Due to its ability to integrate multimedia applications – such as voice, data, internet services and multi-operator services, DECT is in prime position to be utilized in the newest technologies. &lt;br /&gt;
The newest features available include the following:&lt;br /&gt;
&lt;br /&gt;
*Video telephony capability&lt;br /&gt;
*Plug &amp;amp; Play functionality of all components&lt;br /&gt;
*Automatic device detection and configuration.&lt;br /&gt;
*Superior voice quality better than any existing (Wideband Speech)&lt;br /&gt;
*Support of Broadband Data and Audio Streaming&lt;br /&gt;
*Streaming CD Quality Audio Content&lt;br /&gt;
*Home Monitoring, Door phone, Baby monitor, Mailbox&lt;br /&gt;
&lt;br /&gt;
These new specifications first became available in March 2007, following the publication of an Overview Report. Themes of other publications related to New Generation DECT include Wideband speech, Extended Wideband speech services and IP Packet data.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
# Prof. Dr. W. Kowalk (2007-03-13). [http://einstein.informatik.uni-oldenburg.de/rechnernetze/dect.htm Rechnernetze – DECT] Retrieved on 2009-04-09. An introduction to DECT.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/DECT Wikipedia: DECT]&lt;br /&gt;
*[http://www.etsi.org/WebSite/Technologies/DECT.aspx DECT information at ETSI]&lt;br /&gt;
*[http://www.dect.org/content.aspx?id=18 DECT Forum at dect.org]&lt;br /&gt;
*[http://www.deviceforge.com/news/NS9790688989.html?regen=yes&amp;amp;display=yes DECT on deviceforge.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Colbyl2|Colbyl2]] 17:32, 8 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Colbyl2</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)</id>
		<title>Digital Enhanced Cordless Telecommunications (DECT)</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)"/>
				<updated>2009-04-11T17:40:08Z</updated>
		
		<summary type="html">&lt;p&gt;Colbyl2:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Panasonic_handset.jpg|thumb|right|The base unit and handset of a Panasonic DECT cordless telephone]]&lt;br /&gt;
'''DECT''' or '''Digital Enhanced Cordless Telecommunications''' is a radio standard for short-range cordless communications. It is commonly used for domestic or corporate purposes. It is suited to voice, data and networking applications with a range of up to 500 metres.&lt;br /&gt;
&lt;br /&gt;
DECT was developed by the European Telecommunications Standards Institute (ETSI); an independent, non-profit, standardization organization in the telecommunications industry in Europe. Although DECT was developed by ETSI it has since been adopted by many countries all over the world.&lt;br /&gt;
&lt;br /&gt;
While the original DECT frequency band is 1880 MHz - 1900 MHz, the frequency allocation has changed in some countries like the United States so that DECT devices can be sold there. Since these channels are reserved exclusively for voice communication applications, they are much less likely to experience interference from other wireless devices such as wireless networks or baby monitors. DECT devices are therefore known as being ''interference free''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Applications ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Technical Details ==&lt;br /&gt;
[[Image:Dect_wireless.gif|thumb|center|600px|Comparison of DECT to other wireless technologies [http://einstein.informatik.uni-oldenburg.de/rechnernetze/dect.htm]]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
# Prof. Dr. W. Kowalk (2007-03-13). [http://einstein.informatik.uni-oldenburg.de/rechnernetze/dect.htm Rechnernetze – DECT] Retrieved on 2009-04-09. An introduction to DECT.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/DECT Wikipedia: DECT]&lt;br /&gt;
*[http://www.etsi.org/WebSite/Technologies/DECT.aspx DECT information at ETSI]&lt;br /&gt;
*[http://www.dect.org/content.aspx?id=18 DECT Forum at dect.org]&lt;br /&gt;
*[http://www.deviceforge.com/news/NS9790688989.html?regen=yes&amp;amp;display=yes DECT on deviceforge.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Colbyl2|Colbyl2]] 17:32, 8 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Colbyl2</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)</id>
		<title>Digital Enhanced Cordless Telecommunications (DECT)</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)"/>
				<updated>2009-04-09T05:22:24Z</updated>
		
		<summary type="html">&lt;p&gt;Colbyl2:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Panasonic_handset.jpg|thumb|right|The base unit and handset of a Panasonic DECT cordless telephone]]&lt;br /&gt;
'''DECT''' or '''Digital Enhanced Cordless Telecommunications''' is a radio standard for short-range cordless communications. It is commonly used for domestic or corporate purposes. It is suited to voice, data and networking applications with a range of up to 500 metres.&lt;br /&gt;
&lt;br /&gt;
DECT was developed by the European Telecommunications Standards Institute (ETSI); an independent, non-profit, standardization organization in the telecommunications industry in Europe. Although DECT was developed by ETSI it has since been adopted by many countries all over the world.&lt;br /&gt;
&lt;br /&gt;
While the original DECT frequency band is 1880 MHz - 1900 MHz, the frequency allocation has changed in some countries like the United States so that DECT devices can be sold there. Since these channels are reserved exclusively for voice communication applications, they are much less likely to experience interference from other wireless devices such as wireless networks or baby monitors. DECT devices are therefore known as being ''interference free''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Applications ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Technical Details ==&lt;br /&gt;
[[Image:Dect_wireless.gif|thumb|center|600px|Comparison of DECT to other wireless technologies [http://einstein.informatik.uni-oldenburg.de/rechnernetze/dect.htm]]]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
# Prof. Dr. W. Kowalk (2007-03-13). [http://einstein.informatik.uni-oldenburg.de/rechnernetze/dect.htm Rechnernetze – DECT] Retrieved on 2009-04-09. An introduction to DECT.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/DECT DECT on Wikipedia]&lt;br /&gt;
*[http://www.etsi.org/WebSite/Technologies/DECT.aspx DECT information at ETSI]&lt;br /&gt;
*[http://www.dect.org/content.aspx?id=18 DECT Forum at dect.org]&lt;br /&gt;
*[http://www.deviceforge.com/news/NS9790688989.html?regen=yes&amp;amp;display=yes DECT on deviceforge.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Colbyl2|Colbyl2]] 17:32, 8 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Colbyl2</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Dect_wireless.gif</id>
		<title>File:Dect wireless.gif</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Dect_wireless.gif"/>
				<updated>2009-04-09T02:21:54Z</updated>
		
		<summary type="html">&lt;p&gt;Colbyl2:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Colbyl2</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)</id>
		<title>Digital Enhanced Cordless Telecommunications (DECT)</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)"/>
				<updated>2009-04-09T02:21:11Z</updated>
		
		<summary type="html">&lt;p&gt;Colbyl2:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Panasonic_handset.jpg|thumb|right|The base unit and handset of a Panasonic DECT cordless telephone]]&lt;br /&gt;
'''DECT''' or '''Digital Enhanced Cordless Telecommunications''' is a radio standard for short-range cordless communications. It is commonly used for domestic or corporate purposes. It is suited to voice, data and networking applications with a range of up to 500 metres.&lt;br /&gt;
&lt;br /&gt;
DECT was developed by the European Telecommunications Standards Institute (ETSI); an independent, non-profit, standardization organization in the telecommunications industry in Europe. Although DECT was developed by ETSI it has since been adopted by many countries all over the world.&lt;br /&gt;
&lt;br /&gt;
While the original DECT frequency band is 1880 MHz - 1900 MHz, the frequency allocation has changed in some countries like the United States so that DECT devices can be sold there. Since these channels are reserved exclusively for voice communication applications, they are much less likely to experience interference from other wireless devices such as wireless networks or baby monitors. DECT devices are therefore known as being ''interference free''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Applications ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Technical Details ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
*[http://en.wikipedia.org/wiki/DECT DECT on Wikipedia]&lt;br /&gt;
*[http://www.etsi.org/WebSite/Technologies/DECT.aspx DECT information at ETSI]&lt;br /&gt;
*[http://www.dect.org/content.aspx?id=18 DECT Forum at dect.org]&lt;br /&gt;
*[http://www.deviceforge.com/news/NS9790688989.html?regen=yes&amp;amp;display=yes DECT on deviceforge.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Colbyl2|Colbyl2]] 17:32, 8 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Colbyl2</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)</id>
		<title>Digital Enhanced Cordless Telecommunications (DECT)</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)"/>
				<updated>2009-04-08T22:25:55Z</updated>
		
		<summary type="html">&lt;p&gt;Colbyl2:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Panasonic_handset.jpg|thumb|right|The base unit and handset of a Panasonic DECT cordless telephone]]&lt;br /&gt;
'''DECT''' or '''Digital Enhanced Cordless Telecommunications''' is a radio standard for short-range cordless communications. It is commonly used for domestic or corporate purposes. It is suited to voice, data and networking applications with a range of up to 500 metres.&lt;br /&gt;
&lt;br /&gt;
DECT was developed by the European Telecommunications Standards Institute (ETSI); an independent, non-profit, standardization organization in the telecommunications industry in Europe. Although DECT was developed by ETSI it has since been adopted by many countries all over the world.&lt;br /&gt;
&lt;br /&gt;
While the original DECT frequency band is 1880 MHz - 1900 MHz, the frequency allocation has changed in some countries like the United States so that DECT devices can be sold there. Since these channels are reserved exclusively for voice communication applications, they are much less likely to experience interference from other wireless devices such as wireless networks or baby monitors. DECT devices are therefore known as being ''interference free''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Applications ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Features ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Technical Details ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Colbyl2|Colbyl2]] 17:32, 8 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Colbyl2</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)</id>
		<title>Digital Enhanced Cordless Telecommunications (DECT)</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)"/>
				<updated>2009-04-08T22:23:59Z</updated>
		
		<summary type="html">&lt;p&gt;Colbyl2:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:Panasonic_handset.jpg|thumb|right|The base unit and handset of a Panasonic DECT cordless telephone]]&lt;br /&gt;
'''DECT''' or '''Digital Enhanced Cordless Telecommunications''' is a radio standard for short-range cordless communications. It is commonly used for domestic or corporate purposes. It is suited to voice, data and networking applications with a range of up to 500 metres.&lt;br /&gt;
&lt;br /&gt;
DECT was developed by the European Telecommunications Standards Institute (ETSI); an independent, non-profit, standardization organization in the telecommunications industry in Europe. Although DECT was developed by ETSI it has since been adopted by many countries all over the world.&lt;br /&gt;
&lt;br /&gt;
While the original DECT frequency band is 1880 MHz - 1900 MHz, the frequency allocation has changed in some countries like the United States so that DECT devices can be sold there. Since these channels are reserved exclusively for voice communication applications, they are much less likely to experience interference from other wireless devices such as wireless networks or baby monitors. DECT devices are therefore known as being ''interference free''.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Colbyl2|Colbyl2]] 17:32, 8 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Colbyl2</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Panasonic_handset.jpg</id>
		<title>File:Panasonic handset.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Panasonic_handset.jpg"/>
				<updated>2009-04-08T22:10:34Z</updated>
		
		<summary type="html">&lt;p&gt;Colbyl2:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Colbyl2</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)</id>
		<title>Digital Enhanced Cordless Telecommunications (DECT)</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)"/>
				<updated>2009-04-08T21:34:26Z</updated>
		
		<summary type="html">&lt;p&gt;Colbyl2:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''DECT''' or '''Digital Enhanced Cordless Telecommunications''' is a radio standard for short-range cordless communications. It is commonly used for domestic or corporate purposes. It is suited to voice, data and networking applications with a range of up to 500 metres.&lt;br /&gt;
&lt;br /&gt;
DECT was developed by the European Telecommunications Standards Institute (ETSI); an independent, non-profit, standardization organization in the telecommunications industry in Europe. Although DECT was developed by ETSI it has since been adopted by many countries all over the world.&lt;br /&gt;
&lt;br /&gt;
While the original DECT frequency band is 1880 MHz - 1900 MHz, the frequency allocation has changed in some countries like the United States so that DECT devices can be sold there. Since these channels are reserved exclusively for voice communication applications, they are much less likely to experience interference from other wireless devices such as wireless networks or baby monitors. DECT devices are therefore known as being ''interference free''.&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Colbyl2|Colbyl2]] 17:32, 8 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Colbyl2</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)</id>
		<title>Digital Enhanced Cordless Telecommunications (DECT)</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Digital_Enhanced_Cordless_Telecommunications_(DECT)"/>
				<updated>2009-04-08T21:32:02Z</updated>
		
		<summary type="html">&lt;p&gt;Colbyl2:&amp;#32;New page: '''DECT''' or '''Digital Enhanced Cordless Telecommunications''' is a radio standard for short-range cordless communications. It is commonly used for domestic or corporate purposes. It is ...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''DECT''' or '''Digital Enhanced Cordless Telecommunications''' is a radio standard for short-range cordless communications. It is commonly used for domestic or corporate purposes. It is suited to voice, data and networking applications with a range of up to 500 metres.&lt;br /&gt;
&lt;br /&gt;
DECT was developed by the European Telecommunications Standards Institute (ETSI); an independent, non-profit, standardization organization in the telecommunications industry in Europe. Although DECT was developed by ETSI it has since been adopted by many countries all over the world.&lt;br /&gt;
&lt;br /&gt;
While the original DECT frequency band is 1880 MHz - 1900 MHz, the frequency allocation has changed in some countries like the United States so that DECT devices can be sold there. Since these channels are reserved exclusively for voice communication applications, they are much less likely to experience interference from other wireless devices such as wireless networks or baby monitors. DECT devices are therefore known as being ''interference free''.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Colbyl2|Colbyl2]] 17:32, 8 April 2009 (EDT)&lt;/div&gt;</summary>
		<author><name>Colbyl2</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Honeypot</id>
		<title>Honeypot</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Honeypot"/>
				<updated>2007-12-09T07:41:42Z</updated>
		
		<summary type="html">&lt;p&gt;Colbyl2:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In computing terminology, a '''Honeypot''' is a closely monitored network decoy that serves several purposes. It can provide early warning about a new attack or exploitation trends, can distract adversaries from other more valuable resources on a network, or allow a detailed examination of adversaries during and after a honeypot has been exploited. &lt;br /&gt;
&lt;br /&gt;
A Honeypot usually serves as a surveillance and early warning tool. It doesn't fix a single problem, but is a highly flexible security tool that has different applications for security. It has multiple uses including prevention, detection and information gathering. Honeypots all have the same concept that they don't have any production or authorized activity. A Honeypot should not see any legitimate traffic and can be surmised that it will only capture malicious or unauthorized activity. After being deployed in a network, a honeypot should not affect critical network services and applications. Its value as a security resource lies in being probed, attacked or compromised.&lt;br /&gt;
[[Image:figureA.jpg|thumb|right|Honeypot Deployment Example [http://www.honeynet.org/papers/honeynet/]]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Types of Honeypots ==   &lt;br /&gt;
Honeypots can be classified differently depending on how they are deployed, and the purpose that they are being used for. &lt;br /&gt;
&lt;br /&gt;
=== Production Honeypots ===&lt;br /&gt;
Production Honeypots are generally placed inside a network with other servers that are used for production purposes. They are used by organizations to improve the overall state of security. They can generally only capture a limited amount of information and are used primarily by companies and corporations. They are used to lower the organization's risk and add value to their security measures. Production honeypots give less information about the attacks and the attackers themselves than a research honeypot, but they are easier to use and set up. Production honeypots are normally a type of low-interaction honeypot.&lt;br /&gt;
&lt;br /&gt;
=== Research Honeypots ===&lt;br /&gt;
Research Honeypots are generally used by research organizations or educational institutions. They gather information about the tactics and the motives that are being used by the hacker community that is targeting different types of networks. Research Honeypots do not add a direct value to an organization but are used to research the different types of threats that an organization is facing and how to protect against those threats. They gather information about the attackers that can be used to help protect the organization. They can capture more extensive information, but as a result are more complex to deploy and maintain. Research honeypots are generally a type of high-interaction honeypot that is used by research, military and government institutions.&lt;br /&gt;
&lt;br /&gt;
=== Interaction Levels of Honeypots ===&lt;br /&gt;
Honeypots can be classified as either a '''low-interaction''' level Honeypot or a '''high-interaction''' level Honeypot.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;5&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|+ [http://www.spitzner.net/honeypots.html 2]&lt;br /&gt;
!'''Low-interaction'''&lt;br /&gt;
''emulates operating systems and their services'' &lt;br /&gt;
!'''High-interaction'''&lt;br /&gt;
''Not an emulation, uses real operating systems and services''&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
*Easy to install and deploy, and usually just requires installing and configuring software on a computer&lt;br /&gt;
*Minimal risk as it controls what the attackers can and cannot do&lt;br /&gt;
*Captures limited amounts of information&lt;br /&gt;
|&lt;br /&gt;
*Can capture much more information&lt;br /&gt;
*Can be complex to deploy and install&lt;br /&gt;
*Has increased risk, as the attackers have a real operating system to interact with&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Honeyd ===&lt;br /&gt;
[http://en.wikipedia.org/wiki/Honeyd Honeyd] is a low-interaction honeypot that was developed by Niels Provos. It is an open source program that allows a user to setup and run multiple virtual hosts on a network. The virtual hosts can be configured to mimic different types of servers. This allows a user to simulate many different computer network configurations. Honeyd works by emulating computers  on an unused IP address of a network and allowing scripts to simulate arbitrary services. It usually does not allow a full system compromise but gives hackers a facade to attack. &lt;br /&gt;
&lt;br /&gt;
=== Honeynets ===&lt;br /&gt;
A Honeynet is a network of multiple honeypots and are usually made up of real systems. They are a type of high-interaction honeypot that is used for monitoring a larger and/or more diverse network where one honeypot might not be sufficient. The network is reached via the Honeywall Gateway. This network bridge closely monitors and controls the data flow that comes to and from the honeypots in the network. Types of data that it can capture include system event data in logs, keylog data and network traffic.&lt;br /&gt;
&lt;br /&gt;
== Value of Honeypots ==&lt;br /&gt;
&lt;br /&gt;
=== Advantages === &lt;br /&gt;
[http://www.spitzner.net/honeypots.html]Honeypots are a very simple concept which gives them some powerful strengths:&lt;br /&gt;
*''Small data sets with high value:'' Honeypots can collect small amounts of information. They might log about 1MB of data a day. They also can generate only 10 alerts a day, as opposed to 10,000. Since honeypots only capture the bad activity, all of this information would be unauthorized or malicious. So it is much easier to analyze the data and find value from it.&lt;br /&gt;
*''Minimal resources:'' Honeypots only require minimal resources since they only capture bad activity.&lt;br /&gt;
*''New tools and tactics:'' Honeypots are made to capture anything that is thrown at them, even if it hasn't been seen before.&lt;br /&gt;
*''Encryption:'' Honeypots will work fine in encrypted environments unlike many other security technologies. The honeypot will detect and capture whatever is thrown at it.&lt;br /&gt;
*''Information:'' Honeypots can collect in-depth information that few other technologies can match.&lt;br /&gt;
*''Simplicity:'' The conceptual part of honeypots is very simple, so it is less likely to have mistakes or misconfigurations.&lt;br /&gt;
&lt;br /&gt;
=== Disadvantages ===&lt;br /&gt;
Honeypots also have weaknesses, like any other technology, so they should be used in addition to other technologies.&lt;br /&gt;
*''Limited view:'' Honeypots will only capture and track the activity that directly interacts with them. They can't capture attacks on other systems unless they interact with the honeypot as well.&lt;br /&gt;
*''Risk:'' All security technologies have some risk associated with them. Honeypots run the risk of being taken over by the hacker and being used to harm other systems. The level of risk is associated with the type of the honeypot. High-interaction honeypots generally run a much higher level of risk than low-interaction honeypots.&lt;br /&gt;
&lt;br /&gt;
== Legal Issues ==&lt;br /&gt;
As the purpose of Honeypots is to track and monitor the actions of a hacker, certain questions may arise as to whether or not Honeypots are legal. This is not a simple question, and the answer may not be fully known at this point in time. As security professionals are just beginning to understand what Honeypots are and how they are used, the legal community is as well. There are 3 main issues that are commonly discussed with the legality of honeypots: entrapment, privacy and liability. Honeypots are not considered to be a form of entrapment, whereas the other 2 issues are more complex. As the actions of Honeypots have not really been tried in the court system as of yet, it is unknown as to its outcome. However, there are some precautionary measures that would be important to take. Putting up banners indicating that a hackers actions are being monitored would ensure that they have consented to it. It is also important to be a conscientious honeypot administrator. If a honeypot was to become compromised, it must be dealt with immediately as to prevent the administrator from becoming liable if the hacker uses it to harm other information systems. It is recommended to seek legal advice before deploying a honeypot. [http://www.securityfocus.com/infocus/1703]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
# Know your Enemy: Honeynets &amp;lt;[http://www.honeynet.org/papers/honeynet/ http://www.honeynet.org/papers/honeynet/]&amp;gt;&lt;br /&gt;
# Honeypots: Definitions and value of Honeypots &amp;lt;[http://www.spitzner.net/honeypots.html http://www.spitzner.net/honeypots.html]&amp;gt;&lt;br /&gt;
# Honeypots: Are they illegal? &amp;lt;[http://www.securityfocus.com/infocus/1703 http://www.securityfocus.com/infocus/1703]&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
[[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Random Number Generators and Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Biometric systems regarding security design principle]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Phishing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Biometrics in Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Smart Card technology to prevent fraud]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Anti-spam Systems and Techniques]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[The Mitnick attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Payment Card Industry Data Security Standard]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Autocomplete]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Information security awareness]]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
*[http://www.tracking-hackers.com/ Honeytech]&lt;br /&gt;
*[http://www.honeypots.net/ Intrusion Detection, Honeypots and Incident Handling Resources]&lt;br /&gt;
*[http://honeypots.sourceforge.net/ Honeypots: Monitoring and Forensics]&lt;br /&gt;
*[http://www.honeynet.org/ The Honeynet Project]&lt;br /&gt;
*[http://www.honeyd.org/ Developments of the Honeyd Virtual Honeypot]&lt;br /&gt;
*[http://honeynet.ca/ Canadian Honeynet Project | Canadian Honeypot Security Research]&lt;br /&gt;
*[http://www.linux.com/articles/39244 Know your enemy: Everything you need to know about Honeypots]&lt;br /&gt;
*[http://en.wikipedia.org/wiki/Honeypot_%28computing%29 Wikipedia: Honeypot(computing)] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Colbyl2|Colbyl2]] 02:03, 9 December 2007 (EST)&lt;/div&gt;</summary>
		<author><name>Colbyl2</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Honeypot</id>
		<title>Honeypot</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Honeypot"/>
				<updated>2007-12-09T07:03:51Z</updated>
		
		<summary type="html">&lt;p&gt;Colbyl2:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In computing terminology, a '''Honeypot''' is a closely monitored network decoy that serves several purposes. It can provide early warning about a new attack or exploitation trends, can distract adversaries from other more valuable resources on a network, or allow a detailed examination of adversaries during and after a honeypot has been exploited. &lt;br /&gt;
&lt;br /&gt;
A Honeypot usually serves as a surveillance and early warning tool. It doesn't fix a single problem, but is a highly flexible security tool that has different applications for security. It has multiple uses including prevention, detection and information gathering. Honeypots all have the same concept that they don't have any production or authorized activity. A Honeypot should not see any legitimate traffic and can be surmised that it will only capture malicious or unauthorized activity. After being deployed in a network, a honeypot should not affect critical network services and applications. Its value as a security resource lies in being probed, attacked or compromised.&lt;br /&gt;
[[Image:figureA.jpg|thumb|right|Honeypot Deployment Example]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Types of Honeypots ==   &lt;br /&gt;
Honeypots can be classified differently depending on how they are deployed, and the purpose that they are being used for. &lt;br /&gt;
&lt;br /&gt;
=== Production Honeypots ===&lt;br /&gt;
Production Honeypots are generally placed inside a network with other servers that are used for production purposes. They are used by organizations to improve the overall state of security. They can generally only capture a limited amount of information and are used primarily by companies and corporations. They are used to lower the organization's risk and add value to their security measures. Production honeypots give less information about the attacks and the attackers themselves than a research honeypot, but they are easier to use and set up. Production honeypots are normally a type of low-interaction honeypot.&lt;br /&gt;
&lt;br /&gt;
=== Research Honeypots ===&lt;br /&gt;
Research Honeypots are generally used by research organizations or educational institutions. They gather information about the tactics and the motives that are being used by the hacker community that is targeting different types of networks. Research Honeypots do not add a direct value to an organization but are used to research the different types of threats that an organization is facing and how to protect against those threats. They gather information about the attackers that can be used to help protect the organization. They can capture more extensive information, but as a result are more complex to deploy and maintain. Research honeypots are generally a type of high-interaction honeypot that is used by research, military and government institutions.&lt;br /&gt;
&lt;br /&gt;
=== Interaction Levels of Honeypots ===&lt;br /&gt;
Honeypots can be classified as either a '''low-interaction''' level Honeypot or a '''high-interaction''' level Honeypot.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;5&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
!'''Low-interaction'''&lt;br /&gt;
''emulates operating systems and their services'' &lt;br /&gt;
!'''High-interaction'''&lt;br /&gt;
''Not an emulation, uses real operating systems and services''&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
*Easy to install and deploy, and usually just requires installing and configuring software on a computer&lt;br /&gt;
*Minimal risk as it controls what the attackers can and cannot do&lt;br /&gt;
*Captures limited amounts of information&lt;br /&gt;
|&lt;br /&gt;
*Can capture much more information&lt;br /&gt;
*Can be complex to deploy and install&lt;br /&gt;
*Has increased risk, as the attackers have a real operating system to interact with&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Honeyd ===&lt;br /&gt;
[http://en.wikipedia.org/wiki/Honeyd Honeyd] is a low-interaction honeypot that was developed by Niels Provos. It is an open source program that allows a user to setup and run multiple virtual hosts on a network. The virtual hosts can be configured to mimic different types of servers. This allows a user to simulate many different computer network configurations. Honeyd works by emulating computers  on an unused IP address of a network and allowing scripts to simulate arbitrary services. It usually does not allow a full system compromise but gives hackers a facade to attack. &lt;br /&gt;
&lt;br /&gt;
=== Honeynets ===&lt;br /&gt;
A Honeynet is a network of multiple honeypots and are usually made up of real systems. They are a type of high-interaction honeypot that is used for monitoring a larger and/or more diverse network where one honeypot might not be sufficient. The network is reached via the Honeywall Gateway. This network bridge closely monitors and controls the data flow that comes to and from the honeypots in the network. Types of data that it can capture include system event data in logs, keylog data and network traffic.&lt;br /&gt;
&lt;br /&gt;
== Value of Honeypots ==&lt;br /&gt;
&lt;br /&gt;
=== Advantages ===&lt;br /&gt;
Honeypots are a very simple concept which gives them some powerful strengths:&lt;br /&gt;
*''Small data sets with high value:'' Honeypots can collect small amounts of information. They might log about 1MB of data a day. They also can generate only 10 alerts a day, as opposed to 10,000. Since honeypots only capture the bad activity, all of this information would be unauthorized or malicious. So it is much easier to analyze the data and find value from it.&lt;br /&gt;
*''Minimal resources:'' Honeypots only require minimal resources since they only capture bad activity.&lt;br /&gt;
*''New tools and tactics:'' Honeypots are made to capture anything that is thrown at them, even if it hasn't been seen before.&lt;br /&gt;
*''Encryption:'' Honeypots will work fine in encrypted environments unlike many other security technologies. The honeypot will detect and capture whatever is thrown at it.&lt;br /&gt;
*''Information:'' Honeypots can collect in-depth information that few other technologies can match.&lt;br /&gt;
*''Simplicity:'' The conceptual part of honeypots is very simple, so it is less likely to have mistakes or misconfigurations.&lt;br /&gt;
&lt;br /&gt;
=== Disadvantages ===&lt;br /&gt;
Honeypots also have weaknesses, like any other technology, so they should be used in addition to other technologies.&lt;br /&gt;
*''Limited view:'' Honeypots will only capture and track the activity that directly interacts with them. They can't capture attacks on other systems unless they interact with the honeypot as well.&lt;br /&gt;
*''Risk:'' All security technologies have some risk associated with them. Honeypots run the risk of being taken over by the hacker and being used to harm other systems. The level of risk is associated with the type of the honeypot. High-interaction honeypots generally run a much higher level of risk than low-interaction honeypots.&lt;br /&gt;
&lt;br /&gt;
== Legal Issues ==&lt;br /&gt;
As the purpose of Honeypots is to track and monitor the actions of a hacker, certain questions may arise as to whether or not Honeypots are legal. This is not a simple question, and the answer may not be fully known at this point in time. As security professionals are just beginning to understand what Honeypots are and how they are used, the legal community is as well. There are 3 main issues that are commonly discussed with the legality of honeypots: entrapment, privacy and liability. Honeypots are not considered to be a form of entrapment, whereas the other 2 issues are more complex. As the actions of Honeypots have not really been tried in the court system as of yet, it is unknown as to its outcome. However, there are some precautionary measures that would be important to take. Putting up banners indicating that a hackers actions are being monitored would ensure that they have consented to it. It is also important to be a conscientious honeypot administrator. If a honeypot was to become compromised, it must be dealt with immediately as to prevent the administrator from becoming liable if the hacker uses it to harm other information systems. It is recommended to seek legal advice before deploying a honeypot. &lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
# Know your Enemy: Honeynets &amp;lt;[http://www.honeynet.org/papers/honeynet/ http://www.honeynet.org/papers/honeynet/]&amp;gt;&lt;br /&gt;
# Honeypots: Definitions and value of Honeypots &amp;lt;[http://www.spitzner.net/honeypots.html http://www.spitzner.net/honeypots.html]&amp;gt;&lt;br /&gt;
# Honeypots: Are they illegal? &amp;lt;[http://www.securityfocus.com/infocus/1703 http://www.securityfocus.com/infocus/1703]&amp;gt;&lt;br /&gt;
# Wikipedia: Honeypot(computing) &amp;lt;[http://en.wikipedia.org/wiki/Honeypot_%28computing%29 http://en.wikipedia.org/wiki/Honeypot_%28computing%29]&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
[[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Random Number Generators and Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Biometric systems regarding security design principle]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Phishing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Biometrics in Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Smart Card technology to prevent fraud]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Anti-spam Systems and Techniques]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[The Mitnick attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Payment Card Industry Data Security Standard]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Autocomplete]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Information security awareness]]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
*[http://www.tracking-hackers.com/ Honeytech]&lt;br /&gt;
*[http://www.honeypots.net/ Intrusion Detection, Honeypots and Incident Handling Resources]&lt;br /&gt;
*[http://honeypots.sourceforge.net/ Honeypots: Monitoring and Forensics]&lt;br /&gt;
*[http://www.honeynet.org/ The Honeynet Project]&lt;br /&gt;
*[http://www.honeyd.org/ Developments of the Honeyd Virtual Honeypot]&lt;br /&gt;
*[http://honeynet.ca/ Canadian Honeynet Project | Canadian Honeypot Security Research]&lt;br /&gt;
*[http://www.linux.com/articles/39244 Know your enemy: Everything you need to know about Honeypots]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Colbyl2|Colbyl2]] 02:03, 9 December 2007 (EST)&lt;/div&gt;</summary>
		<author><name>Colbyl2</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Honeypot</id>
		<title>Honeypot</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Honeypot"/>
				<updated>2007-12-08T22:15:17Z</updated>
		
		<summary type="html">&lt;p&gt;Colbyl2:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In computing terminology, a '''Honeypot''' is a closely monitored network decoy that serves several purposes. It can provide early warning about a new attack or exploitation trends, can distract adversaries from other more valuable resources on a network, or allow a detailed examination of adversaries during and after a honeypot has been exploited. &lt;br /&gt;
&lt;br /&gt;
A Honeypot usually serves as a surveillance and early warning tool. It doesn't fix a single problem, but is a highly flexible security tool that has different applications for security. It has multiple uses including prevention, detection and information gathering. Honeypots all have the same concept that they don't have any production or authorized activity. A Honeypot should not see any legitimate traffic and can be surmised that it will only capture malicious or unauthorized activity. After being deployed in a network, a honeypot should not affect critical network services and applications. Its value as a security resource lies in being probed, attacked or compromised.&lt;br /&gt;
&lt;br /&gt;
A Honeypot can also carry certain risks to a network and should be handled with care. If it is not properly looked after or walled off, an attacker can use it to break into another system. &lt;br /&gt;
       &lt;br /&gt;
[[Image:figureA.jpg|frame|right|Honeypot Deployment Example]]&lt;br /&gt;
&amp;lt;br style=&amp;quot;clear:both;&amp;quot;/&amp;gt;&lt;br /&gt;
== Types of Honeypots ==   &lt;br /&gt;
Honeypots can be classified differently depending on how they are deployed, and the purpose that they are being used for.&lt;br /&gt;
=== Production Honeypots ===&lt;br /&gt;
Production Honeypots are generally placed inside a network with other servers that are used for production purposes. They are used by organizations to improve the overall state of security. They can generally only capture a limited amount of information and are used primarily by companies and corporations. They are used to lower the organization's risk and add value to their security measures. Production honeypots give less information about the attacks and the attackers themselves than a research honeypot, but they are easier to use and set up. Production honeypots are normally a type of low-interaction honeypot.&lt;br /&gt;
&lt;br /&gt;
=== Research Honeypots ===&lt;br /&gt;
Research Honeypots are generally used by research organizations or educational institutions. They gather information about the tactics and the motives that are being used by the hacker community that is targeting different types of networks. Research Honeypots do not add a direct value to an organization but are used to research the different types of threats that an organization is facing and how to protect against those threats. They gather information about the attackers that can be used to help protect the organization. They can capture more extensive information, but as a result are more complex to deploy and maintain. Research honeypots are generally a type of high-interaction honeypot that is used by research, military and government institutions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
[[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Random Number Generators and Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Biometric systems regarding security design principle]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Phishing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Biometrics in Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Smart Card technology to prevent fraud]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Anti-spam Systems and Techniques]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[The Mitnick attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Payment Card Industry Data Security Standard]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Autocomplete]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Information security awareness]]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Colbyl2|Colbyl2]] 18:42, 1 December 2007 (EST)&lt;/div&gt;</summary>
		<author><name>Colbyl2</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Honeypot</id>
		<title>Honeypot</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Honeypot"/>
				<updated>2007-12-04T01:48:16Z</updated>
		
		<summary type="html">&lt;p&gt;Colbyl2:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In computing terminology, a '''Honeypot''' is a closely monitored network decoy that serves several purposes. It can provide early warning about a new attack or exploitation trends, can distract adversaries from other more valuable resources on a network, or allow a detailed examination of adversaries during and after a honeypot has been exploited. &lt;br /&gt;
&lt;br /&gt;
A Honeypot usually serves as a surveillance and early warning tool. It doesn't fix a single problem, but is a highly flexible security tool that has different applications for security. It has multiple uses including prevention, detection and information gathering. Honeypots all have the same concept that they don't have any production or authorized activity. A Honeypot should not see any legitimate traffic and can be surmised that it will only capture malicious or unauthorized activity. After being deployed in a network, a honeypot should not affect critical network services and applications. Its value as a security resource lies in being probed, attacked or compromised.&lt;br /&gt;
&lt;br /&gt;
A Honeypot can also carry certain risks to a network and should be handled with care. If it is not properly looked after or walled off, an attacker can use it to break into another system. &lt;br /&gt;
       &lt;br /&gt;
[[Image:figureA.jpg|frame|right|Honeypot Deployment Example]]&lt;br /&gt;
&amp;lt;br style=&amp;quot;clear:both;&amp;quot;/&amp;gt;&lt;br /&gt;
== Types of Honeypots ==   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
[[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Random Number Generators and Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Biometric systems regarding security design principle]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Phishing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Biometrics in Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Smart Card technology to prevent fraud]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Anti-spam Systems and Techniques]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[The Mitnick attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Payment Card Industry Data Security Standard]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Autocomplete]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Information security awareness]]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Colbyl2|Colbyl2]] 18:42, 1 December 2007 (EST)&lt;/div&gt;</summary>
		<author><name>Colbyl2</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Honeypot</id>
		<title>Honeypot</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Honeypot"/>
				<updated>2007-12-04T01:40:59Z</updated>
		
		<summary type="html">&lt;p&gt;Colbyl2:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In computing terminology, a '''Honeypot''' is a closely monitored network decoy that serves several purposes. It can provide early warning about a new attack or exploitation trends, can distract adversaries from other more valuable resources on a network, or allow a detailed examination of adversaries during and after a honeypot has been exploited. &lt;br /&gt;
&lt;br /&gt;
A Honeypot usually serves as a surveillance and early warning tool. It doesn't fix a single problem, but is a highly flexible security tool that has different applications for security. It has multiple uses including prevention, detection and information gathering. Honeypots all have the same concept that they don't have any production or authorized activity. A Honeypot should not see any legitimate traffic and can be surmised that it will only capture malicious or unauthorized activity. After being deployed in a network, a honeypot should not affect critical network services and applications. Its value as a security resource lies in being probed, attacked or compromised.&lt;br /&gt;
&lt;br /&gt;
A Honeypot can also carry certain risks to a network and should be handled with care. If it is not properly looked after or walled off, an attacker can use it to break into another system. &lt;br /&gt;
       &lt;br /&gt;
[[Image:figureA.jpg|frame|right|Honeypot Deployment Example]]&lt;br /&gt;
&amp;lt;br style=&amp;quot;clear:both;&amp;quot;/&amp;gt;&lt;br /&gt;
== Types of Honeypots ==   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
[[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Random Number Generators and Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Biometric Systems Regarding Security Design Principle]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Phishing]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Biometrics in Information Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Smart Card Technology to Prevent Fraud]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Anti-spam systems and techniques]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[The Mitnick Attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Payment Card Industry Data Security Standard]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Autocomplete]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Social Engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Information Security Awareness]]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Colbyl2|Colbyl2]] 18:42, 1 December 2007 (EST)&lt;/div&gt;</summary>
		<author><name>Colbyl2</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Honeypot</id>
		<title>Honeypot</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Honeypot"/>
				<updated>2007-12-02T00:01:27Z</updated>
		
		<summary type="html">&lt;p&gt;Colbyl2:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In computing terminology, a '''Honeypot''' is a closely monitored network decoy that serves several purposes. It can provide early warning about a new attack or exploitation trends, can distract adversaries from other more valuable resources on a network, or allow a detailed examination of adversaries during and after a honeypot has been exploited. &lt;br /&gt;
&lt;br /&gt;
A Honeypot usually serves as a surveillance and early warning tool. It doesn't fix a single problem, but is a highly flexible security tool that has different applications for security. It has multiple uses including prevention, detection and information gathering. Honeypots all have the same concept that they don't have any production or authorized activity. A Honeypot should not see any legitimate traffic and can be surmised that it will only capture malicious or unauthorized activity. After being deployed in a network, a honeypot should not affect critical network services and applications. Its value as a security resource lies in being probed, attacked or compromised.&lt;br /&gt;
&lt;br /&gt;
A Honeypot can also carry certain risks to a network and should be handled with care. If it is not properly looked after or walled off, an attacker can use it to break into another system. &lt;br /&gt;
       &lt;br /&gt;
[[Image:figureA.jpg|frame|right|Honeypot Deployment Example]]&lt;br /&gt;
&amp;lt;br style=&amp;quot;clear:both;&amp;quot;/&amp;gt;&lt;br /&gt;
== Types of Honeypots ==   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Colbyl2|Colbyl2]] 18:42, 1 December 2007 (EST)&lt;/div&gt;</summary>
		<author><name>Colbyl2</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Honeypot</id>
		<title>Honeypot</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Honeypot"/>
				<updated>2007-12-01T23:54:58Z</updated>
		
		<summary type="html">&lt;p&gt;Colbyl2:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In computing terminology, a '''Honeypot''' is a closely monitored network decoy that serves several purposes. It can provide early warning about a new attack or exploitation trends, can distract adversaries from other more valuable resources on a network, or allow a detailed examination of adversaries during and after a honeypot has been exploited. &lt;br /&gt;
&lt;br /&gt;
A Honeypot usually serves as a surveillance and early warning tool. It doesn't fix a single problem, but is a highly flexible security tool that has different applications for security. It has multiple uses including prevention, detection and information gathering. Honeypots all have the same concept that they don't have any production or authorized activity. A Honeypot should not see any legitimate traffic and can be surmised that it will only capture malicious or unauthorized activity. After being deployed in a network, a honeypot should not affect critical network services and applications. Its value as a security resource lies in being probed, attacked or compromised.&lt;br /&gt;
&lt;br /&gt;
A Honeypot can also carry certain risks to a network and should be handled with care. If it is not properly looked after or walled off, an attacker can use it to break into another system. &lt;br /&gt;
       &lt;br /&gt;
[[Image:figureA.jpg|frame|right|Honeypot Deployment Example]]&lt;br /&gt;
&lt;br /&gt;
== Types of Honeypots ==   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Colbyl2|Colbyl2]] 18:42, 1 December 2007 (EST)&lt;/div&gt;</summary>
		<author><name>Colbyl2</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Honeypot</id>
		<title>Honeypot</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Honeypot"/>
				<updated>2007-12-01T23:42:58Z</updated>
		
		<summary type="html">&lt;p&gt;Colbyl2:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;In computing terminology, a '''Honeypot''' is a closely monitored network decoy that serves several purposes. It can provide early warning about a new attack or exploitation trends, can distract adversaries from other more valuable resources on a network, or allow a detailed examination of adversaries during and after a honeypot has been exploited. &lt;br /&gt;
&lt;br /&gt;
A Honeypot usually serves as a surveillance and early warning tool. It doesn't fix a single problem, but is a highly flexible security tool that has different applications for security. It has multiple uses including prevention, detection and information gathering. Honeypots all have the same concept that they don't have any production or authorized activity. A Honeypot should not see any legitimate traffic and can be surmised that it will only capture malicious or unauthorized activity. After being deployed in a network, a honeypot should not affect critical network services and applications. Its value as a security resource lies in being probed, attacked or compromised.&lt;br /&gt;
&lt;br /&gt;
A Honeypot can also carry certain risks to a network and should be handled with care. If it is not properly looked after or walled off, an attacker can use it to break into another system. &lt;br /&gt;
       &lt;br /&gt;
[[Image:figureA.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Types of Honeypots ==   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--[[User:Colbyl2|Colbyl2]] 18:42, 1 December 2007 (EST)&lt;/div&gt;</summary>
		<author><name>Colbyl2</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:FigureA.jpg</id>
		<title>File:FigureA.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:FigureA.jpg"/>
				<updated>2007-12-01T23:11:23Z</updated>
		
		<summary type="html">&lt;p&gt;Colbyl2:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Colbyl2</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Honeypot</id>
		<title>Honeypot</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Honeypot"/>
				<updated>2007-12-01T21:24:11Z</updated>
		
		<summary type="html">&lt;p&gt;Colbyl2:&amp;#32;New page: ''' == Honeypot == ''' In computing terminology, a '''Honeypot''' is a closely monitored network decoy that serves several purposes. It can provide early warning about a new attack or expl...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''&lt;br /&gt;
== Honeypot ==&lt;br /&gt;
'''&lt;br /&gt;
In computing terminology, a '''Honeypot''' is a closely monitored network decoy that serves several purposes. It can provide early warning about a new attack or exploitation trends, can distract adversaries from other more valuable resources on a network, or allow a detailed examination of adversaries during and after a honeypot has been exploited.&lt;br /&gt;
&lt;br /&gt;
A Honeypot usually serves as a surveillance and early warning tool. It doesn't fix a single problem, but is a highly flexible security tool that has different applications for security. It has multiple uses including prevention, detection and information gathering. Honeypots all have the same concept that they don't have any production or authorized activity. A Honeypot should not see any legitimate traffic and can be surmised that it will only capture malicious or unauthorized activity. After being deployed in a network, a honeypot should not affect critical network services and applications. Its value as a security resource lies in being probed, attacked or compromised.&lt;br /&gt;
&lt;br /&gt;
A Honeypot can also carry certain risks to a network and should be handled with care. If it is not properly looked after or walled off, an attacker can use it to break into another system.&lt;/div&gt;</summary>
		<author><name>Colbyl2</name></author>	</entry>

	</feed>