Professional Documents
Culture Documents
INTRODUCTION
HISTORY
MOTIVATION
LITERATURE SURVEY
CONCEPT
ADVANTAGES
DISADVANTAGES
APPLICATIONS
FUTURE SCOPE
CONCLUSION
REFERENCES
INTRODUCTION
Wi-Fi can be less secure than wired connections (such as Ethernet) because an intruder does
not need a physical connection. Web pages that use SSL are secure but unencrypted internet
access can easily be detected by intruders. Because of this, Wi-Fi has adopted various
encryption technologies. The early encryption WEP, proved easy to break. Higher quality
protocols (WPA, WPA2) were added later. An optional feature added in 2007, called Wi-Fi
Protected Setup (WPS), had a serious flaw that allowed an attacker to recover the router's
password. The Wi-Fi Alliance has since updated its test plan and certification program to
ensure all newly certified devices resist attacks.
In order to enhance security of IEEE 802.11, a new standard called IEEE 802.11i is being
developed. The objective of 802.11i is to enhance the 802.11 security aspects. In addition to
introducing key management and establishment, it also defines encryption and authentication
improvements. In order to manage security keys automatically, 802.11i defines key
management and establishment algorithms, which are first introduced in the 802.11
standards. As conventional WEP is known to be vulnerable, 802.11i is specifying enhanced
encryption to provide stronger privacy. 802.11i also incorporates IEEE 802.1X as its
authentication enhancement. 802.1X is now widely deployed in many IEEE 802 series
standards with the Remote Authentication Dial In User Service (RADIUS, Internet
Engineering Task Force, IETF, RFC 2865) as the authentication server.
History
Back in 1991 Wi-Fi was invented by NCR Corporation/AT&T (later on Lucent & Agere
Systems) in Nieuwegein, the Netherlands. Initially meant for cashier systems the first
wireless products were brought on the market under the name Wave LAN with speeds of
1Mbps/2Mbps. Vic Hayes who is the inventor of Wi-Fi has been named 'father of Wi-Fi' and
was with his team involved in designing standards such as IEEE 802.11b, 802.11a and
802.11g. In 2003, Vic retired from Agere Systems. Agere Systems suffered from strong
competition in the market even though their products were cutting edge, as many opted for
cheaper Wi-Fi solutions. Agere's 802.11abg all-in-one chipset (code named: WARP) never
hit the market, Agere Systems decided to quit the Wi-Fi market in late 2004.
The term Wi-Fi, commercially used at least as early as August 2000, was coined by a brand-
consulting firm called Interbrand Corporation. The Wi-Fi Alliance had hired Interbrand to
determine a name that was "a little catchier than 'IEEE 802.11b Direct Sequence'". Phil
Belanger, a founding member of the Wi-Fi Alliance who presided over the selection of the
name "Wi-Fi," also stated that Interbrand invented Wi-Fi as a play on words with Hi-Fi (high
fidelity), and also created the Wi-Fi logo.
The Wi-Fi Alliance initially used the advertising slogan, "The Standard for Wireless
Fidelity ,for Wi-Fi but later removed the phrase from their marketing. Despite this, some
documents from the Alliance dated 2003 and 2004 still contain the term Wireless Fidelity.
There was no official statement related to the dropping of the term.
The yin-yang Wi-Fi logo indicates the certification of a product for interoperability.
Non-Wi-Fi technologies intended for fixed points such as Motorola Canopy are usually
described as fixed wireless. Alternative wireless technologies include mobile phone standards
such as 2G, 3G or 4G.
MOTIVATION
3 - -
Understanding IEEE 802.11 and Wi-Fi
Standards, September 11, 2020,Scott
Blanchard,
Vaunix,www.microwavwejournal.com
CONCEPT
Wi-Fi Certification
The IEEE does not test equipment for compliance with their standards. The non-profit Wi-Fi
Alliance was formed in 1999 to fill this void — to establish and enforce standards for
interoperability and backward compatibility, and to promote wireless local-area-network
technology. As of 2010, the Wi-Fi Alliance consisted of more than 375 companies from
around the world. The Wi-Fi Alliance enforces the use of the Wi-Fi brand to technologies
based on the IEEE 802.11 standards from the IEEE. This includes wireless local area
network (WLAN) connections, device to device connectivity (such as Wi-Fi Peer to Peer aka
Wi-Fi Direct), Personal area network (PAN), local area network (LAN) and even some
limited wide area network (WAN) connections. Manufacturers with membership in the Wi-Fi
Alliance, whose products pass the certification process, gain the right to mark those products
with the Wi-Fi logo.
Specifically, the certification process requires conformance to the IEEE 802.11 radio
standards, the WPA and WPA2 security standards, and the EAP authentication standard.
Certification may optionally include tests of IEEE 802.11 draft standards, interaction with
cellular-phone technology in converged devices, and features relating to security set-up,
multimedia, and power-saving.
Not every Wi-Fi device is submitted for certification. The lack of Wi-Fi certification does not
necessarily imply that a device is incompatible with other Wi-Fi devices. If it is compliant or
partly compatible, the Wi-Fi Alliance may not object to its description as a Wi-Fi device
though technically only certified devices are approved. Derivative terms, such as Super Wi-
Fi, coined by the US Federal Communications Commission (FCC) to describe proposed
networking in the UHF TV band in the US, may or may not be sanctioned.
Stations (STA) − Stations comprises of all devices and equipment that are
connected to the wireless LAN. A station can be of two types−
o Wireless Access Point (WAP) − WAPs or simply access points (AP) are
generally wireless routers that form the base stations or access.
o Client. Clients are workstations, computers, laptops, printers, smartphones,
etc.
Each station has a wireless network interface controller.
Basic Service Set (BSS) − A basic service set is a group of stations communicating at
the physical layer level. BSS can be of two categories depending upon the mode of
operation−
o Infrastructure BSS − Here, the devices communicate with other devices
through access points.
o Independent BSS − Here, the devices communicate in a peer-to-peer basis in
an ad hoc manner.
Extended Service Set (ESS) − It is a set of all connected BSS.
Radio Signals
Radio Signals:
Radio Signals are the keys which make WiFi networking possible. These radio signals
transmitted from Wi-Fi antennas are picked up by WiFi receivers such as computers and cell
phones that are equipped with WiFi cards. Whenever a computer receives any of the signals
within the range of a WiFi network which is usually 300 - 500 feet for antennas, the WiFi
card will read the signals and thus create an internet connection between the user and the
network without the use of a cord.
Access points which consist of antennas and routers are the main source which transmit and
receive radio waves.
Antennas work stronger and have a longer radio transmission with a radius of 300-500 feet
which are used in public areas while the weaker yet effective router is more suitable for
homes with a radio transmission of 100-150 feet.
Wi-Fi Cards:
You can think WiFi card as being an invisible cord that connects your computer to the
antenna for a direct connection to the internet.
WiFi cards can be external or internal, meaning that if a WiFi card is not installed in your
computer, you may purchase a USB antenna attachment and have it externally connect to
your USB port, or have an antenna-equipped expansion card installed directly to the
computer. For laptops, this card will be a PCMCIA card in which you insert to the PCMCIA
slot on the laptop.
Wi-Fi Hotspots:
A Wi-Fi hotspot is created by installing an access point to an internet connection. The access
point transmits a wireless signal over a short distance . typically covering around 300 feet.
When a Wi-Fi .enabled device, such as a Pocket PC, encounters a hotspot, the device can
then connect to that network wirelessly.
Most hotspots are located in places that are readily accessible to the public, like airports,
coffee shops, hotels, book stores and campus environments. 802.11b is the most common
specification for hotspots worldwide. The 802.11g standard is backwards compatible with .
11b but .11a uses a different frequency range and requires separate hardware such as an a,
a/g, or a/b/g adapter. The largest public Wi-Fi networks are provided by private internet
service providers (ISPs) that charge a fee for users to connect to the internet.
Hotspots are increasingly developing around the world. In fact, T-mobile USA controls more
than 4,100 hotspots located in public locations such as Starbucks, Borders, Kinko.s, and the
airline clubs of Delta, United, and US Airways. Even select McDonald.s restaurants now
feature Wi-Fi hotspot access.
Any notebook computer with integrated wireless, a wireless adapter attached to the
motherboard by the manufacturer, or a wireless adapter such as a PCMCIA card can access a
wireless network. Furthermore, all Pocket PCs or Palm units with Compact Flash, SD I/O
support, or built-in Wi-Fi, can access hotspots.
Some Hotspots require WEP key to connect that is the connection is considered to be private
or secure. As for open connections, anyone with a WiFi card can gain access to that hotspot.
So in order for a user to gain access to the internet under WEP, the user must input the WEP
key code.
Basic Components of a Wireless Network
It controls the speed, security requirements, allowed devices, and many other functions of the
wireless network. It’s the “center” of your WiFi network.
Client Device
Client devices are really anything that wirelessly connects to the AP or wireless router. These
can be anything from an Apple or Dell laptop, to your iPhone, even your refrigerator. The
other devices below (client bridge and repeater) are also client devices, just unique ones.
The client devices have the same wireless systems built into them as an AP or wireless router,
they just use them in a different way. There can even be client-device to client-device
networks that operate without an AP or router, these are called “ad-hoc” networks. Since
they’re unique (and rare) we’ll talk about ad-hoc networks in some other articles.
Client Bridge
A client bridge is a type of client device that bridges the wireless network with the wired
network. It’s basically like a reverse AP. The function of the AP is to bridge the wired
network onto a wireless network, and the client bridge takes that and re-reverses into another
wired segment. This can be useful if you have a device such as a printer or Xbox that doesn’t
support wireless, but you want to connect it to the network without using CAT5 Ethernet
cable. You simply get a client bridge device, connect it to the wireless network, then connect
the wired device to the bridge
Repeater
Repeaters are often a barely-necessary evil. I think of them as a “hack”, something that sort-
of does the job, but doesn’t do it well. Repeaters act sort-of like a client bridge, but instead of
bridging the wireless network to a wired network segment, they bridge it to another area of
the wireless network. This extends the range of the wireless network to devices that are near
the repeater, but it does it at the cost of bandwidth and speed. The repeater uses up twice the
bandwidth of a normal client device because it has to capture information then re-send it back
out on the same channel that it just received it on.
The IEEE (The Institute of Electrical and Electronics Engineers) creates and finalizes
standards for computer
networks, amongst other technologies. The IEEE 802.11 specification defines how wireless
networks
communicate. As a comparison, most wired networks based on Ethernet and CSMA/CD
(defined later)
technology conform to the 802.3 standard.
The Wi-Fi Alliance, to which all enterprise product manufacturers belong, guides the
development of standards
through product testing.
802.11g
Main article: IEEE 802.11g-2003
In June 2003, a third modulation standard was ratified: 802.11g. This works in the 2.4 GHz
band (like 802.11b), but uses the same OFDM based transmission scheme as 802.11a. It
operates at a maximum physical layer bit rate of 54 Mbit/s exclusive of forward error
correction codes, or about 22 Mbit/s average throughput.[13] 802.11g hardware is fully
backward compatible with 802.11b hardware and therefore is encumbered with legacy issues
that reduce throughput when compared to 802.11a by ~21%.
The then-proposed 802.11g standard was rapidly adopted by consumers starting in January
2003, well before ratification, due to the desire for higher data rates as well as to reductions
in manufacturing costs. By summer 2003, most dual-band 802.11a/b products became dual-
band/tri-mode, supporting a and b/g in a single mobile adapter card or access point. Details of
making b and g work well together occupied much of the lingering technical process; in an
802.11g network, however, activity of an 802.11b participant will reduce the data rate of the
overall 802.11g network.
Like 802.11b, 802.11g devices suffer interference from other products operating in the
2.4 GHz band, for example wireless keyboards.
802.11-2007
In 2003, task group TGma was authorized to "roll up" many of the amendments to the 1999
version of the 802.11 standard. REVma or 802.11ma, as it was called, created a single
document that merged 8 amendments (802.11a, b, d, e, g, h, i, j) with the base standard. Upon
approval on March 8, 2007, 802.11REVma was renamed to the then-current base
standard IEEE 802.11-2007.
802.11n
Main article: IEEE 802.11n-2009
802.11n is an amendment which improves upon the previous 802.11 standards by
adding multiple-input multiple-output antennas (MIMO). 802.11n operates on both the
2.4 GHz and the lesser used 5 GHz bands. Support for 5 GHz bands is optional. It operates at
a maximum net data rate from 54 Mbit/s to 600 Mbit/s. The IEEE has approved the
amendment and it was published in October 2009.[15][16] Prior to the final ratification,
enterprises were already migrating to 802.11n networks based on the Wi-Fi Alliance's
certification of products conforming to a 2007 draft of the 802.11n proposal.
802.11-2012
In 2007, task group TGmb was authorized to "roll up" many of the amendments to the 2007
version of the 802.11 standard. REVmb or 802.11mb, as it was called, created a single
document that merged ten amendments (802.11k, r, y, n, w, p, z, v, u, s) with the 2007 base
standard. In addition much cleanup was done, including a reordering of many of the clauses.
[17]
Upon publication on March 29, 2012, the new standard was referred to as IEEE 802.11-
2012.
802.11ac
Main article: IEEE 802.11ac
IEEE 802.11ac is a standard under development which will provide throughput in the 5 GHz
band. This specification will enable higher multi-station WLAN throughput of at least
1 gigabit per second and a maximum single link throughput of at least 500 megabits per
second, by using wider RF bandwidth (80 or 160 MHz), more streams (up to 8), and high-
density modulation (up to 256 QAM).
802.11ad
Main article: IEEE 802.11ad
IEEE 802.11ad "WiGig" is a published standard that is already seeing a major push from
hardware manufacturers. On 24 July 2012 Marvell and Wilocity announced a new
partnership[18] to bring a new tri-band Wi-Fi solution to market. Using 60 GHz, the new
standard can achieve a theoretical maximum throughput of up to 7 Gbit/s.[19] This standard is
expected to reach the market sometime in early 2014.
Wi-Fi Network Topology
A basic topology of an 802.11 networks in its simplest form consists of two or more wireless
nodes,or stations (STAs),which have recognized each other and have established
communications.
There are two different cases:
Independent Basic Service Set (IBSS): An IBSS consists of a group of 802.11 stations
communicating directly with one another. An IBSS is also referred to as an ad-hoc network
because it is essentially a simple peer-to-peer WLAN. Figure 2-1 illustrates how two stations
equipped with 802.11 network interface cards (NICs) can form an IBSS and communicate
directly with one another.
Extended Service Set (ESS) : An extended service set (ESS) is one or more interconnected
basic service sets (BSSs) and their associated LANs. Each BSS consists of a single access
point (AP) together with all wireless client devices (stations, also called STAs) creating a
local or enterprise 802.11 wireless LAN (WLAN). To the logical link control layer (part of
layer 2 of the 7-layer OSI Reference Model) the ESS appears as a solitary BSS at any one of
the STAs.
Wireless Security
Advantages of Wi-Fi
The main advantages of using Wi-Fi technology is the lack of wires. This is a wireless
connection that can merge together multiple devices.
Wi-Fi network is particularly useful in cases where the wiring is not possible or even
unacceptable. For example, it is often used in the halls of conferences and international
exhibitions. It is ideal for buildings that are considered architectural monuments of
history, as it excludes the wiring cables.
Wi-Fi networks are widely used to connect a variety of devices, not only between
themselves but also to the Internet. And almost all modern laptops, tablets, and some
mobile phones have this feature. It is very convenient and allows you to connect to the
internet almost anywhere, not just where the cables are laid. Today, you canaccess the
network, for example, being in the park for a walk across the street or in an airport
lounge. The main thing that was available near the point of Wi-Fi.
Another advantage can be pretty easy to create a mesh Wi-Fi. To connect a new device to
your network, simply turn on the Wi-Fi and do the simple setting in the software. In the
case of wire technologies still need to pull the wire. Therefore, many modern offices are
switching to this technology.
There are following issues which are assumed to be the cause of the sluggish adoption of
Wi-Fi technology:
Security Problems: Security concerns have held back Wi-Fi adoption in the
corporate world. Hackers and security consultants have demonstrated how easy it can
be to crack the current security technology, known as wired equivalent privacy
(WEP), used in most Wi-Fi connections. A hacker can break into a Wi-Fi network
using readily available materials and software.
Billing Issues: Wi-Fi vendors are also looking for ways to solve the problem of back-
end integration and billing that has dogged the roll-out of commercial Wi-Fi hotspots.
Some of the ideas under consideration for Wi-Fi billing include per day, per hour and
unlimited monthly connection fees.
Wi-Fi Summary
WiFi is a universal wireless networking technology that utilizes radio frequencies to transfer
data. WiFi allows for high speed Internet connections without the use of cables or wires.
The term Wi-Fi is a contraction of "wireless fidelity" and commonly used to refer to wireless
networking technology. The Wi-Fi Alliance claims rights in its uses as a certification mark
for equipment certified to 802.11x standards.
Wi-Fi is a freedom, freedom from wires. It allows you to connect to the Internet from just
about anywhere - a coffee shop, a bed in a hotel room or a conference room at work without
wires. And the best thing of all, it's super fast - almost 10 times faster than a regular dial-up
connection. Wi-Fi networks operate in the unlicensed 2.4 radio bands, with an 11 Mbps
(802.11b) or 54 Mbps (802.11a) data rate, respectively.
To access Wi-Fi, you need enabled devices (laptops or PDAs). These devices can send and
receive data wirelessly from any location equipped with Wi-Fi access.
APPLICATIONS
1. Deploying HD video over Wi-Fi
Large enterprises that rollout HD video conferencing.
Hospitals or medical clinics utilizing Wi-Fi for HD medical imaging and surgical
procedures.
Universities or other higher-education facilities deploying campus-wide IPTV and
video streaming.
2. Projecting HD images and video from mobile devices
Large enterprises utilizing Apple TV/Bonjour gateways in conference rooms and
other gathering spaces.
Education (primary/K-12 schools and higher-education facilities) to promote active
learning spaces/collaboration/distance learning.
3. High client-dense Wi-Fi environments
Enterprise networks with large common areas / conference rooms that need additional
capacity.
Large public venues (LPVs)/hotspot operators – stadiums, movie theaters, shopping
arcades where large numbers of consumers/guests congregate and utilize publicly
available Wi-Fi.
Education (primary/K-12 /universities) accommodating large numbers of students and
devices in auditoriums and common gathering areas.
4. Deploying interactive applications
LPVs – movie theaters/shopping arcades/sporting stadiums that are adopting point-of-
view (POV) applications for greater interaction with guests and VIPs.
5. Adoption of the All Wireless Office
Large enterprises migrating away from static computing environments, opening their
floor plans and utilizing Ethernet strictly for PoE+/transport with Wi-Fi as the only
medium for edge connectivity.
6. 802.11a/b/g migration and greenfield Wi-Fi opportunities
Enterprises migrating off legacy technology and bypassing 802.11n to deploy the
latest Wi-Fi standard.
Organizations looking to deliver better RF management and traffic prioritization
while future-proofing the network.
7. Increasing performance and reliability of mission-critical applications
Large enterprises looking to overcome performance issues and reliability concerns for
rolling out large scale Microsoft Lync, VDI, mobile CRM, and other applications over
Wi-Fi.
FUTURE SCOPE
1. 5G
The next generation of wireless connectivity is 5G, and it’s already here, although not yet in
full force. Telecom companies have started to roll out their 5G networks, and they should be
fully available within the next five years or so.
2. 6G
Even though 5G is just now being introduced, the industry is already preparing for the next
generation of technology, 6G. The Center for Converged TeraHertz Communications and
Sensing (ComSenTer), part of the Semiconductor Research Corporation, is researching the
radio technologies that will enable the sixth generation of wireless tech.
3. Massive MIMO Antennas
Massive multiple input, multiple output (MIMO) antennas will be an important technology
for enabling 5G and eventually 6G networks. Instead of having just a few antennas at each
end of a link, a Massive MIMO system has a much larger number of antennas. This enables
multiple signals to travel over the same radio channel at the same time, meaning that the
capacity of the system is much higher.
4. The Future of LTE
LTE is a standard used for high-speed wireless communications and describes the path
toward achieving true 4G speeds. LTE is today, along with LTE Advanced (LTE-A) and
LTE-A Pro, part of the 4G LTE system. These technologies help handle capacity demands
and increase speed. They will also act as a stepping stone to 5G by inching speeds closer to
what will be possible with the fifth generation of wireless connectivity tech. As 5G begins to
roll out, LTE technologies will fill in the gaps where coverage doesn’t exist yet. 4G will play
a similar role.
5. Li-Fi
Another exciting future wireless technology is Li-Fi, which is similar to Wi-Fi but uses
visible light waves instead of radio waves to send data. Researchers at the University of
Edinburgh have worked to develop the technology, and it has been tested at a factory in
Estonia.
6. Wireless Charging
Our world is also becoming wireless in ways that go beyond communications. Wireless
charging has now become available, and the technology is quickly improving. Current
wireless charging isn’t truly wireless, as it requires plugging the charger into the wall. You
can then lay your device on the charging mat or plate without having to use wires to connect
it to the charger. The devices still need to be in contact with the charger though.
Conclusion
We started by showing that, in the presence of rate diversity, the throughput-based fairness
notion implemented by the 802.11's popular MAC protocol and the traditional queuing
schemes at the APs leads to a situation in which the aggregate throughput is determined
largely by the slowest node.
We next presented a time-based notion of fairness that provides an equal amount of long-term
channel occupancy time to each competing node. This prevents faster nodes from being
dragged down by slower ones. Moreover, it satisfies what we called the baseline property,
i.e., the achieved throughput of any competing node in a multi-rate WLAN is equal to what it
would achieve in a single-rate WLAN in which all competing nodes transmit at its data rate.
In the presence of rate diversity, using this definition of fairness can lead to vastly improved
aggregate network throughput, more than 100% in some realistic scenarios.
We next described a practical scheme called TBR that works in conjunction with any MAC
protocol to provide long-term time-based fairness in AP-based WLANs by appropriately
scheduling packet transmissions. We showed that TBR can be implemented in an AP driver
in a way that is backwards compatible with existing 802.11 standard. We implemented our
scheme in the Linux Hostap driver running on a PC used as the AP, and evaluated it through
a series of experiments. In the absence of rate diversity, the performance of our
implementation is equivalent to the standard implementation. In the presence of rate
diversity, it achieves the predicted gains.
In today's AP-based 802.11b WLANs, rate diversity is already common as our trace analyses
show. As newer standards such as 802.11g are deployed, the problem will become worse. For
an extended period of time 802.11 WLANs will run in a mixed mode, and if 802.11g clients
are slowed down to run at the rate of 802.11b clients, there will be little incentive to upgrade.
Already, some vendors, e.g., D-Link and Netgear, are beginning to implement ad
hoc proprietary mechanisms to give their 802.11g priority over 802.11b cards in accessing
the channels. A more systematic cross-manufacturer solution would be preferable. We
believe that switching to time-based fairness is a good option.
REFERENCES
1. IEEE 802.11: Wireless LAN Medium Access Control (MAC) and Physical Layer
(PHY) Specifications. (2016 revision). IEEE-SA. 14 December
2016. doi:10.1109/IEEESTD.2016.7786995. ISBN 978-1-5044-3645-8.
2. IEEE 802.11k-2008—Amendment 1: Radio Resource Measurement of Wireless
LANs (PDF). IEEE-SA. 12 June
2008. doi:10.1109/IEEESTD.2008.4544755. ISBN 978-0-7381-5420-6.
3. IEEE 802.11r-2008—Amendment 2: Fast Basic Service Set (BSS)
Transition (PDF). IEEE-SA. 15 July
2008. doi:10.1109/IEEESTD.2008.4573292. ISBN 978-0-7381-5422-0.
4. IEEE 802.11y-2008—Amendment 3: 3650–3700 MHz Operation in
USA (PDF). IEEE-SA. 6 November
2008. doi:10.1109/IEEESTD.2008.4669928. ISBN 978-0-7381-5765-8.
5. "History of Wireless". Johns Hopkins Bloomberg School of Public Health. Archived
from the original on 2007-02-10. Retrieved 2007-02-17.
6. ^ Wayne Caswell (November 17, 2010). "HomeRF Archives". Retrieved July
16, 2011.
7. ^ "Is this the same as Ad Hoc mode?". Archived from the original on 2013-08-30.
8. ^ "Wireless Distribution System Linked Router Network". DD-WRT Wiki.
Retrieved December 31, 2006.
9. ^ "How Wi-Fi Roaming Really Works". Retrieved 2008-10-09.