Wifi and 3rd Generation

Embed Size (px)

Citation preview

  • 8/13/2019 Wifi and 3rd Generation

    1/20

  • 8/13/2019 Wifi and 3rd Generation

    2/20

    Wi-Fi was most commonly used in the home, when people had many de4ices they wanted to put on thesame network. This allowed for seamless file-sharing between computers and fewer cables to trip o4er.

    s laptops became more common, the need for an 'nternet connection that allowed for portability becamemore rele4ant.5ublic hotspots were initially paid, at places like coffee shops and restaurants, and critics

    were skeptical of their longe4ity and for good reason/. "ow, Wi-Fi is usually offered free as a ser4ice tocustomers in an airport or coffee shop, but hotspots are popping up e4en in less commerce-focusedlocations like subways, airplanes and phone booths.

    Wi-Fi

    Wi-Fi , also spelledWifi or WiFi , is a popular technology that allows an electronic de4ice to e3change

    data or connect to the internetwirelesslyusingradio wa4es. The name is a trademark name, and wasstated to be a play onthe audiophile term$i-Fi. The Wi-Fi lliance defines Wi-Fi as any %wireless localarea network W6 "/ products that are based on the'nstitute of *lectrical and *lectronics *ngineers!

    '***/ 012.(( standards%.7(8$owe4er, since most modern W6 "s are based on these standards, the term%Wi-Fi% is used in general *nglish as a synonym for %W6 "%. 9nly Wi-Fi products that complete Wi-

    llianceinteroperability certification testing successfully may use the %Wi-Fi +* T'F'* % trademark.

    &any de4ices can use Wi-Fi, e.g. personal computers, 4ideo-game consoles, smartphones, some digitalcameras, tablet computers and digital audio players. These can connect to a network resource such as the

    'nternet 4ia awireless network access point. uch an access point orhotspot/ has a range of about 21meters ;< feet/ indoors and a greater range outdoors. $otspot co4erage can comprise an area as small asa single room with walls that block radio wa4es, or as large as many s=uare miles achie4ed by usingmultiple o4erlapping access points.

    http://mashable.com/2012/07/11/new-york-payphone-hotspot/http://mashable.com/2012/07/11/new-york-payphone-hotspot/http://en.wikipedia.org/wiki/Wireless_networkhttp://en.wikipedia.org/wiki/Radio_waveshttp://en.wikipedia.org/wiki/Wi-Fi#The_namehttp://en.wikipedia.org/wiki/Punhttp://en.wikipedia.org/wiki/Audiophilehttp://en.wikipedia.org/wiki/Hi-Fihttp://en.wikipedia.org/wiki/Wi-Fi_Alliancehttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Institute_of_Electrical_and_Electronics_Engineershttp://en.wikipedia.org/wiki/802.11http://en.wikipedia.org/wiki/Wi-Fi#cite_note-1http://en.wikipedia.org/wiki/Interoperabilityhttp://en.wikipedia.org/wiki/Smartphonehttp://en.wikipedia.org/wiki/Tablet_computerhttp://en.wikipedia.org/wiki/Wireless_access_pointhttp://en.wikipedia.org/wiki/Hotspot_(Wi-Fi)http://mashable.com/2012/07/11/new-york-payphone-hotspot/http://en.wikipedia.org/wiki/Wireless_networkhttp://en.wikipedia.org/wiki/Radio_waveshttp://en.wikipedia.org/wiki/Wi-Fi#The_namehttp://en.wikipedia.org/wiki/Punhttp://en.wikipedia.org/wiki/Audiophilehttp://en.wikipedia.org/wiki/Hi-Fihttp://en.wikipedia.org/wiki/Wi-Fi_Alliancehttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Institute_of_Electrical_and_Electronics_Engineershttp://en.wikipedia.org/wiki/802.11http://en.wikipedia.org/wiki/Wi-Fi#cite_note-1http://en.wikipedia.org/wiki/Interoperabilityhttp://en.wikipedia.org/wiki/Smartphonehttp://en.wikipedia.org/wiki/Tablet_computerhttp://en.wikipedia.org/wiki/Wireless_access_pointhttp://en.wikipedia.org/wiki/Hotspot_(Wi-Fi)
  • 8/13/2019 Wifi and 3rd Generation

    3/20

    epiction of a de4ice sending information wirelessly to another de4ice, both connected to the localnetwork, in order to print a document.Wi-Fi can be less secure than wired connections such as*thernet/ because an intruder does not need a physical connection. Web pages that use 6are secure butunencrypted internet access can easily be detected by intruders. Because of this, Wi-Fi has adopted4arious encryption technologies. The early encryption W*5, pro4ed easy to break. $igher =uality protocols W5 , W5 2/ were added later. n optional feature added in 211>, calledWi-Fi 5rotected

    etup W5 /, had a serious flaw that allowed an attacker to reco4er the router!s password.. The Wi-Filliance has since updated its test plan and certification program to ensure all newly certified de4ices

    resist attacks.

    History

    Main article: History of IEEE 802.11

    012.(( technology has its origins in a ()0< ruling by the Federal +ommunications +ommission thatreleased the' & band for unlicensed use. 'n ())(, "+ +orporation with T@T +orporation in4entedthe precursor to 012.(( intended for use in cashier systems. The first wireless products were under thename Wa4e6 " .

    The 012.(( standard uses a large number of patents held by many different organiAations.

    ome ha4e dubbed utch engineeric $ayes the %father of Wi-Fi% due to his in4ol4ement in negotiatingthe initial standards within the'*** while chairing the workgroup.

    The ustralian radio-astronomerCohn 9! ulli4an de4eloped a key patent used in Wi-Fi as a by-product in

    a + ' 9 research proDect, %a failed e3periment to detect e3ploding mini black holes the siAe of an atom particle%. 'n ())2 and ());, ustralian organiAation + ' 9 the ustralian+ommonwealth cientificand 'ndustrial esearch 9rganisation/ obtained patents for a method later used in Wi-Fi to %unsmear% thesignal.8

    'n ())), the Wi-Fi lliance formed as a trade association to hold the Wi-Fi trademark under which most products are sold.

    http://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Transport_Layer_Securityhttp://en.wikipedia.org/wiki/Wired_Equivalent_Privacyhttp://en.wikipedia.org/wiki/Wi-Fi_Protected_Accesshttp://en.wikipedia.org/wiki/Wi-Fi_Protected_Setuphttp://en.wikipedia.org/wiki/Wi-Fi_Protected_Setuphttp://en.wikipedia.org/wiki/History_of_IEEE_802.11http://en.wikipedia.org/wiki/ISM_bandhttp://en.wikipedia.org/wiki/NCR_Corporationhttp://en.wikipedia.org/wiki/AT%26T_Corporationhttp://en.wikipedia.org/wiki/WaveLANhttp://en.wikipedia.org/wiki/Vic_Hayeshttp://en.wikipedia.org/wiki/Institute_of_Electrical_and_Electronics_Engineershttp://en.wikipedia.org/wiki/John_O'Sullivan_(engineer)http://en.wikipedia.org/wiki/CSIROhttp://en.wikipedia.org/wiki/Australianhttp://en.wikipedia.org/wiki/Commonwealth_Scientific_and_Industrial_Research_Organisationhttp://en.wikipedia.org/wiki/Commonwealth_Scientific_and_Industrial_Research_Organisationhttp://en.wikipedia.org/wiki/Wi-Fi#cite_note-9http://en.wikipedia.org/wiki/Wi-Fi_Alliancehttp://en.wikipedia.org/wiki/File:Wi-Fi.gifhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Transport_Layer_Securityhttp://en.wikipedia.org/wiki/Wired_Equivalent_Privacyhttp://en.wikipedia.org/wiki/Wi-Fi_Protected_Accesshttp://en.wikipedia.org/wiki/Wi-Fi_Protected_Setuphttp://en.wikipedia.org/wiki/Wi-Fi_Protected_Setuphttp://en.wikipedia.org/wiki/History_of_IEEE_802.11http://en.wikipedia.org/wiki/ISM_bandhttp://en.wikipedia.org/wiki/NCR_Corporationhttp://en.wikipedia.org/wiki/AT%26T_Corporationhttp://en.wikipedia.org/wiki/WaveLANhttp://en.wikipedia.org/wiki/Vic_Hayeshttp://en.wikipedia.org/wiki/Institute_of_Electrical_and_Electronics_Engineershttp://en.wikipedia.org/wiki/John_O'Sullivan_(engineer)http://en.wikipedia.org/wiki/CSIROhttp://en.wikipedia.org/wiki/Australianhttp://en.wikipedia.org/wiki/Commonwealth_Scientific_and_Industrial_Research_Organisationhttp://en.wikipedia.org/wiki/Commonwealth_Scientific_and_Industrial_Research_Organisationhttp://en.wikipedia.org/wiki/Wi-Fi#cite_note-9http://en.wikipedia.org/wiki/Wi-Fi_Alliance
  • 8/13/2019 Wifi and 3rd Generation

    4/20

    'n pril 211), (E technology companies agreed to pay + ' 9 2< companies from around the world. The Wi-Fi lliance enforcesthe use of the Wi-Fi brand to technologies based on the'*** 012.(( standards from the '***. Thisincludes wireless local area networkW6 "/ connections, de4ice to de4ice connecti4ity such as Wi-Fi

    5eer to 5eer aka Wi-Fi irect/, 5ersonal area network 5 "/, local area network 6 "/ and e4en somelimitedwide area network W "/ connections. &anufacturers with membership in the Wi-Fi lliance,whose products pass the certification process, gain the right to mark those products with the Wi-Fi logo.

    pecifically, the certification process re=uires conformance to the '*** 012.(( radio standards, theW5and W5 2 security standards, and the* 5 authentication standard. +ertification may optionally include

    http://en.wikipedia.org/wiki/Interbrandhttp://en.wikipedia.org/wiki/Punhttp://en.wikipedia.org/wiki/High_fidelityhttp://en.wikipedia.org/wiki/High_fidelityhttp://en.wikipedia.org/wiki/Fidelityhttp://en.wikipedia.org/wiki/Wirelesshttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Advertising_sloganhttp://en.wikipedia.org/wiki/Yin-yanghttp://en.wikipedia.org/wiki/Interoperabilityhttp://en.wikipedia.org/wiki/Motorola_Canopyhttp://en.wikipedia.org/wiki/Fixed_wirelesshttp://en.wikipedia.org/wiki/Fixed_wirelesshttp://en.wikipedia.org/wiki/2Ghttp://en.wikipedia.org/wiki/3Ghttp://en.wikipedia.org/wiki/4Ghttp://en.wikipedia.org/wiki/Institute_of_Electrical_and_Electronics_Engineershttp://en.wikipedia.org/wiki/Non-profithttp://en.wikipedia.org/wiki/Backward_compatibilityhttp://en.wikipedia.org/wiki/Wirelesshttp://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Personal_area_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Wide_area_networkhttp://en.wikipedia.org/wiki/Wi-Fi_Protected_Accesshttp://en.wikipedia.org/wiki/Wi-Fi_Protected_Accesshttp://en.wikipedia.org/wiki/Extensible_Authentication_Protocolhttp://en.wikipedia.org/wiki/Interbrandhttp://en.wikipedia.org/wiki/Punhttp://en.wikipedia.org/wiki/High_fidelityhttp://en.wikipedia.org/wiki/Fidelityhttp://en.wikipedia.org/wiki/Wirelesshttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Advertising_sloganhttp://en.wikipedia.org/wiki/Yin-yanghttp://en.wikipedia.org/wiki/Interoperabilityhttp://en.wikipedia.org/wiki/Motorola_Canopyhttp://en.wikipedia.org/wiki/Fixed_wirelesshttp://en.wikipedia.org/wiki/Fixed_wirelesshttp://en.wikipedia.org/wiki/2Ghttp://en.wikipedia.org/wiki/3Ghttp://en.wikipedia.org/wiki/4Ghttp://en.wikipedia.org/wiki/Institute_of_Electrical_and_Electronics_Engineershttp://en.wikipedia.org/wiki/Non-profithttp://en.wikipedia.org/wiki/Backward_compatibilityhttp://en.wikipedia.org/wiki/Wirelesshttp://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Personal_area_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Wide_area_networkhttp://en.wikipedia.org/wiki/Wi-Fi_Protected_Accesshttp://en.wikipedia.org/wiki/Wi-Fi_Protected_Accesshttp://en.wikipedia.org/wiki/Extensible_Authentication_Protocol
  • 8/13/2019 Wifi and 3rd Generation

    5/20

    tests of '*** 012.(( draft standards, interaction with cellular-phone technology in con4erged de4ices,and features relating to security set-up, multimedia, and power-sa4ing.

    "ot e4ery Wi-Fi de4ice is submitted for certification. The lack of Wi-Fi certification does not necessarilyimply that a de4ice is incompatible with other Wi-Fi de4ices. 'f it is compliant or partly compatible, theWi-Fi lliance may not obDect to its description as a Wi-Fi de4ice though technically only certifiedde4ices are appro4ed. The Wi-Fi lliance may or may not sanction deri4ati4e terms, such as uper Wi-Fi,coined by the Federal +ommunications +ommissionF++/ to describe proposed networking in the

    $F T band in the .

    Uses

    sticker indicating to the public that a location is within range of a Wi-Fi network. dot with cur4edlines radiating from it is a common symbol for Wi-Fi, representing a point transmitting a signal.72;8

    To connect to a Wi-Fi 6 ", a computer has to be e=uipped with awireless network interface controller.

    The combination of computer and interface controller is called a station . ll stations share a single radiofre=uency communication channel. Transmissions on this channel are recei4ed by all stations withinrange. The hardware does not signal the user that the transmission was deli4ered and is therefore calleda best-effort deli4erymechanism. carrier wa4e is used to transmit the data in packets, referred to as%*thernet frames%. *ach station is constantly tuned in on the radio fre=uency communication channel to pick up a4ailable transmissions.

    Internet access Wi-Fi-enabled de4ice can connect to the 'nternet when within range of awireless network which is

    configured to permit this. The co4erage of one or more interconnected/ access points Jcalled hotspotsJ can e3tend from an area as small as a few rooms to as large as many s=uare miles. +o4erage in the largerarea may re=uire a group of access points with o4erlapping co4erage. 9utdoor public Wi-Fi technologyhas been used successfully inwireless mesh networks in 6ondon, K.

    Wi-Fi pro4ides ser4ice in pri4ate homes, high street chains and independent businesses, as well as in public spaces at Wi-Fi hotspots set up either free-of-charge or commercially, often using a +apti4e

    http://en.wikipedia.org/wiki/Super_Wi-Fihttp://en.wikipedia.org/wiki/Federal_Communications_Commissionhttp://en.wikipedia.org/wiki/Wi-Fi#cite_note-26http://en.wikipedia.org/wiki/Wireless_network_interface_controllerhttp://en.wikipedia.org/wiki/Best-effort_deliveryhttp://en.wikipedia.org/wiki/Ethernet_framehttp://en.wikipedia.org/wiki/Wireless_networkhttp://en.wikipedia.org/wiki/Wireless_access_pointhttp://en.wikipedia.org/wiki/Wireless_mesh_networkhttp://en.wikipedia.org/wiki/Captive_portalhttp://en.wikipedia.org/wiki/File:Au_wifi.jpghttp://en.wikipedia.org/wiki/Super_Wi-Fihttp://en.wikipedia.org/wiki/Federal_Communications_Commissionhttp://en.wikipedia.org/wiki/Wi-Fi#cite_note-26http://en.wikipedia.org/wiki/Wireless_network_interface_controllerhttp://en.wikipedia.org/wiki/Best-effort_deliveryhttp://en.wikipedia.org/wiki/Ethernet_framehttp://en.wikipedia.org/wiki/Wireless_networkhttp://en.wikipedia.org/wiki/Wireless_access_pointhttp://en.wikipedia.org/wiki/Wireless_mesh_networkhttp://en.wikipedia.org/wiki/Captive_portal
  • 8/13/2019 Wifi and 3rd Generation

    6/20

    portal webpage for access. 9rganiAations and businesses, such as airports, hotels, and restaurants, often pro4ide free-use hotspots to attract customers. *nthusiasts or authorities who wish to pro4ide ser4ices ore4en to promote business in selected areas sometimes pro4ide free Wi-Fi access.

    outersthat incorporate adigital subscriber line modem or acable modem and a Wi-Fi access point,often set up in homes and other buildings, pro4ide 'nternet access andinternetworkingto all de4icesconnected to them, wirelessly or 4ia cable.

    imilarly, there are battery-powered routers that include a cellular mobile 'nternet radiomodem and Wi-Faccess point. When subscribed to a cellular phone carrier, they allow nearby Wi-Fi stations to access the'nternet o4er 2I, HI, or EI networks. &any smartphones ha4e a built-in capability of this sort, includingthose based on ndroid, BlackBerry, Bada, i9 i5hone/, Windows 5honeand ymbian, though carriersoften disable the feature, or charge a separate fee to enable it, especially for customers with unlimited da plans. %'nternet packs% pro4ide standalone facilities of this type as well, without use of a smartphoneLe3amples include the&iFi- andWiBro-branded de4ices. ome laptops that ha4e a cellular modem cardcan also act as mobile 'nternet Wi-Fi access points.

    Wi-Fi also connects places that normally don!t ha4e network access, such as kitchens and garden sheds.

    City-wide Wi-Fi

    n outdoor Wi-Fi access point

    'n the early 2111s, many cities around the world announced plans to construct city-wide Wi-Fi networks.

    There are many successful e3amplesL in 211E,&ysore became 'ndia!s first Wi-Fi-enabled city and secondin the world afterCerusalem. company called WiFiy"et has set up hotspots in &ysore, co4ering thecomplete city and a few nearby 4illages.

    'n 211

  • 8/13/2019 Wifi and 3rd Generation

    7/20

    'n &ay 21(1, 6ondon, K, &ayor Boris Cohnson pledged to ha4e 6ondon-wide Wi-Fi by 21(2. e4eral boroughs including Westminster and 'slington already ha4e e3tensi4e outdoor Wi-Fi co4erage.

    9fficials in outh Korea!s capital are mo4ing to pro4ide free 'nternet access at more than (1,111 locationsaround the city, including outdoor public spaces, maDor streets and densely populated residential areas.

    eoul will grant leases to KT, 6I Telecom and K Telecom. The companies will in4est EE million inthe proDect, which will be completed in 21(

  • 8/13/2019 Wifi and 3rd Generation

    8/20

    keychain-siAe Wi-Fi detector

    Advanta esWi-Fi allows cheaper deployment oflocal area networks 6 "s/. lso spaces where cables cannot be

    run, such as outdoor areas and historical buildings, can host wireless 6 "s.&anufacturers are building wireless network adapters into most laptops. The price of chipsets for Wi-Ficontinues to drop, making it an economical networking option included in e4en more de4ices.

    ifferent competiti4e brands of access points and client network-interfaces can inter-operate at a basicle4el of ser4ice. 5roducts designated as %Wi-Fi +ertified% by the Wi-Fi lliance are backwardscompatible. nlikemobile phones, any standard Wi-Fi de4ice will work anywhere in the world.

    Wi-Fi 5rotected ccessencryption W5 2/ is considered secure, pro4ided a strong passphrase is used. "ew protocols for=uality-of-ser4ice W&&/ make Wi-Fi more suitable for latency-sensiti4e applications

    such as 4oice and 4ideo/. 5ower sa4ing mechanisms W&& 5ower a4e/ e3tend battery life.

    "imitationspectrum assignments and operational limitations are not consistent worldwide: ustralia and *urope

    allow for an additional two channels beyond those permitted in the for the 2.E I$A band (M(H 4s. (((/, while Capan has one more on top of that (M(E/.

    Wi-Fi signal occupies fi4e channels in the 2.E I$A band. ny two channel numbers that differ by fi4eor more, such as 2 and >, do not o4erlap. The oft-repeated adage that channels (, ;, and (( are

    the only non-o4erlapping channels is, therefore, not accurate. +hannels (, ;, and (( are the only grou ofthree non-o4erlapping channels in "orth merica and the nited Kingdom. 'n *urope and Capan using+hannels (,

  • 8/13/2019 Wifi and 3rd Generation

    9/20

    012.((a and optionally by 012.((n. 9n wireless routers with detachable antennas, it is possible toimpro4e range by fitting upgraded antennas which ha4e higher gain in particular directions. 9utdoorranges can be impro4ed to many kilometers through the use of high gaindirectional antennas at the routerand remote de4ice s/. 'n general, the ma3imum amount of power that a Wi-Fi de4ice can transmit is

    limited by local regulations, such asF++ 5art (< in the .

    ue to reach re=uirements for wireless 6 " applications, Wi-Fi has fairly high power consumptioncompared to some other standards. Technologies such asBluetooth designed to supportwireless5 " applications/ pro4ide a much shorter propagationrange between ( and (11m7E28 and so ingeneral ha4e a lower power consumption. 9ther low-power technologies such asNigBeeha4e fairly longrange, but much lower data rate. The high power consumption of Wi-Fi makes battery life in mobilede4ices a concern.

    esearchers ha4e de4eloped a number of %no new wires% technologies to pro4ide alternati4es to Wi-Fiapplications in which Wi-Fi!s indoor range is not ade=uate and where installing new wires such as+ T-; / is not possible or cost-effecti4e. For e3ample, the'T -T I.hn standard for high speed6ocal areanetworksuses e3isting home wiring coa3ial cables, phone lines and power lines/. lthoughI.hn does not pro4ide some of the ad4antages of Wi-Fi such as mobility or outdoor use/, it!s designed for application

    such as '5T distribution/ where indoor range is more important than mobility.

    ue to the comple3 nature of radio propagationat typical Wi-Fi fre=uencies, particularly the effects ofsignal reflection off trees and buildings, algorithms can only appro3imately predict Wi-Fi signal strengthfor any gi4en area in relation to a transmitter. This effect does not apply e=ually tolong-range Wi-Fi,

    since longer links typically operate from towers that transmit abo4e the surrounding foliage.

    The practical range of Wi-Fi essentially confines mobile use to such applications as in4entory-takingmachines in warehouses or in retail spaces, barcode-reading de4ices at check-out stands, orrecei4ingGshipping stations. &obile use of Wi-Fi o4er wider ranges is limited, for instance, to uses such in an automobile mo4ing from one hotspot to another. 9ther wireless technologies are more suitable forcommunicating with mo4ing 4ehicles.

    Data security risksThe most common wirelessencryption-standard, Wired *=ui4alent 5ri4acy W*5/, has been shownto beeasily breakable e4en when correctly configured.Wi-Fi 5rotected ccess W5 and W5 2/ encryption,which became a4ailable in de4ices in 211H, aimed to sol4e this problem. Wi-Fiaccess points typicallydefault to an encryption-free o en/ mode. "o4ice users benefit from a Aero-configuration de4ice thatworks out-of-the-bo3, but this default does not enable anywireless security, pro4iding open wirelessaccess to a 6 ". To turn security on re=uires the user to configure the de4ice, usually 4ia asoftwaregraphical user interface I '/. 9n unencrypted Wi-Fi networks connecting de4ices can monitor

    http://en.wikipedia.org/wiki/Directional_antennahttp://en.wikipedia.org/wiki/Title_47_CFR_Part_15http://en.wikipedia.org/wiki/Bluetoothhttp://en.wikipedia.org/wiki/Personal_area_networkhttp://en.wikipedia.org/wiki/Radio_propagationhttp://en.wikipedia.org/wiki/Wi-Fi#cite_note-42http://en.wikipedia.org/wiki/ZigBeehttp://en.wikipedia.org/wiki/Category_6_cablehttp://en.wikipedia.org/wiki/Category_6_cablehttp://en.wikipedia.org/wiki/ITU-Thttp://en.wikipedia.org/wiki/G.hnhttp://en.wikipedia.org/wiki/G.hnhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Ethernet_over_coaxhttp://en.wikipedia.org/wiki/Power_line_communicationhttp://en.wikipedia.org/wiki/G.hnhttp://en.wikipedia.org/wiki/IPTVhttp://en.wikipedia.org/wiki/Radio_propagationhttp://en.wikipedia.org/wiki/Long-range_Wi-Fihttp://en.wikipedia.org/wiki/Barcodehttp://en.wikipedia.org/wiki/Encryptionhttp://en.wikipedia.org/wiki/Wired_Equivalent_Privacyhttp://en.wikipedia.org/wiki/Fluhrer,_Mantin_and_Shamir_attackhttp://en.wikipedia.org/wiki/Wi-Fi_Protected_Accesshttp://en.wikipedia.org/wiki/Wireless_access_pointhttp://en.wikipedia.org/wiki/Wireless_security#Counteracting_riskshttp://en.wikipedia.org/wiki/Graphical_user_interfacehttp://en.wikipedia.org/wiki/Directional_antennahttp://en.wikipedia.org/wiki/Title_47_CFR_Part_15http://en.wikipedia.org/wiki/Bluetoothhttp://en.wikipedia.org/wiki/Personal_area_networkhttp://en.wikipedia.org/wiki/Radio_propagationhttp://en.wikipedia.org/wiki/Wi-Fi#cite_note-42http://en.wikipedia.org/wiki/ZigBeehttp://en.wikipedia.org/wiki/Category_6_cablehttp://en.wikipedia.org/wiki/Category_6_cablehttp://en.wikipedia.org/wiki/ITU-Thttp://en.wikipedia.org/wiki/G.hnhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Ethernet_over_coaxhttp://en.wikipedia.org/wiki/Power_line_communicationhttp://en.wikipedia.org/wiki/G.hnhttp://en.wikipedia.org/wiki/IPTVhttp://en.wikipedia.org/wiki/Radio_propagationhttp://en.wikipedia.org/wiki/Long-range_Wi-Fihttp://en.wikipedia.org/wiki/Barcodehttp://en.wikipedia.org/wiki/Encryptionhttp://en.wikipedia.org/wiki/Wired_Equivalent_Privacyhttp://en.wikipedia.org/wiki/Fluhrer,_Mantin_and_Shamir_attackhttp://en.wikipedia.org/wiki/Wi-Fi_Protected_Accesshttp://en.wikipedia.org/wiki/Wireless_access_pointhttp://en.wikipedia.org/wiki/Wireless_security#Counteracting_riskshttp://en.wikipedia.org/wiki/Graphical_user_interface
  • 8/13/2019 Wifi and 3rd Generation

    10/20

    and record data including personal information/. uch networks can only be secured by using othermeans of protection, such as a 5" or secure$yperte3t Transfer 5rotocol $TT5 / o4er Transport 6ayer

    ecurity.

    Interference For !ore details on this to ic" see Electro!agnetic interference at 2.# $H% .

    Wi-Fi connections can be disrupted or the internet speed lowered by ha4ing other de4ices in the samearea. &any 2.E I$A 012.((b and012.((g access-points default to the same channel on initial startup,contributing to congestion on certain channels. Wi-Fi pollution, or an e3cessi4e number of access pointsin the area, especially on the neighboring channel, can pre4ent access and interfere with other de4ices! uof other access points, caused by o4erlapping channels in the 012.((gGb spectrum, as well as withdecreasedsignal-to-noise ratio " / between access points. This can become a problem in high-density

    areas, such as large apartment comple3es or office buildings with many Wi-Fi access points.dditionally, other de4ices use the 2.E I$A band: microwa4e o4ens,' & band de4ices, security

    cameras, NigBee de4ices,Bluetoothde4ices,4ideo senders, cordless phones, baby monitors, and in somecountries/ mateur radio all of which can cause significant additional interference. 't is also an issuewhen municipalities7EE8 or other large entities such as uni4ersities/ seek to pro4ide large area co4erage.

    Hardware

    $tandard devices

    n embedded outerBoard ((2 with .F6- & pigtail and

  • 8/13/2019 Wifi and 3rd Generation

    11/20

    9 B i I* HI" M 012.((n ccess 5oint and &T GI & Iateway in one de4ice

    n theros Wi-Fi " draft adaptor with built in Bluetooth on a ony aio * series laptop

    B wireless adapter

    wireless access point W 5/ connects a group of wireless de4ices to an adDacent wired6 ". naccess point resembles a network hub, relayingdata between connected wireless de4ices in addition to a

    usually/ single connected wired de4ice, most often an *thernet hub or switch, allowing wireless de4icesto communicate with other wired de4ices.

    Wireless adapters allow de4ices to connect to a wireless network. These adapters connect to de4ices using4arious e3ternal or internal interconnects such as 5+', mini5+',B, *3press+ard, +ardbus and5++ard. s of 21(1, most newer laptop computers come e=uipped with built in internal adapters.

    http://en.wikipedia.org/wiki/IEEE_802.11n-2009http://en.wikipedia.org/wiki/High-Speed_Downlink_Packet_Accesshttp://en.wikipedia.org/wiki/Atheroshttp://en.wikipedia.org/wiki/Bluetoothhttp://en.wikipedia.org/wiki/Universal_Serial_Bushttp://en.wikipedia.org/wiki/Wireless_access_pointhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Ethernet_hubhttp://en.wikipedia.org/wiki/Data_(computing)http://en.wikipedia.org/wiki/Wireless_network_interface_controllerhttp://en.wikipedia.org/wiki/Universal_Serial_Bushttp://en.wikipedia.org/wiki/ExpressCardhttp://en.wikipedia.org/wiki/PC_Cardhttp://en.wikipedia.org/wiki/PC_Cardhttp://en.wikipedia.org/wiki/File:Wireless_adaptor_USB.jpghttp://en.wikipedia.org/wiki/File:EBWifi.JPGhttp://en.wikipedia.org/wiki/File:3GN_.jpghttp://en.wikipedia.org/wiki/IEEE_802.11n-2009http://en.wikipedia.org/wiki/High-Speed_Downlink_Packet_Accesshttp://en.wikipedia.org/wiki/Atheroshttp://en.wikipedia.org/wiki/Bluetoothhttp://en.wikipedia.org/wiki/Universal_Serial_Bushttp://en.wikipedia.org/wiki/Wireless_access_pointhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Ethernet_hubhttp://en.wikipedia.org/wiki/Data_(computing)http://en.wikipedia.org/wiki/Wireless_network_interface_controllerhttp://en.wikipedia.org/wiki/Universal_Serial_Bushttp://en.wikipedia.org/wiki/ExpressCardhttp://en.wikipedia.org/wiki/PC_Cardhttp://en.wikipedia.org/wiki/PC_Card
  • 8/13/2019 Wifi and 3rd Generation

    12/20

    Wireless routers integrate a Wireless ccess 5oint, *thernet switch, and internal router firmwareapplication that pro4ides '5 routing, " T , and " forwarding through an integrated W " -interface. wireless router allows wired and wireless *thernet 6 " de4ices to connect to a usually/ single W "de4ice such as acable modem or a 6 modem. wireless router allows all three de4ices, mainly the

    access point and router, to be configured through one central utility. This utility is usually anintegratedweb ser4er that is accessible to wired and wireless 6 " clients and often optionally to W "clients. This utility may also be an application that is run on a computer, as is the case with as

    pple!s ir5ort, which is managed with their5ort tility on&ac 9 O and i9 .7E

  • 8/13/2019 Wifi and 3rd Generation

    13/20

    Distance recordsistance records using non-standard de4ices/ include H02 km 2H> mi/ in Cune 211>, held by *rmann

    5ietrosemoli and *s6a ed of eneAuela, transferring about H &B of data between the mountain-topsof *l Pguila and 5latillon.The wedish pace gencytransferred data E21 km 2;1 mi/, using ; wattamplifiers to reach an o4erhead stratospheric balloon.7E)8

    %m&edded systems

    *mbedded serial-to-Wi-Fi module

    'ncreasingly in the last few years particularly as of 211>/, embedded Wi-Fi modules ha4e becomea4ailable that incorporate a real-time operating system and pro4ide a simple means of wirelessly enablinany de4ice which has and communicates 4ia a serial port.This allows the design of simple monitoringde4ices. n e3ample is a portable *+I de4ice monitoring a patient at home. This Wi-Fi-enabled de4icecan communicate 4ia the 'nternet.

    These Wi-Fi modules are designed by9*&s so that implementers need only minimal Wi-Fi knowledgeto pro4ide Wi-Fi connecti4ity for their products.

    'u!tip!e access points'ncreasing the number of Wi-Fi access points pro4ides network redundancy, support for fastroaming and

    increased o4erall network-capacity by using more channels or by defining smallercells. *3cept for thesmallest implementations such as home or small office networks/, Wi-Fi implementations ha4e mo4edtoward %thin% access points, with more of thenetwork intelligence housed in a centraliAed networkappliance, relegating indi4idual access points to the role of %dumb% transcei4ers. 9utdoor applicationsmay usemeshtopologies.

    (etwork security

    http://en.wikipedia.org/wiki/Pico_El_%C3%81guilahttp://en.wikipedia.org/wiki/Swedish_National_Space_Boardhttp://en.wikipedia.org/wiki/Wi-Fi#cite_note-49http://en.wikipedia.org/wiki/OEMhttp://en.wikipedia.org/wiki/Roaminghttp://en.wikipedia.org/wiki/Cellular_networkhttp://en.wikipedia.org/wiki/Network_intelligencehttp://en.wikipedia.org/wiki/Mesh_networkinghttp://en.wikipedia.org/wiki/File:Ezurio_wism2_small.jpghttp://en.wikipedia.org/wiki/Pico_El_%C3%81guilahttp://en.wikipedia.org/wiki/Swedish_National_Space_Boardhttp://en.wikipedia.org/wiki/Wi-Fi#cite_note-49http://en.wikipedia.org/wiki/OEMhttp://en.wikipedia.org/wiki/Roaminghttp://en.wikipedia.org/wiki/Cellular_networkhttp://en.wikipedia.org/wiki/Network_intelligencehttp://en.wikipedia.org/wiki/Mesh_networking
  • 8/13/2019 Wifi and 3rd Generation

    14/20

    The main issue with wireless network security is its simplified access to the network compared totraditional wired networks such as*thernet, with wired networking one must either gain access to a building physically connecting into the internal network/ or break through an e3ternal firewall. To enableWi-Fi, one merely needs to be within the wireless range of the Wi-Fi network. &ost business networks

    protect sensiti4e data and systems by attempting to disallow e3ternal access. *nabling wirelessconnecti4ity reduces security if the network uses inade=uate or no encryption.

    n attacker who has gained access to a Wi-Fi network router can initiate a " spoofing attack againstany other user of the network by forging a response before the =ueried " ser4er has a chance to reply.

    $ecurin methods common measure to deter unauthoriAed users in4ol4es hiding the access point!s name by disabling

    the ' broadcast. While effecti4e against the casual user, it is ineffecti4e as a security method becausethe ' is broadcast in the clear in response to a client ' =uery. nother method is to only allowcomputers with known & + addresses to Doin the network ,8 but determined ea4esdroppers may be able to Doin the network by spoofing an authoriAed address.

    Wired *=ui4alent 5ri4acyW*5/ encryption was designed to protect against casual snooping but it is nolonger considered secure. Tools such as ir nort or ircrack-ng can =uickly reco4er W*5 encryptionkeys.Because of W*5!s weakness the Wi-Fi llianceappro4ed Wi-Fi 5rotected ccess W5 / whichusesTK'5. W5 was specifically designed to work with older e=uipment usually through a firmwareupgrade. Though more secure than W*5, W5 has known 4ulnerabilities.

    The more secureW5 2 using d4anced *ncryption tandardwas introduced in 211E and is supported bymost new Wi-Fi de4ices. W5 2 is fully compatible with W5 .

    flaw in a feature added to Wi-Fi in 211>, called Wi-Fi 5rotected etup, allows W5 and W5 2security to be bypassed and effecti4ely broken in many situations. The only remedy as of late 21(( is toturn off Wi-Fi 5rotected etup, which is not always possible.

    )i y&ackin

    5iggybacking refers to access to a wireless 'nternet connection by bringing one!s own computer within thrange of another!s wireless connection, and using that ser4ice without the subscriber!s e3plicit permissioor knowledge.

    uring the early popular adoption of 012.((, pro4iding open access points for anyone within range to usewas encouraged to culti4atewireless community networks, particularly since people on a4erage use onlya fraction of their downstream bandwidth at any gi4en time.

    http://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Firewall_(computing)http://en.wikipedia.org/wiki/Service_set_(802.11_network)http://en.wikipedia.org/wiki/MAC_addresshttp://en.wikipedia.org/wiki/Wi-Fi#cite_note-55http://en.wikipedia.org/wiki/Wi-Fi#cite_note-55http://en.wikipedia.org/wiki/MAC_spoofinghttp://en.wikipedia.org/wiki/Wired_Equivalent_Privacyhttp://en.wikipedia.org/wiki/AirSnorthttp://en.wikipedia.org/wiki/Aircrack-nghttp://en.wikipedia.org/wiki/Wi-Fi_Alliancehttp://en.wikipedia.org/wiki/Wi-Fi_Protected_Accesshttp://en.wikipedia.org/wiki/Temporal_Key_Integrity_Protocolhttp://en.wikipedia.org/wiki/WPA2http://en.wikipedia.org/wiki/Advanced_Encryption_Standardhttp://en.wikipedia.org/wiki/Wi-Fi_Protected_Setuphttp://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/Wireless_community_networkhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Firewall_(computing)http://en.wikipedia.org/wiki/Service_set_(802.11_network)http://en.wikipedia.org/wiki/MAC_addresshttp://en.wikipedia.org/wiki/Wi-Fi#cite_note-55http://en.wikipedia.org/wiki/MAC_spoofinghttp://en.wikipedia.org/wiki/Wired_Equivalent_Privacyhttp://en.wikipedia.org/wiki/AirSnorthttp://en.wikipedia.org/wiki/Aircrack-nghttp://en.wikipedia.org/wiki/Wi-Fi_Alliancehttp://en.wikipedia.org/wiki/Wi-Fi_Protected_Accesshttp://en.wikipedia.org/wiki/Temporal_Key_Integrity_Protocolhttp://en.wikipedia.org/wiki/WPA2http://en.wikipedia.org/wiki/Advanced_Encryption_Standardhttp://en.wikipedia.org/wiki/Wi-Fi_Protected_Setuphttp://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/Wireless_community_network
  • 8/13/2019 Wifi and 3rd Generation

    15/20

    ecreational logging and mapping of other people!s access points has become known aswardri4ing.'ndeed, many access points are intentionally installed without security turned on so that they can be usedas a free ser4ice. 5ro4iding access to one!s 'nternet connection in this fashion may breach the Terms of

    er4ice or contract with the ' 5. These acti4ities do not result in sanctions in most DurisdictionsL howe4er

    legislation andcase law differ considerably across the world. proposal to lea4egraffitidescribinga4ailable ser4ices was called warchalking. Florida court case determined that owner laAiness was not to be a 4alid e3cuse.

    5iggybacking often occurs unintentionally, since most access points are configured without encryption bydefaul8 and operating systems can be configured to connect automatically to any a4ailable wirelessnetwork. user who happens to start up a laptop in the 4icinity of an access point may find the computerhas Doined the network without any 4isible indication. &oreo4er, a user intending to Doin one networkmay instead end up on another one if the latter has a stronger signal. 'n combination with automatic

    disco4ery of other network resources see $+5 andNeroconf / this could possibly lead wireless users tosend sensiti4e data to the wrong middle-man when seeking a destination see Man-in-the-!iddle attac& /.For e3ample, a user could inad4ertently use an unsecure network to log into a website, thereby makingthe login credentials a4ailable to anyone listening, if the website uses an unsecure protocol such as $TT5.

    $AF%T*

    TheWorld $ealth 9rganiAation W$9/ says %there is no risk from low le4el, long-term e3posure to wi-finetworks% and the nited Kingdom!s$ealth 5rotection gency reports that e3posure to Wi-Fi for a yearresults in the %same amount of radiation from a 21-minute mobile phone call%. small percentage of WFi users ha4e reported ad4erse health issues after repeat e3posure and use of Wi-Fi,8 though there has been no publication of any effects being obser4able indouble-blind studies. re4iew of studies in4ol4ing>2< people that claimedelectromagnetic hypersensiti4ityfound no e4idence for their claims. Wi-Fivs+ ,Wi-Fi!s shortcoming is that it only works in close range because it!s dependent on radio wa4es. #ou mus be in a hotspot to use it. But HI, on the other hand, follows you. e4ices like a "ook, Kindle or i5ad are priced higher with HI, plus, you pay a carrier like T@T or eriAon for the ser4ice. lternati4ely, HIcan be bought separately as a mobile hotspot J in this case, your mobile hotspot gets the 'nternetconnection 4ia HI and in turn pro4ides a connection to your other multiple/ de4ices 4ia Wi-Fi.

    "e3t time you walk into a coffee shop, keep in mind that your rhetoric reflects what kind of web user youare J asking if they offer free 'nternet will out you as a newbie, while re=uesting the %password for thewireless% is a small impro4ement. "e3t time, say you!re interested in their Wi-Fi, and say it like you knothe term is short for nothing, especially not %Wireless Fidelity.% Want ultimate nerd cred? sk about the'*** 012.(( but don!t blame me if you ha4e to settle

    http://en.wikipedia.org/wiki/Wardrivinghttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Case_lawhttp://en.wikipedia.org/wiki/Graffitihttp://en.wikipedia.org/wiki/Warchalkinghttp://en.wikipedia.org/wiki/Floridahttp://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocolhttp://en.wikipedia.org/wiki/Zero_configuration_networkinghttp://en.wikipedia.org/wiki/Man-in-the-middle_attackhttp://en.wikipedia.org/wiki/Websitehttp://en.wikipedia.org/wiki/Hypertext_Transfer_Protocolhttp://en.wikipedia.org/wiki/World_Health_Organizationhttp://en.wikipedia.org/wiki/Health_Protection_Agencyhttp://en.wikipedia.org/wiki/Wi-Fi#cite_note-63http://en.wikipedia.org/wiki/Wi-Fi#cite_note-63http://en.wikipedia.org/wiki/Double-blind_studyhttp://en.wikipedia.org/wiki/Electromagnetic_hypersensitivityhttp://en.wikipedia.org/wiki/Wardrivinghttp://en.wikipedia.org/wiki/Internet_service_providerhttp://en.wikipedia.org/wiki/Case_lawhttp://en.wikipedia.org/wiki/Graffitihttp://en.wikipedia.org/wiki/Warchalkinghttp://en.wikipedia.org/wiki/Floridahttp://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocolhttp://en.wikipedia.org/wiki/Zero_configuration_networkinghttp://en.wikipedia.org/wiki/Man-in-the-middle_attackhttp://en.wikipedia.org/wiki/Websitehttp://en.wikipedia.org/wiki/Hypertext_Transfer_Protocolhttp://en.wikipedia.org/wiki/World_Health_Organizationhttp://en.wikipedia.org/wiki/Health_Protection_Agencyhttp://en.wikipedia.org/wiki/Wi-Fi#cite_note-63http://en.wikipedia.org/wiki/Double-blind_studyhttp://en.wikipedia.org/wiki/Electromagnetic_hypersensitivity
  • 8/13/2019 Wifi and 3rd Generation

    16/20

    ,rd eneration Wire!ess (etworks

    new breed of wireless networks with higher speed and capacity than 2I that are being planned,designed and deployed in different countries now 2112/. These networks

    are in higher fre=uency band 2 I$A and beyond/ with larger bandwidth around < &$N/ than2I will pro4ide higher speeds up to 2 &bps in a fi3ed or stationary wireless en4ironment and at H0E

    Kbps in a mobile en4ironment.

    hope to con4erge towards one international standard for HI. This is unlikely to be fulfilled soon because of 4endors! self interests, e3isting infrastructure dependencies and migration steps like2.

  • 8/13/2019 Wifi and 3rd Generation

    17/20

    %vo!ution From . to ,Following scenarios are most likely:

    +urrent 2I I & networks ----QWideband + & W-+ & / for HI +urrent T & networks e.g. T@T!s T & network/ -----Q W-+ &

    ' -)< "on-Wideband + & / ----Q cdma2111

    5ressures from the market and user organiAation will lead to interoperation between W-+ & andcdma2111 networks. $owe4er 4endors and network carriers will posture and shout for the superiority oftheir respecti4e technologies. 'deally we should ha4e one standard and one network technology that issuperior but that is asking for an ideal business world. We urge user organiAations to e3ert their naturalright to force carriers to build one logical HI network with roaming and interoperability e4en if thisnetwork consists of multiple physical networks.

    $tatus 0f , (etwork )!ans in (orth America 12anuary .//.3 -

    , $' Tria!s &y 'icroce!! - a wireless network ser4ice pro4ider in +anada is piloting a HI networkin &ontreal now ()))-2111/.

    We would like to make following comments on HI networks:

    (. HI networks, when fully implemented 2 to < years/, will mo4e mobile computing to a new le4elof performance and capacity. &eanwhile, wireless applications should be implemented carefully.+hoose your communications middleware 4endor who will allow you to migrate to futurenetworks without application-le4el changes. +ontinue to in4est in optimiAing your wireless

    network traffic. appro3imately 2

  • 8/13/2019 Wifi and 3rd Generation

    18/20

  • 8/13/2019 Wifi and 3rd Generation

    19/20

    Tremendous spectrum-license costs,network deployment costs, handset subsidies tosubscribers, etc.

    Wireless ser4ice pro4iders in Iermany and Britain who won spectrum licenses in auctions, paid astronomical prices for them. s a result, they ha4e little

    App!ications wi!! , ena&!e

    HI represents a paradigm shift from the 4oice centric world of the pre4ious generations ofwireless networks to the multi-media centric world of HI. eflecting the high HI bandwidthand the fact that it is packet based, HI de4ices will offer capabilities that are a combination ofa phone, 5+, and a T . *3amples of ser4ices that will be HI networks can offer are:

    lways-on connection with users paying only when sending or recei4ing packets. Web surfing.

    'nstant messaging and email with multimedia attachments.

    6ocation based ser4ices.

    5ersonaliAed ser4ices, where content can be pushed to users.

    Broadband multimedia data ser4ices like 4ideo conferencing and streaming 4ideo.

    ecei4ing fa3es.

    Ilobal roaming capability.

    Ietting maps and directions with a multi-modal user interface.

    +ustomiAed entertainment. imultaneous access to multiple ser4ices, each ser4ice offering some combination of 4oice,

    4ideo, data, etc.

    )otentia! 4i!!er App!ications

    The high bandwidth of HI networks will lead to the creation of new ser4ices, some of whichwe ha4e no idea about at this time. The big =uestion is what ser4ices will be big re4enuemakers for the wireless ser4ice pro4iders. 'n 2I networks, the big winners ha4e been shortte3t messaging in I & networks *urope and countries other than / and imagedownloads and forwardingon i&ode networks in Capan. Two candidate ser4ices for bigwinners in HI networks are

    4ideo conferencing and 4ideo messaging.

    Wire!ess animation !ink

  • 8/13/2019 Wifi and 3rd Generation

    20/20

    http://www.wisc-online.com/Objects/ViewObject.aspx?ID=CI !"#"

    http://www.wisc-online.com/Objects/ViewObject.aspx?ID=CIS5808http://www.wisc-online.com/Objects/ViewObject.aspx?ID=CIS5808