Sunteți pe pagina 1din 6

A SURVEY ON WI-FI

Vinayak Hiremath#, Sreevathsa B.R.*


Department of Electronics & communication Engineering G M Institute of Technology Davangere, Karnataka, India- 577006
* # preevins@gmail.com sreevathsabr@gmail.com

Abstract-- Wireless network means the transmission of data without use of wires. Here we are going to present on one of the most adopted wireless network i.e., Wi-Fi (Wireless Fidelity). We are here to give a brief note on Wi-Fi principle, operations, and its benefit over other technologies. KeywordsOFDM (Orthogonal Frequency Division Multiplexing), BSS (Basic Service Set), ESS (Extended Service Set), AP (Access point), MAC (Media Access Control).

Wi-Fi stands for Wireless Fidelity and is used to define any of the wireless technology in IEEE 802.11 specification including (but not necessarily limited to) the wireless protocols 802.11a, 802.11b and 802.11g etc. A. Overview Wi-Fi uses both single carrier direct-sequence spread spectrum radio technology (part of larger family of spread spectrum system) and multi-carrier OFDM (Orthogonal Frequency Multiplexing) [2] radio technology. These regulations then enabled the development of Wi-Fi, its onetime competitor HomeRF and Bluetooth. B. Inventors Unlicensed spectrum was first made available by the Federal Communication Commission (FCC) in 1985 and these FCC regulations were later copied with some changes in many other countries enabling use of this technology in all major countries. The FCC action was proposed by Michel Marcus of FCC staff in 1980 and subsequent controversial regulatory action took 5 more years.

I.INTRODUCTION
The fast paced technology has changed the world as well as its habitants. In Todays global village there is no need to grab the telephone receiver and dial a specific number to transmit voice through cables merely to hear the voice of a beloved. The early days home internet access required using a modem connected to a computer to dial a number and maintain a connection. It was cumbersome and slow. Eventually, home users who could afford a jump in price could get a broadband access via Digital Subscriber Lines (DSL), cable and satellite.

Fig. 1 Old and busted: connecting via dial-up

Wi-Fi is a mechanism for wirelessly connecting electronics devices. The facilities like Wi-Fi have further improved the standard of communications by cutting down expenditure and increasing availability. To access internet through wired connection using modem was difficult as it was to be accessed over short lengths. But by using Wi-Fi, we can access internet wirelessly within a certain range of Wi-Fi signal availability depending upon the routers used.

Fig. 3 Vic Hayes, Father of Wi-Fi

II. Wi-Fi BASICS

The precursor to Wi-Fi was invented in 1991 by NCR Corporation/AT&T (later Lucent & Agere Systems) in Nieuwegein, the Netherlands. It was initially intended for cashier system; the first wireless product was brought on market under the name WaveLAN with a speed of 1MegaBit/second to 2MegaBit/second. Vic Hayes, who held the chair of IEEE 802.11 for 10 years and had been named the Father of Wi-Fi, was involved in designing standards such as 802.11b, 802.11e and 802.11g.

Fig. 2 Trademark for Wi-Fi

III. WORKING PRINCIPLE


A wireless network uses radio waves, just like cell phones, televisions and radios do. In fact, communication across a wireless network is a lot like two-way radio communication. It is showed as follows. A computers wireless adapter translates the data into a radio signal and transmits it using an antenna. A wireless router receives the signal and decodes it. It sends the information to the internet using a physical, wired Ethernet connection.

A. Infrastructure mode In infrastructure mode, each station computer connects to an access point via a wireless link. The set-up formed by the access point and the stations located within its coverage area are called the Basic Service Set (BSS). They form one cell. Each BSS is identified by a BSSID, a 6-byte (48-bite) identifier. In infrastructure mode, the BSSID corresponds to the access point's MAC address.

Fig. 5 Infrastructure mode of operation

Fig.4 Transmission of radio signal via antenna

The process also works in reverse, with the router receiving information from the internet, translate it into radio signal and sending it to the computer wireless adapter.

It is possible to link several access points together (or more precisely several BSS's) using a connection called a Distribution System (DS) in order to form an Extended Service Set (ESS). The distribution system can also be a wired network i.e., a cable between two access points or even a wireless network.

IV. MODES of OPERATION


There are several kinds of hardware that may be used to implement a Wi-Fi wireless network: Wireless adapters or Network Interface Controllers (NICs) are network cards with the 802.11 standard which let a machine connect to wireless network. Wi-Fi adapters are available in numerous formats, such as PCI cards, PCMCIA cards, USB adapters and compact flash cards. Access Points (AP) or sometimes called as hotspots can let nearby Wi-Fi equipped stations access a wide network to which the access point is directly connected. The 802.11 standard defines two operating modes [2]: Infrastructure mode [2], in which wireless clients are connected to access point. This is generally the default mode for 802.11 cards. Ad hoc mode [6], in which clients are connected to one another without any access point.

Fig. 6 Distribution system

An ESS is identified with an ESSID (Extended Service Set Identifier), a 32-character identifier (in ASCII format) which acts as its name on the network. The ESSID, often shortened to SSID, shows the network's name, and in a way it acts as a first-level security measure, since it is necessary for a station to know the SSID in order to connect to the extended network.

When a roaming user goes from one BSS to another while moving within the ESS, his or her machine's wireless network adapter is able to switch access points depending on the quality of the signal it receives from different access points. Access points communicate with one another using a distribution system in order to trade information about the stations and, if necessary, to transmit data from mobile stations. This feature which lets stations move "transparently" from one access point to another is called roaming. Communicating with access point: When a station joins a cell, the cell sends a probe request on each channel. This request contains the ESSID that the cell is configured to use, as well as the traffic volume that its wireless adapter can support. If no ESSID is set, the station listens to the network for an SSID. Each access point broadcasts at regular intervals (about ten times a second) a signal called a beacon, which gives information on its BSSID, its characteristics, and, if applicable, its ESSID. The ESSID is automatically broadcast by default, but it is possible (and recommended) to disable this option. Whenever a probe request is received, the access point checks the ESSID and the traffic volume request found in the beacon. If the given ESSID matches that of the access point, the access point sends a response containing synchronisation data and information on its traffic load. This way, the station that receives the response can check the quality of the signal being sent by the access point in order to determine how far away it is. Generally speaking, the closer an access point is, the higher its data transfer capacity is. So a station within range of multiple access points (which have the same SSID) may choose the access point offering the best balance of capacity and current traffic load. B. Ad hoc mode In ad hoc mode, wireless client machines connect to one another in order to form a peer-to-peer network, i.e. a network in which every machine acts as both a client and an access point at the same time. The set-up formed by the stations is called the Independent Basic Service Set (IBSS).

An IBSS is a wireless network which has at least two stations and uses no access point. The IBSS therefore forms a temporary network which lets people in the same room exchange data. It is identified by an SSID, just like an ESS in infrastructure mode. In an ad hoc network, the range of the IBSS is determined by each station's range. That means that if two of the stations on the network are outside each other's range, they will not be able to communicate, even if they can see other stations. Unlike infrastructure mode, ad hoc mode has no distribution system that can send data frames from one station to another. An IBSS, then, is by definition a restricted wireless network.

V. EXTENSIONS to 802.11
The IEEE 802.11 standard provides a maximum transfer rate of 2 mbps. This standard also provides for a number of set fall-back rates when the radio channel conditions cannot support the highest possible data rates. Additionally the 802.11 working group has been busy with following projects. They transmit at frequencies of 2.4GHz or 5GHz. This frequency is considerably higher than the frequencies used for cell phones, walkie-talkies and televisions. The higher frequency allows the signal to carry more data. They use 802.11 networking standards, with come in several flavours. The 802.11x standards[2] define the over-the-air protocols necessary to support networking in LAN environment: 802.11b- It was the first version to reach the market place. It is the slowest and least expensive standard and it is becoming less common as faster standard become less expensive. 802.11b transmits in the 2.4GHz frequency band of radio spectrum. It can handle up to 11MegaBits of data per second, and it uses Complimentary Code Keying (CCK) [1] coding. 802.11g- It also transmits at 2.4GHz, but it is a lot faster than 802.11b it can handle up to 54MegaBits of data per second. 802.11g is faster because it uses Orthogonal Frequency Division Multiplexing (OFDM), a more efficient coding technique. 802.11a- It transmits at 5GHz and can move up to 54MegaBits of data per second. It also uses OFDM coding. 802.11e- The projects purpose is to enhance the current 802.11 Media Access Control (MAC) [4]

Fig.7 Ad hoc mode of operation

specification to expand support for LAN application that has quality of service requirement. For example, applications include transport of voice, audio, and video over 802.11x networks; video conference; and media streaming distribution. The enhancement of MAC layer in conjunction with the enhanced Physical (PHY) layer provided by 802.11 a/b/g will provide necessary system performances improvements for new high level applications. The idea of voice over WLANs (VoWLAN) has started to receive the larger share of attention lately as proposed WLAN [1] application (implemented through an integration of WLAN technology with wireless mobile phones) 802.11h- The projects purpose is to enhance the current 802.11 MAC and 802.11a PHY specifications with network management and control extensions provide spectrum and transmit power control management in unlicensed 5GHz band. This project also provide for easier acceptance of the IEEE 802.11 standard in European countries. 802.11i- The projects purpose is to enhance 802.11 MAC to enhance the security and authentication mechanisms. This work has recently been accepted (2004) and published. 802.11j- The projects purpose is to enhance the standard to add newly available 4.9 and 5GHz channels for operations in Japan. This work has recently been accepted (2004) and published. Newer standards like 802.11n can be even faster than 802.11g as it based on Multiple Input multiple Output (MIMO) technology. It uses Spatial Division Multiplexing (SDM). However 802.11n standard is not yet final. Other standards like IEEE 802.11 f/k/ma/p/r/s/u/v were also proposed. But they are not yet accepted. A separate standard, 802.16 (or WiMAX), transmits at 70 Mbps and has a range of up to 30 miles. It can operate in licensed or unlicensed bands of the spectrum from 2-6GHz. WiMAX typically. Wi-Fi radios can transmit any of these frequency bands. Or, they can frequency hop rapidly between the different bands. Frequency hopping helps reduce interference and lets multiple devices use same wireless connection simultaneously.

Fig.8 Data rates of various 802.11x standards [5]

As long they all have wireless adapter, several devices can use one router to connect the internet. This connection is convenient and virtually invisible, it is fairly reliable. If the router fails or if too many peoples try to use high bandwidth applications at same time, however, users can experience interference or loss of connection.

VI. BLUETOOTH vs. Wi-Fi


Bluetooth is significantly slower than 802.11x products but it is also incompatible with them. Bluetooth is a telecommunications industry specification that describes how mobile phones, computers, and personal digital assistants can be easily interconnected using a short-range wireless connection. Bluetooth products achieve this by placing a small, inexpensive radio transmitter/receiver module in each electronic device. This module acts as the physical medium to connect these devices and also provides the necessary communication protocols needed for these devices to successfully transmit data. The benefits of Bluetooth are its wireless, so when you travel, you dont have to worry about carrying a multitude of connectors and attachments with you just to connect your peripherals. It is very inexpensive. Bluetooth doesn't require you to do anything special to make it work. The devices find one another and strike up a conversation without any user input at all. This makes it ridiculously simple to connect previously complicated electronic devices. The wireless devices like printer, PDAs, keyboard, mouse can be connected over a certain range of distance to PCs. Bluetooth devices operate in the 2.45GHz frequency range. Other devices currently operate in this frequency range as well, including cordless phones, baby monitors, and garage-door openers etc. One of the ways that Bluetooth devices avoid interfering with these other systems is by sending out a very weak 1mw signal a cell phone by comparison can transmit up to 3 watts. This low power limits the range of a Bluetooth device to about 10 meters.

A frequency hopping scheme allows devices to communicate even in areas with a great deal of electromagnetic interference. In addition to data, up to three voice channels are available, and each device is assigned a unique 48-bit address. Connections can be point-to-point or multipoint. Bluetooth devices have a maximum transmission rate of only 1 Mbps - up to 2 Mbps in the second generation of the technology of which about 20 percent of this capacity is used for data headers and handshaking information. By comparison, Wi-Fi wireless LAN adapters are much more powerful and capable of reaching data transmission rates approaching 54Mbps. The most popular Wi-Fi standard is the one used in your D-Link router, 802.11b. This version provides users with 11 Mbps transmission speeds and also operates in the 2.4 GHz band. Products based on this specification have very good range and can commonly transmit data at distances of well over 100 feet. The most recently introduced specification, 802.11g, offers users the best of both worlds by providing users with higher transmission rates yet 100 percent compatibility with existing 802.11b products, which means your current investment in 802.11b technology would not be lost if you later decide to upgrade a few of your systems to the new "g" standard. Wi-Fi products also have strong security protocols, which make them a better network solution.

B .Disadvantages Power consumption is fairly high compared to some other low bandwidth standards, such as Zigbee and Bluetooth, making battery life a concern. The most common wireless encryption standard, Wired Equivalent Privacy (WEP), has been shown to be easily breakable even when correctly configured. Wi-Fi Protected Access (WPA and WPA2) which began shipping in 2003 aims to solve this problem and is now available on most products. Wi-Fi Access Points typically default to an open (encryptionfree) mode. Novice users benefit from a zero configuration device that works out of the box but without security enabled providing open wireless access to their LAN. To turn security on requires the user to configure the device, usually via software Graphical User Interface (GUI). Wi-Fi networks that are open (unencrypted) can be monitored and used to read and copy data (including personal information) transmitted over the network unless another security method is used to secure the data like a VPN or a secure web page. (HTTPS/Secure Socket Layer). Many 2.4 GHz 802.11b and 802.11g Access points default to the same channel on initial startup, contributing to congestion on certain channels. To change the channel of operation for an access point requires the user to configure the device.

VII. ADVANTAGES AND DISADVANTAGES


A. Advantages Wi-Fi allows LANs to be deployed without cabling for client devices, typically reducing the costs of network deployment and expansion. Spaces where cables cannot be run, such as outdoor areas and historical buildings, can host wireless LANs. Different competitive brands of access points and client network interfaces are inter-operable at a basic level of service. Products designated as "Wi-Fi Certified" by the Wi-Fi Alliance are backwards inter-operable. Wi-Fi is a global set of standards. Unlike cellular carriers, the same Wi-Fi client works in different countries around the world. Widely available in more than 250,000 public hot spots and tens of millions of homes and corporate and university campuses worldwide, Wi-Fi has become the preferred method of network connectivity WPA is not easily cracked if strong passwords are used and WPA2 encryption has no known weaknesses. New protocols for Quality of Service and power saving mechanisms make Wi-Fi even more suitable for latency-sensitive applications (such as voice and video) and small form-factor.

Fig. 9 Basic Wireless communication

Wi-Fi networks have limited range. A typical Wi-Fi home router using 802.11b or 802.11g with a stock antenna might have a range of 45 m (150ft) indoors and 90 m (300ft) outdoors. Range also varies with frequency band. Wi-Fi in the 2.4 GHz frequency block has slightly better range than Wi-Fi in the 5 GHz frequency block. Outdoor range with improved antennas can be several kilometers or more with line-of-sight. Wi-Fi pollution, of an excessive number of an access point with other access points in the area, especially on the same or neighboring channel, can prevent access and interfere with the use of other access points by others caused by overlapping channels in the 802.11g/b spectrum as well as

with decreased signal-to-noise ratio (SNR) between access points. This can be a problem in high-density areas such as large apartment complexes or office buildings with many WiFi access points. Additionally, other devices use the 2.4 GHz band: microwave ovens, cordless phones, baby monitors, security cameras, and Bluetooth devices can cause significant additional interference. It is also an issue when municipalities or other large entities such as universities seek to provide large area coverage. Everyone is considered equal for the base standard without 802.11e/WMM when they use the band. This openness is also important to the success and widespread use of 2.4 GHz Wi-Fi, but makes it unsuitable for must have public service functions or where reliability is required. Users sometimes suffer network "frustrations" or a total network breakdown.

IX. CONCLUSION
Wi-Fi has experienced tremendous adoption in the last several years. The adoption and success of Wi-Fi have fuelled considerable activity and investment in 802.11 standards development that have resulted in significant extensions in the capabilities of the standard. As a result, WiFi is getting faster, more full-featured and more secure even as manufacturing volumes continue to reduce per-unit costs. The enhancements to the Wi-Fi standards are addressing and enabling new markets, new applications and new usage scenarios. These developments will continue to drive adoption and further investment leading to the further growth and maturity of the standard. ACKNOWLEDGMENT We acknowledge to our beloved parents and to all our friends who collected information from various resources and helped us making this paper possible. REFERENCE
[1] [2] Theodore S. Rappaport, Wireless Communications: principles and practice, 2nd Ed., University of Texas, Austin. Gary J. Mullett, Introduction to Wireless Telecommunications Systems and Networks, National Center of Telecommunications Technologies, Springfield Technical Community College, Springfield, MA. B Forouzan, Data Communication and Networking,, 4th Ed, Tata McGraw Hill, 2006 Wireless LAN Medium Access control (MAC) and Physical Layer (PHY) Specification, IEEE Std. 802.11, 1997 802.11 Technologies: Past, Present and Future, Tropos Networks, 2007 Warland and Varaiya, High Performance Communication Networks, Morgan Kauffman/ Elsivier 2nd Edition 2000. http://en.kioskea.net/contents/wifi/wifimodes.php3

VIII. APPLICATION
A person with a Wi-Fi enabled device such as a PC, cell phone or PDA can connect to the Internet when in proximity of an access point. The region covered by one or several access points is called a hotspot. Hotspots can range from a single room to many square miles of overlapping hotspots. Wi-Fi can also be used to create a mesh network. Both architectures are used in community networks. Wi-Fi also allows connectivity in peer-to-peer (wireless ad-hoc network) mode, which enables devices to connect directly with each other. This connectivity mode is useful in consumer electronics and gaming applications. When the technology was first commercialized there were many problems because consumers could not be sure that products from different vendors would work together. The Wi-Fi Alliance began as a community to solve this issue so as to address the needs of the end user and allow the technology to mature. The Alliance created the branding WiFi Certified to show consumers that products are interoperable with other products displaying the same branding. Home Wi-Fi clients come in many shapes and sizes, from stationary PCs to digital cameras. The trend is to incorporate wireless into every electronic where mobility is desired. Business and industrial Wi-Fi has become ubiquitous. In business environments, increasing the number of Wi-Fi access points provides redundancy, support for fast roaming and increase overall network capacity by using more channels or creating smaller cells. Wi-Fi enables wireless voice applications (VoWLAN or WVOIP).

[3] [4] [5] [6] [7]

S-ar putea să vă placă și