Professional Documents
Culture Documents
Wireless Technology in Day To Day Life
Wireless Technology in Day To Day Life
PROJECT REPORT
Submitted by:
GROUP NO:
II - YEAR, EEE
Submitted to:
DEPARTMENT OF ENGLISH
ETTIMADAI
COIMBATORE-641105
MARCH 2009
DECLARATION
I hear by declare that this submission is my own work and that, to best of my
knowledge and belief, it contains no material previously published or written by another
person not material which has been accepted for the award of any other degree or
diploma of the university or other institute of higher learning, except where view
acknowledgment has been made in the text.
Place: Signature
Signature
Name : HARSHAVARDHAN
Signature
Name : SHIVARAM K V
Signature
It encompasses various types of fixed, mobile, and portable two way radios,
cellular telephones, personal digital assistants (PDAs), and wireless networking. Other
examples of wireless technology include GPS units, garage door openers and or garage
doors, wireless computer mice, keyboards and headsets, satellite television and cordless
telephones.
Wireless operations permits services, such as long range communications, that are
impossible or impractical to implement with the use of wires. The term is commonly used
in the telecommunications industry to refer to telecommunications systems (e.g., radio
transmitters and receivers, remote controls, computer networks, network terminals, etc.)
which use some form of energy (e.g. radio frequency (RF), infrared light, laser light,
visible light, acoustic energy, etc.) to transfer information without the use of wires.[2]
Information is transferred in this manner over both short and long distances.
The term "wireless" has become a generic and all-encompassing word used to
describe communications in which electromagnetic waves or RF (rather than some form
of wire) carry a signal over part or the entire communication path.
Wireless networking is one of several ways to connect the computers in your
home. It creates a network by sending radio-frequency signals between your computers to
share information.
Wireless networking technologies take the concept of "no new wires" one step
further. In a wireless network, all of the computers in your home broadcast their
information to one another using radio signals. This can make networking extremely east,
especially if you have computers all over house. It also makes it a whole lot simpler to
move computers around.
HISTORY
The term "Wireless" came into public use to refer to a radio receiver or
transceiver (a dual purpose receiver and transmitter device), establishing its usage in the
field of wireless telegraphy early on; now the term is used to describe modern wireless
connections such as in cellular networks and wireless broadband Internet. It is also used
in a general sense to refer to any type of operation that is implemented without the use of
wires, such as "wireless remote control" or "wireless energy transfer", regardless of the
specific technology (e.g. radio, infrared, ultrasonic) that is used to accomplish the
operation.
David E. Hughes, eight years before Hertz's experiments, induced electromagnetic waves
in a signaling system. Hughes transmitted Morse code by an induction apparatus. In
1878, Hughes's induction transmission method utilized a "clockwork transmitter" to
transmit signals. In 1885, T. A. Edison used a vibrator magnet for induction transmission.
In 1888, Edison deploys a system of signaling on the Lehigh Valley Railroad. In 1891,
Edison attains the wireless patent for this method using inductance (U.S. Patent
465,971 ).
In the history of wireless technology, the demonstration of the theory of electromagnetic
waves by Heinrich Rudolf Hertz in 1888 was important.[3][4] The theory of
electromagnetic waves were predicted from the research of James Clerk Maxwell and
Michael Faraday. Hertz demonstrated that electromagnetic waves could be transmitted
and caused to travel through space at straight lines and that they were able to be received
by an experimental apparatus.[3][4] The experiments were not followed up by Hertz. The
practical applications of the wireless communication and remote control technology were
implemented by Nikola Tesla.
The Wireless Ethernet Compatibility Alliance (WECA) has gone in a completely
different drection from HomeRF. Targeted more at office use than home networks, Wi-Fi
(for "wireless fidelity", like Hi-Fi for "high fidelity" in audio equipment) is essentially a
seal of approval that says the manufacturer's product is compliant with a variation of the
IEEE 802.11 specification known as IEEE 802.11b. This specification drops FHSS and
focuses on DSSS because of the higher data rate it can attain. Under 802.11b, devices
communicate at a speed of 11 Mbps whenever possible. If signal strength or interference
is disrupting data, the devices will drop back to 5.5 Mbps, then 2 Mbps and finally down
to 1 Mbps. Though it may occasionally slow down, this keeps the network stable and
very reliable.
The Wireless Ethernet Compatibility Alliance (WECA) has gone in a completely
different drection from HomeRF. Targeted more at office use than home networks, Wi-Fi
(for "wireless fidelity", like Hi-Fi for "high fidelity" in audio equipment) is essentially a
seal of approval that says the manufacturer's product is compliant with a variation of the
IEEE 802.11 specification known as IEEE 802.11b. This specification drops FHSS and
focuses on DSSS because of the higher data rate it can attain. Under 802.11b, devices
communicate at a speed of 11 Mbps whenever possible. If signal strength or interference
is disrupting data, the devices will drop back to 5.5 Mbps, then 2 Mbps and finally down
to 1 Mbps. Though it may occasionally slow down, this keeps the network stable and
very reliable.
The Wireless Ethernet Compatibility Alliance (WECA) has gone in a completely
different drection from HomeRF. Targeted more at office use than home networks, Wi-Fi
(for "wireless fidelity", like Hi-Fi for "high fidelity" in audio equipment) is essentially a
seal of approval that says the manufacturer's product is compliant with a variation of the
IEEE 802.11 specification known as IEEE 802.11b. This specification drops FHSS and
focuses on DSSS because of the higher data rate it can attain. Under 802.11b, devices
communicate at a speed of 11 Mbps whenever possible. If signal strength or interference
is disrupting data, the devices will drop back to 5.5 Mbps, then 2 Mbps and finally down
to 1 Mbps. Though it may occasionally slow down, this keeps the network stable and
very reliable.
Wireless energy transfer or wireless power transmission (also known as the Tesla
Effect) is the process that takes place in any system where electrical energy is transmitted
from a power source to an electrical load, without interconnecting wires in an electrical
grid. Wireless transmission is ideal in cases where instantaneous or continuous energy
transfer is needed, but interconnecting wires are inconvenient, hazardous, or impossible.
Though the physics of both are related, this is distinct from wireless transmission for the
purpose of transferring information (such as radio) through waves, where the percentage
of the power that is received is only important if it becomes too low to successfully
recover the signal. With wireless energy transfer, the efficiency is a more critical
parameter and this creates important differences in these technologies.
The most common and the most viable form of wireless power transfer is carried out
using Inductive Power Transfer. The other viable technologies for Wireless Power are
based on Microwaves and Lasers.
Size, distance, and efficiency
The size of the components is dictated by the distance from transmitter to receiver, the
wavelength and the Rayleigh Criterion or Diffraction limit, used in standard RF (Radio
Frequency) antenna design, which also applies to lasers.
The Rayleigh Criterion dictates that any beam will spread (microwave or laser) and
become weaker and diffuse over distance, The larger the transmitter antenna or laser
aperture, the tighter the beam and the less it will spread as a function of distance (and
vice versa). Smaller antennae also suffer from excessive losses due to side lobes.
Then the power levels are calculated by combining the above parameters together, and
adding in the gains and losses due to the antenna characteristics and the transparency of
the medium through which the radiation passes. That process is known as calculating a
link budget.
Ultimately, beamwidth is physically determined by diffraction due to the dish size in
relation to the wavelength of the electromagnetic radiation used to make the beam.
Microwave power beaming can be more efficient than lasers, and is less prone to
atmospheric attenuation caused by dust or water vapor losing atmosphere to vaporize the
water in contact.
Resonant induction
"Resonant inductive coupling" has key implications in solving the main problem
associated with non-resonant inductive coupling and electromagnetic radiation;
specifically, the dependence of efficiency on transmission distance. Electromagnetic
induction works on the principle of a primary coil generating a predominantly magnetic
field and a secondary coil being within that field so a current is induced in the secondary.
This results in a relatively short range due to the amount of power required to produce an
electromagnetic field. Over greater distances the non-resonant induction method is
inefficient and wastes much of the transmitted energy. This is where the resonance comes
in and helps efficiency dramatically by "tunneling" the magnetic field to a receiver coil
that resonates at the same frequency. Unlike the multiple-layer secondary of a non-
resonant transformer, such receiving coils are single layer solenoids with closely spaced
capacitor plates on each end, which in combination allow the coil to be tuned to the
transmitter frequency thereby eliminating the wide energy wasting "wave problem" and
allowing the energy used to focus in on a specific frequency increasing the range.
Beginning in the early 1960s resonant inductive wireless energy transfer was used
successfully in implantable medical devices [13] including such devices as pacemakers and
artificial hearts. While the early systems used a resonant receiver coil later systems [14]
implemented resonant transmitter coils as well. These medical devices are designed for
high efficiency using low power electronics while efficiently accommodating some
misalignment and dynamic twisting of the coils. The separation between the coils in
implantable applications is commonly less than 20 cm. Today resonant inductive energy
transfer is regularly used for providing electric power in many commercially available
medical implantable devices.[15]
Wireless electric energy transfer for experimentally powering electric automobiles and
buses is a higher power application (>10kW) of resonant inductive energy transfer. High
power levels are required for rapid recharging and high energy transfer efficiency is
required both for operational economy and to avoid negative environmental impact of the
system. An experimental electrified roadway test track built circa 1990 achieved 80%
energy efficiency while recharging the battery of a prototype bus at a specially equipped
bus stop [16] [17]. The bus could be outfitted with a retractable receiving coil for greater coil
clearance when moving. The gap between the transmit and receive coils was designed to
be less than 10 cm when powered. In addition to buses the use of wireless transfer has
been investigated for recharging electric automobiles in parking spots and garages as
well.
Some of these wireless resonant inductive devices operate at low milliwatt power levels
and are battery powered. Others operate at higher kilowatt power levels. Current
implantable medical and road electrification device designs achieve more than 75%
transfer efficiency at an operating distance between the transmit and receive coils of less
than 10 cm.
In November 2006, Marin Soljačić and other researchers at the Massachusetts Institute of
Technology applied the near field behaviour well known in electromagnetic theory to a
wireless power transmission concept based on strongly-coupled resonators.[18][19][20] In a
theoretical analysis,[21] they demonstrate that, by designing electromagnetic resonators
that suffer minimal loss due to radiation and absorption and have a near field with mid-
range extent (namely a few times the resonator size), mid-range efficient wireless energy-
transfer is possible. The reason is that, if two such resonant objects are brought in mid-
range proximity, their near fields (consisting of so-called 'evanescent waves') couple
(evanescent wave coupling) and can allow the energy to tunnel/transfer from one object
to the other within times much shorter than all loss times, which were designed to be
long, and thus with the maximum possible energy-transfer efficiency. Since the resonant
wavelength is much larger than the resonators, the field can circumvent extraneous
objects in the vicinity and thus this mid-range energy-transfer scheme does not require
line-of-sight. By utilizing in particular the magnetic field to achieve the coupling, this
method can be safe, since magnetic fields interact weakly with living organisms.
Laser
With a laser beam centered on its panel of photovoltaic cells, a lightweight model plane
makes the first flight of an aircraft powered by a laser beam inside a building at NASA
Marshall Space Flight Center.
In the case of electromagnetic radiation closer to visible region of spectrum (10s of
microns (um) to 10s of nm), power can be transmitted by converting electricity into a
laser beam that is then pointed at a solar cell receiver. This mechanism is generally
known as "PowerBeaming" because the Power is Beamed at a receiver that can convert it
to usable electrical energy.
Its drawbacks are:
1. Conversion to light, such as with a laser, is moderately inefficient (although
quantum cascade lasers improve this)
2. Conversion back into electricity is moderately inefficient, with photovoltaic cells
achieving 40%-50% efficiency.[26] (Note that conversion efficiency is rather
higher with monochromatic light than with insolation of solar panels).
3. Atmospheric absorption causes losses.
4. As with microwave beaming, this method requires a direct line of sight with the
target.
There are also a few unique advantages of Laser based energy transfer that outweigh the
disadvantages.
1. collimated monochromatic wavefront propagation allows narrow beam cross-
section area for energy confinement over large ranges.
2. compact size of solid state lasers-photovoltaics semiconductor diodes allows ease
of integration into products with small form factors.
3. ability to operate with zero radio-frequency interference to existing
communication devices i.e. wi-fi and cell phones.
4. control of Wireless Energy Access, instead of omnidirectional transfer where
there can be no authentication before transferring energy.
These allow laser-based Wireless Energy Transfer concept to compete with conventional
energy transfer methods.
The Laser "PowerBeaming" technology has been mostly explored in military weapons[27]
[28] [29]
and aerospace [30] [31] applications and is now being developed for commercial and
consumer electronics Low-Power applications. Wireless energy transfer system using
laser for consumer space has to satisfy Laser safety requirements standardized under IEC
60825.
To develop an understanding of the trade-offs of Laser "a special type of light wave"
based system:[32][33][34][35]
1. Propagation of a laser beam [36] [37] [38] (on how Laser beam propagation is much
less affected by diffraction limits)
2. Coherence and the range limitation problem (on how spatial and spectral
coherence characteristics of Lasers allows better distance-to-power capabilities
[39]
)
3. Airy disk (on how most fundamentally wavelength dictates the size of a disk with
distance)
4. Applications of laser diodes (on how the laser sources are utilized in various
industries and their sizes are reducing for better integration)
Geoffrey Landis [40] [41] [42] is one of the pioneers of Solar Power Satellite [43] and Laser-
based transfer of energy especially for Space and Lunar missions. The continuously
increasing demand for safe and frequent space missions has resulted in serious thoughts
on a futuristic Space elevator[44] [45] that would be powered by Lasers. NASA's Space
elevator need wireless power to be beamed to it, for it to climb a tether [46].
NASA's Dryden Flight Research Center has demonstrated flight of a lightweight
unmanned model plane powered by a laser beam [47]. This concept allows a periodic
recharging using Laser beam and an unlimited time in air.
WITRICITY
WiTricity, a portmanteau for wireless electricity, is a term which describes wireless
energy transfer, the ability to provide electrical energy to remote objects without wires.
The term was coined initially in 2005 by Dave Gerding and later used for the project of a
MIT research team led by Prof. Marin Soljačić in 2007
Overview
WiTricity is based on strong coupling between electromagnetic resonant objects to
transfer energy wirelessly between them. The system consists of transmitters and
receivers that contain magnetic loop antennas critically tuned to the same frequency. Due
to operating in the electromagnetic near-field, the receiving devices must be no more than
about a quarter wavelength from the transmitter (which is a few meters at the frequency
used by the example system). In their first paper, the group also simulated GHz dielectric
resonators.
Unlike the far field wireless power transmission systems based on traveling EM waves,
WiTricity employs near field inductive coupling through magnetic fields,[clarification needed]
which interact far more weakly with surrounding objects, including biological tissue. In
particular, it is based on using 'strongly-coupled' resonances to achieve a high power-
transmission efficiency. Aristeidis Karalis, referring to the team's experimental
demonstration, says that "the usual non-resonant magnetic induction would be almost 1
million times less efficient in this particular system".[2] The researchers suggest that the
exposure levels will be below the threshold for FCC safety regulations, and the radiated-
power levels will also comply with the FCC radio interference regulations.
It is not known exactly why this technology had not been developed. Researchers
attribute it to various reasons ranging from the limitations of well-known physical laws,
to simply a lack of need. Only recently have modern consumers obtained a high number
of portable electronic devices which currently require batteries and plug-in chargers.[2]
Experimental demonstration
The MIT researchers successfully demonstrated the ability to power a 60-watt light bulb
wirelessly, using two copper coils of 60 cm (24in) diameter that were 2m (7ft) away, at
roughly 45% efficiency.[3] The coils were designed to resonate together at 10MHz and
were oriented along the same axis. One was connected inductively to a power source, and
the other one to a bulb. The setup powered the bulb on, even when the direct line of sight
was blocked using a wooden panel.
Applications
This technology can potentially be used in a large variety of applications, including
consumer, industrial, medical and military. Its aim is to reduce our dependence on
batteries.
Further applications for this technology include transmission of information — it would
not interfere with radio waves and thus could be used as a cheap and efficient
communication device without requiring a license or a government permit.
Wireless networks are very common, both for organizations and individuals. Many laptop
computers have wireless cards pre-installed. The ability to enter a network while mobile
has great benefits. However, wireless networking has many security issues.[1] Hackers
have found wireless networks relatively easy to break into, and even use wireless
technology to crack into wired networks. As a result, it's very important that enterprises
define effective wireless security policies that guard against unauthorized access to
important resources.[2]
The risks to users of wireless technology have increased as the service has become more
popular. There were relatively few dangers when wireless technology was first
introduced. Crackers had not yet had time to latch on to the new technology and wireless
was not commonly found in the work place. However, there are a great number of
security risks associated with the current wireless protocols and encryption methods, and
in the carelessness and ignorance that exists at the user and corporate IT level.[3] Cracking
methods have become much more sophisticated and innovative with wireless. Cracking
has also become much easier and more accessible with easy-to-use Windows or Linux-
based tools being made available on the web at no charge.
Some organizations that have no wireless access points installed do not feel that they
need to address wireless security concerns. In-Stat MDR and META Group have
estimated that 95% of all corporate laptop computers that were planned to be purchased
in 2005 were equipped with wireless. Issues can arise in a supposedly non-wireless
organization when a wireless laptop is plugged into the corporate network. A cracker
could sit out in the parking lot and gather info from it through laptops and/or other
devices as handhelds, or even break in through this wireless card-equipped laptop and
gain access to the wired network
Wi-Fi versus Bluetooth
Wi-Fi and Bluetooth are designed to coexist in the network, and although they certainly
have overlapping applications, each has its distinct zones of advantage.
The biggest differences between Wi-Fi and Bluetooth are
_ Distance: Bluetooth is lower powered, which means its signal can only go short
distances (up to 30 feet). 802.11 technologies can cover your home, and in some cases
more, depending on the antenna that you use.
Note: New software for Bluetooth devices is enabling the creation of mesh networks in
the home, where interconnected Bluetooth devices can create a large mesh network that
can be interconnected to the Internet — thereby creating a network similar to an 802.11b
network in the home, for instance.
_
Application: Bluetooth is designed as a replacement of cables: that is, trying to get rid
of that huge tangle of cables that link your mouse, printer, monitor, scanner, and other
devices on your desk and around your home. In fact, the first Bluetooth device was a
Bluetooth headset, eliminating that annoying cable to the telephone that got in the way of
typing. New cars are also becoming outfitted with Bluetooth so that you can use your cell
phone in your car, with your car’s stereo speakers and an onboard microphone serving as
your hands-free capability.
RADIO WAVES
Radio waves are electromagnetic waves occurring on the radio frequency portion of the
electromagnetic spectrum.
Radio waves were first predicted by mathematical work done in 1865 by James Clerk
Maxwell. Maxwell noticed wavelike properties of light and similarities in electrical and
magnetic observations. He then proposed equations that described light waves and radio
waves as waves of electromagnetism that travel in space. In 1887, Heinrich Hertz
demonstrated the reality of Maxwell's electromagnetic waves by experimentally
generating radio waves in his laboratory. Many inventions followed, making practical the
use of radio waves to transfer information through space.
Nikola Tesla and Guglielmo Marconi are credited with inventing systems to allow radio
waves to be used for communication
IEEE US
Per IEEE Std 521-2002. Reaffirmed standard of 1984; originally dates back to WWII.
Band Frequency range Origin of name
HF band 3 to 30 MHz High Frequency
VHF
30 to 300 MHz Very High Frequency
band
Ultra High Frequency
UHF
300 to 1000 MHz Frequencies from 216 to 450 MHz were sometimes called P-
band band: Previous, since early British radar used this band but
later switched to higher frequencies.
L band 1 to 2 GHz Long wave
S band 2 to 4 GHz Short wave
C band 4 to 8 GHz Compromise between S and X
X band 8 to 12 GHz Used in WW II for fire control, X for cross (as in crosshair)
Ku band 12 to 18 GHz Kurz-under
K band 18 to 27 GHz German Kurz (short)
Ka band 27 to 40 GHz Kurz-above
V band 40 to 75 GHz
W band 75 to 110 GHz W follows V in the alphabet
mm band 110 to 300 GHz
FUTURE
Many of us firmly believe that wireless technology is to computing what the PC was to
computing back in the 80’s, nothing short of a revolution. On the other hand, just like
many other emerging technologies before it, this one is not without its share of
challenges.
On one side, we have the visionaries, the evangelizers, preaching the benefits of mobile
data access and, specifically, wireless connectivity. There are more than a few early
adopters, who have successfully mobilized business applications and are reaping the
benefits. On the other hand there are a few who are not so sure the promised return on
investment is really there, or remain yet to be convinced that the technology is ready for
their specific enterprise requirements.
So then, what is the future for wireless technology?
Will we be able to access applications and data anywhere, at anytime, updating data in
real-time, securely, efficiently, effectively, affordably? Will we see the end of messy
wires protruding from computers, printers, modems, scanners, projectors and other
peripherals? Will we be able to walk up to a wireless printer at an Airport, turn on our
Pocket PC, tablet or laptop and print that proposal or presentation we need, perfectly
formatted, regardless of the operating system or application we are running and printer
drivers we may have in our device? Will we be able to create a mobile version of our
existing SAP, Siebel, Oracle or SQL-based application, without fuss, without it costing a
fortune, and run it over a 1XRTT or GPRS network, securely, dependably? Will we be
able to make and receive phone calls, or manage our email and calendar from a hand-held
device, using voice over Wireless LAN or unified messaging technology while connected
to a WiFi network at an Airport, convention center or coffee shop?
Let us analyze the situations outlined above for a moment. Wireless access anytime,
anywhere? Is it real? Answer: not today. Maybe “most of the time, from most places”,
but “anytime, anywhere”? Not yet, not for a while. And if anyone is telling you
otherwise, they either do not understand the question, or do not know much about
mobility and wireless solutions.
Is it possible for corporate files and applications to be accessed and updated in real-time,
securely, efficiently, effectively and affordably? Answer: yes. Sophisticate wireless
application gateways, middle-ware, “no-coding-required” application design tools, XML-
libraries, single-login for multiple applications, encryption and secured access
functionality make it possible today. It is only getting easier, cheaper and faster to
wirelessly enable existing and/or create new mobile applications. To get close to the
“anytime, anywhere” dream, there are reliable technology solutions available that allow
users to wirelessly and securely access and download data from a server to a device,
create or change information while not on line, and then re-connect and synchronize back
with the server. Very effective when users need to access data or create transactions deep
within a building or basement, or in areas outside cellular coverage. Add the right
hardware and software technology to a well-defined business plan and a properly
organized and executed systems integration strategy and you have the recipe for success
in wireless.
Are we going to see the end of messy wires protruding from computers, printers,
modems, scanners, projectors and other peripherals? Answer: it depends. Subject to the
inherent restrictions of battery life, the near future reality is one of devices totally
interconnected without wires. Blue-tooth and 802.11b printers, projectors, printers and
access devices, for example, make it possible. Unfortunately, the power cord is not going
away anytime soon.
What about voice over WLAN and unified messaging? Well, technology solutions are
available today to make and receive phone calls, manage email and calendar and run
other applications from one device while walking un-tethered within a WiFi hotspot. Not
only that, technology is available to allow users to walk away from an 802.11 network
and automatically connect to a GPRS or 1XRTT network, seamlessly maintaining the
same IP session. Imagine the possibilities once 3G networks start delivering consistent
bandwidth. Wireless printing from any device? Coming soon to an Airport, Convention
Center, Hotel or Coffee Shop near you.
Availability isn’t everything
Now, the fact that all this is available, reliable and surprisingly affordable does not mean
that it should be deployed, just to keep up with the pace of technology.
One of the problems with the whole wireless and mobility story is that in many cases
technology objectives have overtaken business objectives. As a result, wireless and
mobility projects have been implemented without solid planning, business cases, proper
cost/benefit analysis and obviously without executive management buying into or fully
supporting the project. Many still think wireless and mobility is about devices and
networks rather than systems integration. Not unlike what has happened many times over
in the IT world, the results have been predictable. Without executive management
support, projects are soon abandoned or, worse yet, crash and burn, with the associated
casualties and personal embarrassment making big news.
Sadly, this situation has hampered the implementation of wireless and mobility solutions
in areas that could have substantial benefits for corporations, institutions or the public at
large. The wireless industry is not without blame, at times being guilty of over-
simplifying the work of implementing a wireless LAN or WAN. Setting up a wireless
LAN is often advertised as being as simple as purchasing a few Access Points, plugging
them into an existing Ethernet LAN and turning on WEP encryption (or sometimes not
even that). Or purchasing a few Sierra Wireless cards, installing them into a laptop, tablet
or Pocket PC, instantly creating a ready-made wireless environment. At first sight, the
perceived benefits are immense. Imagine being able to access your intranet, search the
web for information from wherever the network allows you to connect and access all
those web-enabled applications your IT department has built over the years. Until
someone finds out, usually at the worst moment or in the worst possible way that
corporate security, networking and other key guidelines have been ignored and a threat to
corporate data has been created. Or that after the initial $50 dollar a month, unlimited
access incentive plan has expired, usually after the first six months, the cost jumps to
$500 or $600 per month in wireless data charges, or that making a voice call using a
GSM or 1XRTT service costs substantially more than a regular cellular voice call.
what is the future of wireless?
Well, although the road has been bumpy, the future is bright. Some may think that
deployment of wireless LAN/WAN solutions has stalled. I would beg to differ. It is only
starting. Many are waiting for wireless LANs to “become more secure”. Well, many are
still waiting for the Internet to become more secure also. Others are taking full advantage
of proven IT design, implementation and support techniques, reliable technology and
common sense procedures and guidelines to deploy wireless networks that are as secure
as any wired environment. And the list of success stories, corporations and institutions
realizing important productivity gains as a result of deploying wireless technology keeps
growing.
Uses
A Wi-Fi enabled device such as a PC, game console, mobile phone, MP3 player or PDA
can connect to the Internet when within range of a wireless network connected to the
Internet. The coverage of one or more interconnected access points — called a hotspot —
can comprise an area as small as a single room with wireless-opaque walls or as large as
many square miles covered by overlapping access points. Wi-Fi technology has served to
set up mesh networks, for example, in London.[1] Both architectures can operate in
community networks.
In addition to restricted use in homes and offices, Wi-Fi can make access publicly
available at Wi-Fi hotspots provided either free of charge or to subscribers to various
providers. Organizations and businesses such as airports, hotels and restaurants often
provide free hotspots to attract or assist clients. Enthusiasts or authorities who wish to
provide services or even to promote business in a given area sometimes provide free Wi-
Fi access. Metropolitan-wide Wi-Fi (Muni-Fi) already has more than 300 projects in
process.[2] There were 879 Wi-Fi based Wireless Internet service providers in the Czech
Republic as of May 2008.[3][4]
Wi-Fi also allows connectivity in peer-to-peer (wireless ad-hoc network) mode, which
enables devices to connect directly with each other. This connectivity mode can prove
useful in consumer electronics and gaming applications.
When wireless networking technology first entered the market many problems ensued
for consumers who could not rely on products from different vendors working together.
The Wi-Fi Alliance began as a community to solve this issue — aiming to address the
needs of the end-user and to allow the technology to mature. The Alliance created the
branding Wi-Fi CERTIFIED to reassure consumers that products will interoperate with
other products displaying the same branding.
Many consumer devices use Wi-Fi. Amongst others, personal computers can network to
each other and connect to the Internet, mobile computers can connect to the Internet from
any Wi-Fi hotspot, and digital cameras can transfer images wirelessly.
As of 2007 Wi-Fi technology had spread widely within business and industrial sites. In
business environments, just like other environments, increasing the number of Wi-Fi
access-points provides redundancy, support for fast roaming and increased overall
network-capacity by using more channels or by defining smaller cells. Wi-Fi enables
wireless voice-applications (VoWLAN or WVOIP). Over the years, Wi-Fi
implementations have moved toward "thin" access-points, with more of the network
intelligence housed in a centralized network appliance, relegating individual access-
points to the role of mere "dumb" radios. Outdoor applications may utilize true mesh
topologies. As of 2007 Wi-Fi installations can provide a secure computer networking
gateway, firewall, DHCP server, intrusion detection system, and other functions.
Wi-Fi allows local area networks (LANs) to be deployed without wires for client devices,
typically reducing the costs of network deployment and expansion. Spaces where cables
cannot be run, such as outdoor areas and historical buildings, can host wireless LANs.
Wireless network adapters are now built into most laptops. The price of chipsets for Wi-
Fi continues to drop, making it an economical networking option included in even more
devices. Wi-Fi has become widespread in corporate infrastructures.
Different competitive brands of access points and client network interfaces are inter-
operable at a basic level of service. Products designated as "Wi-Fi Certified" by the Wi-Fi
Alliance are backwards compatible. Wi-Fi is a global set of standards. Unlike mobile
telephones, any standard Wi-Fi device will work anywhere in the world.
Wi-Fi is widely available in more than 220,000 public hotspots and tens of millions of
homes and corporate and university campuses worldwide.[5] Wi-Fi Protected Access
encryption (WPA and WPA2) is not easily cracked if strong passwords are used. New
protocols for Quality of Service (WMM) make Wi-Fi more suitable for latency-sensitive
applications (such as voice and video), and power saving mechanisms (WMM Power
Save) improve battery operation.
[edit] Limitations
Spectrum assignments and operational limitations are not consistent worldwide. Most of
Europe allows for an additional 2 channels beyond those permitted in the U.S. for the 2.4
GHz band. (1–13 vs. 1–11); Japan has one more on top of that (1–14). Europe, as of
2007, was essentially homogeneous in this respect. A very confusing aspect is the fact
that a Wi-Fi signal actually occupies five channels in the 2.4 GHz band resulting in only
three non-overlapped channels in the U.S.: 1, 6, 11, and three or four in Europe: 1, 5, 9,
13 can be used if all the equipment on a specific area can be guaranteed not to use
802.11b at all, even as fallback or beacon. Equivalent isotropically radiated power (EIRP)
in the EU is limited to 20 dBm (100 mW).
[edit] Reach
See also: Long-range Wi-Fi
Wi-Fi networks have limited range. A typical Wi-Fi home router using 802.11b or
802.11g with a stock antenna might have a range of 32 m (120 ft) indoors and 95 m (300
ft) outdoors. Range also varies with frequency band. Wi-Fi in the 2.4 GHz frequency
block has slightly better range than Wi-Fi in the 5 GHz frequency block. Outdoor range
with improved (directional) antennas can be several kilometres or more with line-of-
sight.
Due to reach requirements for wireless LAN applications, power consumption is fairly
high compared to some other low-bandwidth standards. Especially Zigbee and Bluetooth
supporting wireless PAN applications refer to much lesser propagation range of <10m
(ref. e.g. IEEE Std. 802.15.4 section 1.2 scope). The high power consumption of Wi-Fi
makes battery life a concern for mobile devices.
[edit] Mobility
Because of the very limited practical range of Wi-Fi, mobile use is essentially confined to
such applications as inventory taking machines in warehouses or retail spaces, barcode
reading devices at check-out stands or receiving / shipping stations. Mobile use of Wi-Fi
over wider ranges is limited to move, use, move, as for instance in an automobile moving
from one hotspot to another (Wardriving). Other wireless technologies are more suitable
as illustrated in the graphic.
The most common wireless encryption standard, Wired Equivalent Privacy or WEP, has
been shown to be easily breakable even when correctly configured. Wi-Fi Protected
Access (WPA and WPA2), which began shipping in 2003, aims to solve this problem and
is now available on most products. Wi-Fi Access Points typically default to an "open"
(encryption-free) mode. Novice users benefit from a zero-configuration device that works
out of the box, but this default is without any wireless security enabled, providing open
wireless access to their LAN. To turn security on requires the user to configure the
device, usually via a software graphical user interface (GUI). Wi-Fi networks that are
open (unencrypted) can be monitored and used to read and copy data (including personal
information) transmitted over the network, unless another security method is used to
secure the data, such as a VPN or a secure web page. (See HTTPS/Secure Socket Layer.)
[edit] Population
Many 2.4 GHz 802.11b and 802.11g access points default to the same channel on initial
startup, contributing to congestion on certain channels. To change the channel of
operation for an access point requires the user to configure the device.
Wi-Fi pollution, or an excessive number of access points in the area, especially on the
same or neighboring channel, can prevent access and interfere with the use of other
access points by others, caused by overlapping channels in the 802.11g/b spectrum, as
well as with decreased signal-to-noise ratio (SNR) between access points. This can be a
problem in high-density areas, such as large apartment complexes or office buildings
with many Wi-Fi access points. Additionally, other devices use the 2.4 GHz band:
microwave ovens, security cameras, Bluetooth devices and (in some countries) Amateur
radio, video senders, cordless phones and baby monitors, all of which can cause
significant additional interference. General guidance to those who suffer these forms of
interference or network crowding is to migrate to a Wi-Fi 5 GHz product, (802.11a, or
the newer 802.11n if it has 5 GHz support) because the 5 GHz band is relatively unused,
and there are many more channels available. This also requires users to set up the 5 GHz
band to be the preferred network in the client and to configure each network band to a
different name (SSID). It is also an issue when municipalities,[6] or other large entities
such as universities, seek to provide large area coverage. This openness is also important
to the success and widespread use of 2.4 GHz Wi-Fi.
[edit] Hardware
[edit] Standard devices
An embedded RouterBoard 112 with U.FL-RSMA pigtail and R52 mini PCI Wi-Fi
card widely used by wireless Internet service providers (WISPs) in the Czech
Republic.
OSBRiDGE 3GN - 802.11n Access Point and UMTS/GSM Gateway in one
device.
A wireless access point (WAP) connects a group of wireless devices to an adjacent wired
LAN. An access point is similar to a network hub, relaying data between connected
wireless devices in addition to a (usually) single connected wired device, most often an
ethernet hub or switch, allowing wireless devices to communicate with other wired
devices.
Wireless adapters allow devices to connect to a wireless network. These adapters connect
to devices using various external or internal interconnects such as PCI, miniPCI, USB,
ExpressCard, Cardbus and PC card. Most newer laptop computers are equipped with
internal adapters. Internal cards are generally more difficult to install.
Wireless routers integrate a Wireless Access Point, ethernet switch, and internal Router
firmware application that provides IP Routing, NAT, and DNS forwarding through an
integrated WAN interface. A wireless router allows wired and wireless ethernet LAN
devices to connect to a (usually) single WAN device such as cable modem or DSL
modem. A wireless router allows all three devices (mainly the access point and router) to
be configured through one central utility. This utility is most usually an integrated web
server which serves web pages to wired and wireless LAN clients and often optionally to
WAN clients. This utility may also be an application that is run on a desktop computer
such as Apple's AirPort.
Wireless network bridges connect a wired network to a wireless network. This is different
from an access point in the sense that an access point connects wireless devices to a wired
network at the data-link layer. Two wireless bridges may be used to connect two wired
networks over a wireless link, useful in situations where a wired connection may be
unavailable, such as between two separate homes.
Wireless range extenders or wireless repeaters can extend the range of an existing
wireless network. Range extenders can be strategically placed to elongate a signal area or
allow for the signal area to reach around barriers such as those created in L-shaped
corridors. Wireless devices connected through repeaters will suffer from an increased
latency for each hop. Additionally, a wireless device connected to any of the repeaters in
the chain will have a throughput that is limited by the weakest link between the two
nodes in the chain from which the connection originates to where the connection ends.
Distance records (using non-standard devices) include 382 km (237 mi) in June 2007,
held by Ermanno Pietrosemoli and EsLaRed of Venezuela, transferring about 3 MB of
data between mountain tops of El Aguila and Platillon.[7][8] The Swedish Space Agency
transferred data 310 km (193 mi), using 6 watt amplifiers to reach an overhead
stratospheric balloon.[9]
Wi-Fi availability in the home is on the increase.[10] This extension of the Internet into the
home space will increasingly be used for remote monitoring.[citation needed] Examples of
remote monitoring include security systems and tele-medicine. In all these kinds of
implementation, if the Wi-Fi provision is provided using a system running one of
operating systems mentioned above, then it becomes unfeasible due to weight, power
consumption and cost issues.
Increasingly in the last few years (particularly as of early 2007), embedded Wi-Fi
modules have become available which come with a real-time operating system and
provide a simple means of wireless enabling any device which has and communicates via
a serial port.[11] This allows simple monitoring devices – for example, a portable ECG
monitor hooked up to a patient in their home – to be created. This Wi-Fi enabled device
effectively becomes part of the internet cloud and can communicate with any other node
on the internet. The data collected can hop via the home's Wi-Fi access point to anywhere
on the internet. [12]
These Wi-Fi modules are designed so that designers need minimal Wi-Fi knowledge to
wireless-enable their products.
During the early popular adoption of 802.11, providing open access points for anyone
within range to use was encouraged to cultivate wireless community networks;[13]
particularly since people on average use only a fraction of their upstream bandwidth at
any given time. Later, equipment manufacturers and mass-media advocated isolating
users to a predetermined whitelist of authorized users—referred to as "securing" the
access point.[dubious – discuss]
Measures to deter unauthorized users include suppressing the AP's SSID broadcast,
allowing only computers with known MAC addresses to join the network, and various
encryption standards. Suppressed SSID and MAC filtering are ineffective security
methods as the SSID is broadcast in the open in response to a client SSID query and a
MAC address can easily be spoofed. If the eavesdropper has the ability to change his
MAC address, then he can potentially join the network by spoofing an authorized
address.
WEP encryption can protect against casual snooping, but may also produce a misguided
sense of security since freely available tools such as AirSnort or aircrack can quickly
recover WEP encryption keys. Once it has seen 5-10 million encrypted packets, AirSnort
can determine the encryption password in under a second;[14] newer tools such as
aircrack-ptw can use Klein's attack to crack a WEP key with a 50% success rate using
only 40,000 packets. The newer Wi-Fi Protected Access (WPA) and IEEE 802.11i
(WPA2) encryption standards resolve most of the serious weaknesses of WEP
encryption.
Attackers who have gained access to a Wi-Fi network can use DNS spoofing attacks very
effectively against any other user of the network, because they can see the DNS requests
made, and often respond with a spoofed answer before the queried DNS server has a
chance to reply.[15]
One serious issue with wireless network security is not just encryption, but access to the
network (signal reception). With wired networking it is necessary to get past either a
firewall or the security guard & locked doors. With wireless it is necessary only to get
reception and spend as long as you want, comfortably out of (easy) reach of the network
owner. Most business networks protect sensitive data and systems by attempting to
disallow external access. Thus being able to get wireless reception (and thus possibly
break the encryption) becomes an attack vector on the network as well.[16]
Recreational logging and mapping of other people's access points has become known as
wardriving. It is also common for people to use open (unencrypted) Wi-Fi networks as a
free service, termed piggybacking. Indeed, many access points are intentionally installed
without security turned on so that they can be used as a free service. These activities do
not result in sanctions in most jurisdictions, however legislation and case law differ
considerably across the world. A proposal to leave graffiti describing available services
was called warchalking. In a Florida court case, owner laziness was determined not to be
a valid excuse. [17]
[edit] History
Wi-Fi uses both single carrier direct-sequence spread spectrum radio technology (part of
the larger family of spread spectrum systems) and multi-carrier OFDM (Orthogonal
Frequency Division Multiplexing) radio technology. The regulations for unlicensed
spread spectrum enabled the development of Wi-Fi, its onetime competitor HomeRF,
Bluetooth, and many other products such as some types of cordless telephones.
Unlicensed spread spectrum was first made available in the US by the Federal
Communications Commission in 1985 and these FCC regulations were later copied with
some changes in many other countries enabling use of this technology in all major
countries.[18] The FCC action was proposed by Michael Marcus of the FCC staff in 1980
and the subsequent regulatory action took 5 more years. It was part of a broader proposal
to allow civil use of spread spectrum technology and was opposed at the time by main
stream equipment manufacturers and many radio system operators.[19]
The precursor to Wi-Fi was invented in 1991 by NCR Corporation/AT&T (later Lucent
& Agere Systems) in Nieuwegein, the Netherlands. It was initially intended for cashier
systems; the first wireless products were brought on the market under the name
WaveLAN with speeds of 1 Mbit/s to 2 Mbit/s. Vic Hayes, who held the chair of IEEE
802.11 for 10 years and has been named the 'father of Wi-Fi,' was involved in designing
standards such as IEEE 802.11b, and 802.11a.
In the early 2000s, many cities around the world announced plans for a city wide Wi-Fi
network. This proved to be much more difficult than their promoters initially envisioned
with the result that most of these projects were either canceled and placed on indefinite
hold. A few were successful, for example in 2005, Sunnyvale, California became the first
city in the United States to offer city wide free Wi-Fi, [20].
The term "Wi-Fi", first used commercially in August 1999,[21] was coined by a brand
consulting firm called Interbrand Corporation that had been hired by the Alliance to
determine a name that was "a little catchier than 'IEEE 802.11b Direct Sequence'."[22][23][24]
Interbrand invented "Wi-Fi" as simply a play-on-words with "Hi-Fi", as well as creating
the yin yang style Wi-Fi logo.
The Wi-Fi Alliance initially complicated matters by stating that it actually stood for
"Wireless Fidelity", as with the advertising slogan "The Standard for Wireless Fidelity",
[23]
but later removed the phrase from their marketing. The Wi-Fi Alliance's early White
Papers still held in their knowledge base: "… a promising market for wireless fidelity
(Wi-Fi) network equipment."[25] and "A Short History of WLANs." The yin yang logo
indicates that a product had been certified for interoperability.[26]
The Alliance has since downplayed the connection to "Hi-Fi". Their official position is
that it is merely a brand name that stands for nothing in particular, and they now
discourage the use of the term "Wireless Fidelity".
The Alliance promotes standards with the aim of improving the interoperability of
wireless local area network products based on the IEEE 802.11 standards. The Wi-Fi
Alliance, a consortium of separate and independent companies, agrees on a set of
common interoperable products based on the family of IEEE 802.11 standards.[27] The
Wi-Fi Alliance certifies products via a set of defined test-procedures to establish
interoperability. Those manufacturers