Wi-Fi Technology: Universal College of Engineering and Technology

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

WI-FI TECHNOLOGY

UNIVERSAL COLLEGE OF ENGINEERING AND


TECHNOLOGY

B.HARITHA D.KIRANMAI
III CSE III CSE
Sumalatha.hari@yahoo.com Doppala.kiran@gmail.com

Abstract:
The medium is the message. This is merely to say Access points, installed within a Wi-Fi location,
that the personal and social consequences of any transmit an RF signal to Wi-Fi enabled devices that
medium...result from the new scale that is introduced are within range of the access point, which is about
into our affairs by each extension of us or by any 300 feet. The speed of the transmission is governed
new technology. This paper reviews the form of by the speed of the pipeline fed into the access point.
wireless communication in which Wi-Fi, short for T-Mobile HotSpot service is unique in that every T-
wireless fidelity; which is the latest buzzword in Mobile HotSpot service location is equipped with a
THE IT world. Wi-Fi enabled computer network can full T-1 connection running to the access points.
carry data between computers without using any With T-Mobile HotSpot service, a customer, once
cables. Wi-Fi functions through a transmitting associated with the access point, can connect to the
antenna which is usually linked to a DSL or high- Internet and enjoy near T-1 speeds in the comfort of
speed land-based Internet connection and uses radio American Airlines Admirals Clubs, Starbucks
waves to beam signals. Wi-Fi connections can be coffeehouses, Borders Books & Music stores and
made up to 300 feet away from a "hot spot"; An numerous airports.Wi-Fi (short for "wireless
Access Point is also known as a “hotspot. The fidelity") is the popular term for a high-frequency
hotspot is build around the network router. wireless local area network (WLAN). The Wi-Fi
Communicating computers can be as much as 100 technology is rapidly gaining acceptance in many
feet apart indoors o even 200 feet outdoors. Thus the companies as an alternative to a wired LAN. It can
distance becomes imaginary and wire connections also be installed for a home network.Wi-Fi is
become redundant. Wi-Fi provides users with specified in the 802.11b specification from the
mobile, broadband Internet access, eliminating the Institute of Electrical and Electronics Engineers
need to be physically connected to a network. Most (IEEE) and is part of a series of wireless
importantly wireless networks are open to easy specifications together with 802.11, 802.11a, and
access by hackers or other tech savvy peeping toms, 802.11g. All four standards use the Ethernet protocol
since these networks are till date unencrypted. and CSMA/CA (carrier sense multiple access with
collision avoidance) for path sharing. The 802.11b
INTRODUCTION (Wi-Fi) technology operates in the 2.4 GHz range

Wi-Fi, or Wireless Fidelity, is a term that is used offering data speeds up to 11 megabits per second.

generically to refer to any product or service using The modulation used in 802.11 has historically been

any type of 802.11 technologies. Wi-Fi networks phase-shift keying (PSK). The modulation method

operate in the unlicensed 2.4 and 5 GHz radio bands, selected for 802.11b is known as complementary

with an 11 Mbps (802.11b) or 54 Mbps (802.11a) code keying (CCK), which allows higher data speeds

data rate, and is less susceptible to multipath-propagation

respectively.Wi-Fi enabled devices (laptops or interference. Unless adequately protected, a Wi-Fi

PDAs) can send and receive data wirelessly from wireless LAN can be susceptible to access from the

any location equipped with Wi-Fi access. How? outside by unauthorized users, some of whom have
used the access as a free Internet connection. (The signal success of the computer industry in the last
activity of locating and exploiting security-exposed few years, a rare bright spot in a bubble-battered
wireless LANs is commonly market: Wi-Fi, the short-range wireless broadband
Known as war driving and an identifying technology. Among geeks, it has inspired a mania
iconography has developed that is known as unseen since the days of the internet boom. Tens of
warchalking.) Companies that have a wireless LAN millions of Wi-Fi devices will be sold this year,
are urged to add security safeguards including the majority of laptop computers. Analysts
Such as the Wired Equivalent Privacy (WEP) predict that 100m people will be using Wi-Fi by
encryption standard, the setup and use of a virtual 2006. Homes, offices, colleges and schools around
private network (VPN) or IPsec, and a firewall or the world have installed Wi-Fi equipment to blanket
DMZ. their premises with wireless access to the internet.
WiFi network can: Wi-Fi access is available in a growing number of
1. Connect to the internet. coffee-shops, airports and hotels too. Yet merely five
2. Connect to multiple computers to each other and years ago wireless networking was a niche
to your printer. technology. How did Wi-Fi get started, and become
3. Can share high speed broadband cable or DSL so successful, in the depths of a downturn?
connection.
HOW DOES WI-FI W0RK?
CASE HISTORY
The wide use of notebook and other portable
Wireless networking: Few people have a kind word computers has driven advances in wireless networks.
to say about telecoms regulators. But the success of The most conmen use for a wireless network is to
Wi-Fi shows what can be achieved when regulators connect a single notebook computer to a broad band
and technologists work together it has as perhaps the internet connection. Wireless
networks use either infrared or radio-frequency frequency of 2.4-2.4835GHz. These frequencies are
transmissions to link these mobile computers to common in microwaves, and cord less phones.
networks.
Wifi networks use radio technologies called IEEE
802.11b or 802.11a to provide a secure, fast, and
reliable wireless connection. IEEE stands for
Institute of Electrical and Electronics Engineers,
New York, which is a membership organization that
includes engineers, scientists and students in
electronics and allied fields. It has more than
300,000 members and is involved with setting
standards for computers and communications. The Wi-Fi functions through a transmitting antenna which is

international standard for wireless networking uses a usually linked to a DSL or high-speed land-based Internet
connection and uses radio waves to beam signals. Another
antenna, which is in the laptop or PC, catches the signal.
The signal, usually l, has a range of about 300 feet for
most home connections. The farther the user is from the
signal, the slower the connection speed. Wireless LANS
have capacity speeds from less than 1 Mbps to 8 Mbps. Wi-
Fi can easily be expanded in the home or business with the
simple step of plugging in a card or a USB connection to
the new computer or other Wi-Fi certified product. No cords
or cables, or wires are necessary.

WI-FI HOT SPOTS:

The region covered by one or several access


points is called a Hotspot. Hotspots can range from
a single room to many square miles of overlapping
hotspots. Hotspots are locations that allow users to
access networked services, such as the internet,
without a cabled connection. These are increasingly
 
useful given the popularity of mobile computers
(such as laptops and PDAs). Hotspots are often The increasing availability of hotspots and
found near restaurants, train stations, airports, cafes, hot zones has made internet access practically
libraries and other public places where users tend to universal. One of the drawbacks to this
gather. development is the chance to have your wireless
access point pirated by an unauthorized user.
Unless adequately protected, a Wi-Fi network can
be highly susceptible to access by unauthorized
users looking for a free Internet connection. The
activity of locating and exploiting security-
exposed wireless LANs is called War Driving
and is an increasing concern among wireless
users. Any entity that has a wireless LAN should
use security safeguards such as the Wired
Equivalent Privacy (WEP) encryption standard,
the more recent Wi-Fi Protected Access (WPA),
Media Access Control (MAC), or a virtual
private network (VPN).
STANDARDS
Early development included industry-specific Wi-Fi devices in home or consumer-type
solutions and proprietary protocols, but at the end of environments can connect via a broadband Internet
the 1990s these were replaced by standards, connection into a single router which can serve both
primarily the various versions of IEEE 802.11 (Wi- wired and wireless clients. They can also use ad-hoc
Fi) and HomeRF (2 Mbit/s, intended for home use). mode for client to client connections, and be built
An alternative ATM-like 5 GHz technology, into non-computer devices to enable wireless
HIPERLAN, appears less likely to succeed, due to connectivity to the Internet.
political and market factors. IEEE 802.11 denotes a
Business and industrial Wi-Fi has become
set of Wireless LAN standards developed by
ubiquitous as of 2007. In business environments,
working group 11 of IEEE 802. The term is also
increasing the number of Wi-Fi access points
used specifically for the original version; to avoid
provides redundancy, support for fast roaming and
confusion that is sometimes called "802.11 legacy".
increase overall network capacity by using more
The 802.11 family currently includes three separate
channels or creating smaller cells. Wi-Fi enables
protocols that focus on encoding (a, b, g); other
wireless voice applications (VoWLAN or WVOIP).
standards in the family (c-f, h-j, n) are service
Over the years, Wi-Fi implementations have moved
enhancement and extensions, or corrections to
toward 'thin' access points, with more of the network
previous specifications. 802.11b was the first widely
intelligence housed in a centralized network
accepted wireless networking standard followed,
appliance, relegating individual Access Points to be
paradoxically, by 802.11a and 802.11g
simply 'dumb' radios. Outdoor applications may
USES OF WI-FI: utilize true mesh topologies. As of 2007, Wi-Fi
installations can provide a proactive, self-managed
A person with a Wi-Fi enabled device such
network that functions as a security gateway,
as a PC, cell phone or PDA can connect to the
firewall, DHCP server, intrusion detection system,
Internet when in proximity of an access point. Wi-Fi
and a myriad of other features not previously
also allows connectivity in peer-to-peer (wireless ad-
considered relevant to a wireless network.
hoc network) mode, which enables devices to
connect directly with each other. This connectivity
ADVANTAGES OF WI-FI
mode is useful in consumer electronics and gaming
Many reliable and bug-free WiFi products on the
applications. The best example of this is the use of
market. Competition amongst vendors has lowered
Bluetooth.
prices considerably since their inception. While

Home Wi-Fi clients come in many shapes connected on a WiFi network, it is possible to move

and sizes, from stationary PCs to digital cameras. about without breaking the network connection.

The trend as of 2007 is to incorporate wireless into


every electronic device where mobility is desired.
DISADVANTAGES OF WI-FI
The 802.11b and 802.11g flavors of Wi-Fi use the uses Wired Equivalent Privacy protocol for
2.4GHz spectrum, which is crowded with other protection (WEP is a security protocol, specified in
devices such as Bluetooth, microwave ovens, the IEEE Wi-Fi standard, 802.11b that is designed to
cordless phones, or video sender devices, among provide a WLAN with a level of security and privacy
many others. This may cause degradation in comparable to what is usually expected of a wired
performance. Other devices that use microwave LAN), though has been shown to be easily
frequencies can also cause degradation in breakable. Newer wireless solutions are slowly
performance, such as certain types of cell phones. providing support for the superior Wi-Fi Protected
Power consumption is fairly high compared to other Access (WPA) protocol, though many systems still
standards, making battery life and heat a concern. employ WEP.
Not always Configured properly by user. Commonly

APPLICATIONS

There may be metered access or with a pass for, for


example, a day, month or year, valid for one location
or a whole chain. They are e.g. in coffee houses and
airports around the world. T-Mobile provides
hotspots in many Starbucks Coffee houses in the US.
Pacific Century Cyber Works has a similar
arrangement with Pacific Coffee in Hong Kong.
Other large hotspot providers in the US include
PRACTICAL APPLICATIONS
Boingo (www.boingo.com), Wayport
(www.wayport.com) and iPass (www.ipass.com). . Through the use of Wi-Fi, organizations can extend
Sify (www.sify.com), India's largest Internet service their Internet access across the enterprise.
provider, has set up 120 wireless access points in From boardrooms to auditoriums, visitors and
Bangalore in hotels, malls and government offices employees will be able perform
and many other applications. Compare Internet cafe. routine Internet tasks without the need to physically
Many airports, hotels, and fast-food facilities now connect to cumbersome wires and network plugs.
offer public access to a Wi-Fi network.Wi-fi uses Additionally, Wi-Fi can be applied in the following
ethernet protocol. free or fee-based methods: Fee based models for
office buildings, high-rises and home developments
Outdoor facilities and campus models Large venue
models for convention and tourist facilities Self
sustaining models for municipal Wi-Fi or
community Wi-Fi Retail, restaurants and shopping WiFi network. The term WEP stands for Wired
center ‘hot spots’ Transit (mobile) models for public Equivalent Privacy. WEP is an encryption system for
transportation, RV parks and marinas Setting up a the data that the 802.11 protocol sends through the
hotspot in your home is very easy. This can be done air. There are two types of WEP: 64-bit encryption
in one of two ways: (40-bit) and 128-bit encryption (104-bit). The 40-bit
1. Purchase a Wireless Access Point and plug it into encryption was the original standard and was easily
the Ethernet network. broken. The 128-bit encryption is the more secure
2. If you are setting up a network in your home for method of encryption and is what most people use if
the first time, or if you are upgrading, buy a Wireless they enable WEP. For any hotspot that is using WEP
Access Point Router. Your hotspot should cover is inaccessible unless you have the WEP key. If you
about 100 feet in all directions. Setting up a wireless setup a hotspot in your home, you should use 128-bit
Hotspot is quite simple and there are two ways in WEP key to prevent the neighbors from peering into
which you can go about doing it: your network. It is important to recognize that
• If you already have an Ethernet network but want wireless security is an end-to-end requirement, and
to add the wireless hotspot capability, you can just can be sub-divided into various security domains.
purchase a Wireless Access Point and plug it into the
Ethernet network. • Appliance domain security attempts to ensure that
• The second way is if you do not have an Ethernet only authorized entities can use the
Network, you can just buy a Wireless Access Point appliance, and access or modify the data stored on it.
Router. This box has the ability to: 1) connect to • Network access domain security ensures that only
your cable modem or DSL modem through a port, 2) authorized devices can connect to a wireless network
a router which has DHCP capabilities, 3) an Ethernet or service, and ensures data privacy and integrity
hub, 4) a firewall for security purposes and 5) a over the wireless link.
wireless access point. With this box you can connect • Network domain security addresses security of the
traditional network cables or you can just go infrastructure (voice and data) networks that support
wireless. a wireless network. Infrastructure networks are
typically wired, could include public networks, and
could span networks owned by multiple carriers.
WI-FI SECURITY
• Application domain security ensures that only safe
Now that we know how to set up a hotspot lets look and trusted applications can execute on the
at the security vulnerabilities. WiFi hotspots are appliance, and that transactions between applications
either open to all or secure and only a few can access executing on the client and
it. If a hotspot is open, then anyone with a WiFi card application servers across the Internet are secure. A
can access the hotspot there is no need for any type well-known concern with the WAP
of identification. If it is a secure hotspot, then the
user needs to know a WEP key to connect to the
security architecture is the existence of a “security translation
gap” at the wireless gateway, which arises since the
between different transport-layer security protocols server eliminates this problem. For example, NTT
causes data to exist in decrypted form. This problem DoCoMo’s iMode service uses SSL to secure end-to-
can be end connections, and the recently released WAP
somewhat alleviated by maintaining 2.0 specifications includes a new mode that uses
the WAP gateway within a secure network domain standard Internet protocols (HTTP/TLS/TCP/IP)
(e.g., behind the same firewall as the web server). between the wireless client and a server across the
Alternatively, the use of an end-to-end security Internet.
protocol between the wireless handset and wired

FUTURE:
The market is expected to grow as the benefits of WLAN are recognized. Frost and Sullivan (a
market consulting based in New York) estimate the WLAN market to have been 0.3 billion US
dollars in 1998 and 1.6 billion dollars in 2005. So far WLANs have been installed primarily in
warehouses and resellers, but are recently being installed in various kinds of schools. Large
future markets are estimated to be in health care, educational institutes and corporate offices. In
the business environment, meeting places, public areas and side offices would be ideal for
WLAN.
CONCLUSION

WiFi is definitely the technology of tomorrow. As technology and security undergo


advancements, more people are utilizing WiFi’s capabilities. For personal use, families are able
to use this technology so that several computers around the house can be networked together. For
small businesses, money is saved on expensive wiring. Larger businesses do not need to worry
about how to wire large buildings and as mentioned before; employees can have more flexible
work schedules. It is a sound investment because the technology will continue to get better,
especially if security concerns can be curbed, which are paramount. Standards 802.11b and g are
the most up and coming and a drastic increase will be seen in these standards since they are
sensible and efficient for homes and small businesses. Since nearly all new laptops come with
internal wireless cards, or the feature is always an option, we will see a rise in the total number
of wireless LAN’s being set up and hotspots will grow increasingly popular. Businesses utilizing
them, such as Starbucks, have already seen the positive ramifications. Anyone interested in
getting ahead with the latest and greatest technologies should invest in the technology of Wi-Fi,
it is the movement of the future.

You might also like