Académique Documents
Professionnel Documents
Culture Documents
INTRODUCTION
Wireless networking technologies (Wi-Fi) allows computers and other devices to communicating
over a wireless signal. A typical Wi-Fi network includes three parts: a wired connection to a
broadband provider, an access point, and a computer connected by wired and wireless
connections. It offers different broadband speeds and operates in Industrial, Scientific, and
Medical band (ISM band) . The communication between nodes or computers is done via Access
Points (APs). The access point also plays a role as a wireless Ethernet adapter. Wi-Fi has gained
popularity because of installation simplicity and the increased number of Wi-Fi radio equipped
laptops. Currently, many businesses like airports, cafs, restaurants, and shopping areas offering
wireless internet-services to customers. Demand for wireless technologies has gained more
importance in business and everyday-life, as population is getting denser by closely spaced
buildings. Wi-Fi networks have easy deployment in markets, offices, airports, and other locations
providing advantages like flexibility, mobility, ease of use, and low cost. Companies that wish to
enter this market needs intelligence in these areas to make appropriate business decisions based on
the properties of present and future technologies. Knowledge of the technologies in terms of
security issues, performance and installation and maintenance cost are of interest. 1.1 Goal The
goal of this thesis is to analyze and compare different wireless network technologies with as focus
on availability, number of nodes, total cost, end-user cost, vendor cost, range, reliability and
security. The goal is to compare Local Area Network Wi-Fi technology (IEEE 802.11 a/g) with
mobile wireless technology like 3G, 4G and LTE. The objective of this survey is to compare
different technologies with Wi-Fi in terms of cost factor, bandwidth and performance factor, and
technology implementation factor. 1.2 Delimitation The thesis does not analyze or include
technologies like Bluetooth, Near Field Communication (NFC), and Radio frequency
identification (RFID).
Wi-Fi, or Wireless Fidelity, is freedom: it allows you to connect to the Internet from your couch
at home, a bed in a hotel room or at a conference room at work without wires. How? Wi-Fi is a
wireless technology like a cell phone. Wi-Fi enabled computers send and receives data indoors
and out: anywhere within the range of a base station. And the best thing of all, its fast. In fact,
its several times faster than the fastest cable modem connection.
However, you only have true freedom to be connected anywhere if your computer is
configured with a Wi-Fi CERTIFIED radio (a PC Card or similar device). Wi-Fi certification
means that you will be able to connect anywhere there are other Wi-Fi CERTIFIED productswhether you are at home, the office or corporate campus, or in airports, hotels, coffee shops and
other public areas equipped with a Wi-Fi access available.
The Wi-Fi certified logo is your only assurance that the product has met rigorous
interoperability testing requirements to assure products from different vendors will work
together .The Wi-Fi CERTIFIED logo means that its a safe buy.
Wi-Fi certification comes from the Wi-Fi Alliance, a nonprofit international trade
organization that tests 802.11-based wireless equipment to make sure it meets the Wi-Fi
standard and works with all other manufacturers Wi-Fi equipment on the market .Thanks to the
Wi-Fi Alliance, you dont have to read the fine print or study technical journals: if it says WiFi, it will work.
Chapter-2
Literature Survey
2. Literature survey
According to Figure 3.1, we used 24 internet sources, and four library books to search
information. For example, we reviewed IEEE 802.11 Family and standard, and OSI model
information
from
library
books.
Information
on
Wi-Fi
security,
Wi-Fi
advantages/disadvantages, coverage, comparison with other technologies, and cost and market
analysis came basically from internet sources. First, we did a literature survey about Wi-Fi and
its use, then we compared it with other technologies from various sources. Studies of different
communication technologies have been done by many investigators. The result of some of the
numerous studies was summarized. The study consists of four distinct region, security,
comparisons, cost, and implementation, each of which is discussed in detail. Comparisons
between Wi-Fi and different technologies are presented in various aspects. Some suggested
security measures, and some areas requiring further investigations are also discussed.
3
laptop equipped with a dual-mode radio this security setting does not work, and you have to rely
on internal network security of the computer. Public networks are quite vulnerable and unsecure
in practical use. In public and crowed places anyone can steal password by shoulder surfing or by
employing a video camera positioned near the computer screen and keyboard.
SSID
is
an
identifier of the network represented by an alphanumeric code common to all the access points
and stations forming the same network. Thus if user knows SSID of the network, then it is able to
reach it if or not, its request will be rejected. Default values exist in the solutions suggested by the
manufacturer and must be personalized by the administrators of these networks. This protection is
weak because the access point periodically sends the SSID in clear in beacon frames which could
be easily intercepted. ACL, the second technique of access control consists in using list of access.
Indeed each access point has a list where are registered all the MAC address of authorized
stations. The access point carries out a filtering on the basis of MAC address. Each list must be
continuously updated, manually or by specialized software, in order to add or to remove users.
This protection is also weak because only a passive listening of the network is sufficient to
recover the MAC address [43]. Be added to these two techniques is the use of passwords. These
three means of protection can be used in a complementary way [43]. Data Confidentiality requires
the exchange or pre-shared encryption/decryption keys. The mechanism of exchange of keys is
not specified by the standard but depends on the manufacturers choice. The data ciphering is
carried out using WEP algorithm [43]. Encryption is the standard IEEE 802.11 proposes a
traditional data encryption technique based on using a symmetric key (secret) [43]. The
decryption algorithm include
Generation of decryption key from IV or received message and the identifier of decryption key,
Decryption of received message with the key to obtain the initial message,
Check of the integrity of the decrypted message by using ICV algorithm
increased capacity, reduced network complexity, reduced latency, high data rate, improved
coverage and lowered deployment and operational cost
Chapter-3
Content and Architecture
3.1 The IEEE 802.1
IEEE 802.11 architecture defines nine services which could be divided into two groups
which are Station (STAs) services and distribution services. STAs services contain authentication,
de-authentication, Privacy, and delivery of the data whereas distribution services contain
association, re-association, disassociation, distribution and integration. Stations are device which
contain IEEE 802.11 specification with MAC and PHY interface to wireless network. Station may
be work station, laptop, and mobile. The 802.11 functions are implemented either software or
hardware of Network adapter or network interface card (NIC). The Access Point is a device which
provides the point of interconnection wireless station to the wired network or wireless network at
the same time. The most important function of Access Points is bridging function [22]. Wireless
Medium is used to move frame from one station to another station.
station may not communicate because of limitation of coverage area in all mobile stations
should be within a range to communicate. While a BSS includes an access point and one
station, the BSS is not an Independent BSS. It is called an infrastructure BSS or simply as BSS.
If there are two stations, and all stations are in the BSS are mobile stations and there is no any
connectivity to wired LAN network, the BSS called Independent BSS (IBSS) or ad-hoc
network. IBSS stations directly communication one and another (peer to peer) but they are
unable to connect with any BSS.
a set of wireless end stations. This configuration is called a basic service sets forming a single
sub network. Since most corporate WLANs require access to the wired LAN for services (file
servers, printers, internet links), they operate in infrastructure mode. Adhoc mode (also called
peer-to-peer mode or an independent basic service set) is simply a set of 802.11b wireless
stations that communicate directly with one another without using an access point or any
connection to a wired network. This mode is useful for quickly and easily setting up a wireless
network anywhere that a wireless 15 infrastructure does not exist or is not required for services,
such as a hotel room, convention center, or airport where access to wired network is barred
The Figure 2.5 shows that how direct sequence speed spectrum (DSSS) Channels work
without overlapping by neighboring Access points (Aps). As noted above, while there are 14
partially overlapping channels specified in 802.11b DSSS, there are only three channels, they
may cause some interference for one another, thus lowering the total available bandwidth in the
area of overlap.
3.5 Wi-Fi as Hotspots
A hotspot often operates Wi-Fi technology via router, offering internet access. Free
hotspot generally offer free access to menu or purchase list also providing payment systems
like pay pall, or via credit card, or work public network in which authentication and
verification features are turned off . The term poisoned hotspot or rogue hotspot refers to a
malicious individual who sniff the data sent by user on a free hot spot including decipher
9
passwords, and login names. The "User-fairness model" is a billing model can be implemented
with the help of EDCF (IEEE 802.11e, which makes revision to MAC layer of the current
IEEE 802.11 to expand support for LAN applications that have Qos requirements. There are
some safety tips for using public Wi-Fi in secure way includes, using firewall, turning off
wireless network when not in use, hiding important files, and not typing
Credit card numbers, passwords or sensitive data without proper safety mechanism on browsers.
While using Wi-Fi hotspot you should be sure that sent information should be fully encrypted, and
always logout after finishing your work. Always remember that you are not permanently signed
into accounts. Pay attention to browser alerts and warnings. HTTP and TLS does not fully protect
browsing. If possible, use VPN (virtual private network).
and 2 Mbps using a direct sequence or a frequency hopping spread spectrum. The 802.11 is not a
single but a family of standards addressing WLAN. The IEEE 802.11a standard defines a WLAN
system based on the orthogonal frequency division multiplexing (OFDM) technology that splits
an information signal across 52 separate subcarriers to provide a transmission-of-data rate up to
54 Mbps and throughput over 24.3 Mbps. The operating frequency of the system is in the licensefree (uni band) 5.15 to 5.35 GHz and 5.725 to 5.875 GHz bands. The 802.11a devices, as the other
802.11 based devices, share the channel on time division multiple-access (TDMA) basis. The
802.11b specifies a WLAN system using direct sequence spread spectrum (DSSS) to achieve the
maximum 11 Mbps 18 transmission-of-data rate in 2.4 GHz band. To benefit from the high data
rates in 2.4 GHz band, a new standard, 802.11g that is based on the OFDM and fully backward
compatible with the 802.11b standard was developed in early 2000. The high data rate WLANs
like 802.11a and 802.11g systems satisfy requirements of multimedia applications including
streaming HDTV-quality video in the home, high speed internet, and file transfer [41]. The
supplement standards 802.11e, 802.11f, 802.11h, and 802.11i are defined to enhance the
capability of 802.11-based WLANs. The 802.11e is for enhancements of the quality of service
(QOS). The 802.11f provides a recommended practice for an inter access-point protocol. The
802.11h extends the spectrum and transmit power management at 5 GHz for European operation.
The 802.11i enhances MAC layer security.
11
Chapter - 4
Applications
Virtual Wi-Fi Router is a free utility that is designed to turn any Wi-Fi enabled Windows PC
into a wireless access point for Internet access.
This utility has a very clean and easy to use interface that allows you to assign a password to your
virtual access point to prevent unauthorized access. The interface even offers a tab that lets you
confirm who is using the wireless access point.
12
13
14
One of the nice things about this utility is that it is completely portable. The utility consists of a
single executable file that can be run on any Windows 8 PC without having to be installed.
15
Chapter - 5
Uses/Benefits
16
same as LTE but Wi-Fi is limited to indoor use only. Moreover, we can see that LTE has good
upstream speed and spectral efficiency as compared with WiFi.
The lower the price of an access point, receive sensitivity will generally be lower
The highest priced access points can approach the 100 dBm receive sensitivity level
17
When an access point has higher cost it means that it has greater transmit power, better
receiving sensitivity, or both
External Wi-Fi adopter has less capacity than their counterparts in terms of both power and
sensitivity . Consumer grade radio in a commercial installation will result in higher cost because:
Consumer grade access points require the installation of more units that do commercial grade
radios because they are not providing sufficient receiving sensitivity for covering large area.
Consumer grade access points are not required to obey with different specifications as are the
commercial grade unit [19]. We can conclude that if we use commercial Wi-Fi network using
consumer-grade equipment, it is more costly and it will not provide the level of consistency,
capacity, stability and performance as would commercial grade equipment. Wi-Fi is inexpensive
when compared to Ethernet wired networking, because it is hard, expensive, and time consuming
to drill in concrete constructions for Ethernet network cable working. The Ethernet Cat5 cable
also requires additional receptacle or Power over Ethernet (Poe) and splitters. The Wi-Fi access
point can also serves as portal to printers, fileservers, and other networking resources [19]. The
Wi-Fi consumer grade gross price is $1440 per access point, with radio unit ($1000) and
installation ($440). If we breakdown $1000 radio unit cost, then it contains $500 for hardware and
$500 overall labor cost [19]. Table 4.2.1 shows cost details of consumer and customer grades WiFi Access Points
18
Chapter - 6
Conclusion
This thesis compared the performance of Wi-Fi standards (IEEE 802.11) for industrial environments
and compared it with mobile phone radio systems standards (3G, 4G and LTE/5G). Moreover the
basic technical principles of IEEE 802.11 family and derivatives have been discussed in detail in this
report. Wi-Fi is an inexpensive technology and it covers the customer requirement regarding market
interest. For commercial use in hotels, hotspots, and cyber cafes, 802.11n seems to be a good
alternative for the future because it specifies 5 GHz frequency at a theoretical maximum speed of
300 Mbps, gives multiple input multiple output (MIMO), channel bonding, and payload optimization
technology. It also provides uniform bandwidth over distances and covers roughly 1.5 times more
distance than the earlier standards. Our investigation also shows that IEEE 802.11 is inexpensive
technology as compared to other technologies available in market [40]. However, the energy
consumption of in Wi-Fi technology has a significant effect on the battery of mobile smart-phones
because both Wi-Fi access points and Wi-Fi smart phones are implemented with a variety of Wi-Fi
power saving strategies for saving power. Finally, we concluded that based on our assumptions,
collected information, analysis, observations and results there is a possibility to offer seamless Wi-Fi
internet services to the customers in the buildings, cafes, hotspots and other public places with
reasonable technical performance and costs.
19
Chapter -7
References
[1] About.com. (2012, February 14). Mobile Internet Access Comparison Pros and cons of
different Internet-on-the Go options [Online]. Available:
http://mobileoffice.about.com/od/wifimobileconnectivity/a/wirelessinternet-comparison.htm
[2] Ahmedur Rahman, C. I.Ezeife and A.K. Aggarwal., Abdel-Majid Mourad, Loic Brunel,
Akihiro Okazaki, and Umer Salim., LTE Artichecture, Mitsubishi Electric-Information
Technology Centre Europe, 2010.
[3] Bhaskaran Raman, Kameswari Chebrolu. (2007, January). Experiences with WiFi for Rural
Internet in India. [Online]:Available:http://www.google.com/url?
sa=t&rct=j&q=&esrc=s&frm=1&source=web&cd=4& sqi=2&ved=0CD4QFjAD&url=http%3A
%2F%2Fcse.iitk.ac.in%2Fusers%2Fbraman%2Fpapers%2F2 007-expdgp.pdf&ei=uHApT63WIozR4QSP-oSnAw&usg=AFQjCNEijqz_uvrUGeNW0kfgT- 1CSgeY_A
[4] Bwif.org. (2006). WiFi advantages, Advance Broadband WirelessInternet [Online].Available:
http://www.bwif.org
[5] Broadcom corporation. (2012, June 22). 5G WiFi [Online].Available: http://www.5gwifi.org
[6] Blogger. (2011, December 5). Background of the 4G Evolution.[Online].Available:
http://simplelte4g.blogspot.se/2011/12/background-of-4g-evolution.html
[7] B.Walke, P.Seidenberg, M.P.Althoff, Multi hop, ad-hoc broadband communications and
Wireless media systems. UMTS The Fundamentals (2003).
[8] Christina Gessner, Andreas Roessler. (2009). LTE technology and LTE test.
[Online].Available: http://www.scribd.com/doc/49762490/3/LTE-background-story-the-early-days
[9] Cisco (2012). 802.11n: Mission-Critical Wireless, [Online].Available:
http://www.cisco.com/en/US/netsol/ns767/index.html
[10] Digital Consulting, Inc. (2012).3G History and Background.[Online].Available:
http://www.dciexpo.com/3g/3g-history-and-background.php
[11] dBrn Associates. (2004, June 1). A comparison of technologies, market, and business plan
[Online].Available: http://media.techtarget.com/searchMobileComputing/downloads/Finneran.pdf
20
[12] David Haskin (2007, May 16). FAQ: 802.11n wireless networking New standard offers faster
speeds, greater range, [Online].Available:
http://www.computerworld.com/s/article/9019472/FAQ_802.11n_wireless_networking
21