term paper aatif
TRANSCRIPT
-
8/2/2019 Term Paper Aatif
1/15
Wi-Fi And Wi-MAX
A t i f R i y a z
R e g . N o : 1 1 0 1 1 4 4 3
S e c t i o n : O E 1 5 2
R o l l N o : O E 1 5 2 A 5 5
Term Paper
The term paper is brief article on Wi-Fi and Wi-Max, their
applications, advantages, disadvantages and their
comparison with other technologies.
-
8/2/2019 Term Paper Aatif
2/15
Table Of Contents
1) Abstract
2) Wi-Fi
a) Introductionb) History
c) Wireless Networking Components
d) Operation Modes
e) Radio Technology
f) Carrier Sense Multiple Access/Collision Avoidance
g) Operation Basics
h) Security
i) WEP Vulnerabilities
3) Wi-Max
a) Introduction
b) Technology Used
c) Working Of Wi-Max
d) Uses Of Wi-Max
e) Advantages Of Wi-Max
f) Disadvantages Of Wi-Max
4) Comparison Of Various Wireless Technologies
-
8/2/2019 Term Paper Aatif
3/15
Abstract
Wi-Fi
Wi-Fi was originally a brand licensed by the Wi-Fi Alliance to describe the embedded
technology of wireless local area networks (WLAN) based on the IEEE 802.11 standard. As of2007, common use of the term Wi-Fi has broadened to describe the generic wireless interface
of mobile computing devices, such as laptops in LANs.[citation needed] The term Wi-Fi was
chosen as a play on the term "Hi-Fi", and is often thought to be an abbreviation for wireless
fidelity. Wi-Fi and the Wi-Fi CERTIFIED logo are registered trademarks of the Wi-Fi Alliance, the
trade organization that tests and certifies equipment compliance with the 802.11x standards.
Common uses for Wi-Fi include Internet and VoIP phone access, gaming, and network
connectivity for consumer electronics such as televisions, DVD players, and digital cameras. In
spite of media reports about possible health risks from Wi-Fi, scientific studies have failed to
show a causal effect.
Wi-Fi networks use radio technologies called IEEE 802.11. These technologies have gone
through several generations since their inception in 1997. Wi-Fi is supported to different extents
under Microsoft Windows, Apple Mac OS and open source Unix and Linux operating systems.
Wi-Max
The broadband wireless access industry, which provides high-rate network connections to
stationary sites, has matured to the point at which it now has a standard for second-generation
wireless metropolitan area networks. Wireless MAN air interface, sets the stage for widespread
and effective deployments worldwide. WiMAX, or Worldwide Interoperability For Microwave
Access, is a wireless Internet service designed to cover wide geographical areas serving large
numbers of users at low cost. WiMAX is considered one of the best solutions for last mile
distribution. In contrast, wireless local area networks are designed to provide network access
within an office environment or a home or hotspots.
-
8/2/2019 Term Paper Aatif
4/15
Introduction
Wi-Fi is a popular technology that allows an electronic device to exchange data wirelessly
(using radio waves) over a computer network, including high-speed Internet connections. The
Wi-Fi Alliance defines Wi-Fi as any "wireless local area network (WLAN) products that are
based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards".However, since most modern WLANs are based on these standards, the term "Wi-Fi" is used in
general English as a synonym for "WLAN".
Wi-Fi, or Wireless Fidelity, is freedom: it allows you to connect to the Internet from your couch at
home, a bed in a hotel room or at a conference room at work without wires. How? Wi-Fi is a
wireless technology like a cell phone. Wi-Fi enabled computers send and receive data indoors
and out: anywhere within the range of a base station. And the best thing of all, its fast. In fact,
its several times faster than the fastest cable modem connection.
However, you only have true freedom to be connected anywhere if your
computer is configured with a Wi-Fi CERTIFIED radio (a PC Card or similar device). Wi-Ficertification means that you will be able to connect anywhere there are other Wi-Fi CERTIFIED
products-whether you are at home, the office or corporate campus, or in airports, hotels, coffee
shops and
A device that can use Wi-Fi (such as a personal computer, video game console, smartphone,
tablet, or digital audio player) can connect to a network resource such as the Internet via a
wireless network access point. Such an access point (or hotspot) has a range of about 20
meters (65 feet) indoors and a greater range outdoors. Hotspot coverage can comprise an area
as small as a single room with walls that block radio waves or as large as many square miles
this is achieved by using multiple overlapping access points.
"Wi-Fi" is a trademark of the Wi-Fi Alliance and the brand name for products using the IEEE
802.11 family of standards. Only Wi-Fi products that complete Wi-Fi Alliance interoperability
certification testing successfully may use the "Wi-Fi CERTIFIED" designation and trademark.
Wi-Fi has had a checkered security history. Its earliest encryption system, WEP, proved easy to
break. Much higher quality protocols, WPA and WPA2, were added later. However, an optional
feature added in 2007, called Wi-Fi Protected Setup (WPS), has a flaw that allows a remote
attacker to recover the router's WPA or WPA2 password in a few hours on most
implementations. Some manufacturers have recommended turning off the WPS feature. The
Wi-Fi Alliance has since updated its test plan and certification program to ensure all newly-
certified devices resist brute-force AP PIN attacks.
History
802.11 technologies has its origins in a 1985 ruling by the US Federal Communications
Commission that released the ISM band for unlicensed use. In 1991 NCR Corporation with
-
8/2/2019 Term Paper Aatif
5/15
AT&T invented the precursor to 802.11 intended for use in cashier systems. The first wireless
products were under the name WaveLAN.
Vic Hayes has been called the "father of Wi-Fi". He was involved in designing the initial
standards within the IEEE.
A large number of patents by many companies are used in 802.11 standards. In 1992 and 1996,Australian organization the CSIRO obtained patents for a method later used in Wi-Fi to
"unsmear" the signal. In April 2009, 14 tech companies agreed to pay CSIRO $250 million for
infringements on the CSIRO patents.. This led to Wi-Fi being attributed as an Australian
invention, though this has been the subject of some controversy. The CSIRO won a further
$220 million settlement for Wi-Fi patent infringements in 2012 with global firms in the United
States required to pay the CSIRO licensing rights estimated to be worth an additional $1 billion
in royalties.
In 1999, the Wi-Fi Alliance was formed as a trade association to hold the Wi-Fi trademark under
which most products are sold.
Cellular Phones use 824-MHz to 894-MHz frequency bands. Some obstacles to this in the near
future are missing roaming and authentication in SIM cards and radius, the narrowness of the
available spectrum and the limited range. i.e., Wi-Fi will directly compete against the cellular.
WIRELESS NETWORKING COMPONENTS
Wi-Fi is a friendly term for IEEE 802.11b Ethernet standard. It operates in the unlicensed
frequency band of 2.4 Ghz with a maximum data rate of 11 Mbps.
IEEE 802.11b wireless networking consists of the following components:
Stations
A station (STA) is a network node that
is equipped with a wireless network device. A
personal computer with a wireless network
adapter is known as a wireless client. Wireless
clients can communicate directly with each
other or through a wireless access point (AP).
Wireless clients are mobile.
Wireless Access Points
A wireless AP is a wireless network node that acts as a bridge between STAs and a
wired network. A wireless AP contains:
Figure 1 Wirless Station
-
8/2/2019 Term Paper Aatif
6/15
At least one interface that connects the wireless AP to an
existing wired network (such as an Ethernet backbone).
A wireless network device with which it creates wireless
connections with STAs.
IEEE 802.1D bridging software, so that it can act as atransparent bridge between the wireless and wired networks.
The wireless AP is similar to a cellular phone network's
base station. Wireless clients communicate with both the wired
network and other wireless clients through the wireless AP.
Wireless APs are not mobile and act as peripheral bridge devices that extend a wired network.
OPERATION MODES
IEEE 802.11 defines two operating modes: Ad hoc mode and Infrastructure mode.
AD HOC MODE: In ad hoc mode, also known as
peer-to-peer mode, wireless clients communicate
directly with each other (without the use of a
wireless AP). Two or more wireless clients who
communicate using ad hoc mode form an
Independent Basic Service Set (IBSS). Ad hoc
mode is used to connect wireless clients when a
wireless AP is not present.
INFRA STRUCTURE MODE: In infrastructure
mode, there is at least one wireless AP and one wireless client. The wireless client uses the
wireless AP to access the resources of a
wired network. The wired network can be an
organization intranet or the Internet,
depending on the placement of the wireless
AP.
A single wireless AP that supports one or
multiple wireless clients is known as a Basic
Service Set (BSS). A set of two or more
wireless APs that are connected to the same
wired network is known as an Extended
Service Set (ESS). An ESS is a single logical
Figure 2 Access Point
Figure 3 The ad-hoc network structure in the 802.11
protocol
Figure 4 The infrastructure network structure in the 802.11
protocol
-
8/2/2019 Term Paper Aatif
7/15
network segment (also known as a subnet), and is identified by its Service Set Identifier (SSID).
If the available physical areas of the wireless APs in an ESS overlap, then a wireless client can
roam, or move from one location (with a wireless AP) to another (with a different wireless AP)
while maintaining Network layer connectivity.
RADIO TECHNOLOGY
Wi-Fi network uses radio technology called IEEE 802.11b to provide secure, fast,
reliable, wireless connectivity. 11b defines the physical layer and media access control (MAC)
sublayer for communications across a shared, wireless local area network (WLAN). At the
physical layer, IEEE 802.11b operates at the radio frequency of 2.45 gigahertz (GHz) with a
maximum bit rate of 11 Mbps. It uses the direct sequence spread spectrum (DSSS)
transmission technique. At the MAC sublayer of the Data Link layer, 802.11b uses the carrier
sense multiple access with collision avoidance (CSMA/CA) media access control (MAC)
protocol
CARRIER SENSE MULTIPLE ACCESS/COLLISION AVOIDANCE
The basic access method for 802.11 is the Distributed Coordination Function (DCF)
which uses Carrier Sense Multiple Access / Collision Avoidance (CSMA / CA). This requires
each station to listen for other users. If the channel is idle, the station may transmit. However if it
is busy, each station waits until transmission stops, and then enters into a random back off
procedure. This prevents multiple stations from seizing the medium immediately after
completion of the preceding transmission.
Figure 5 CSMA/CD Back-off Algorithm
Packet reception in DCF requires acknowledgement as shown in figure. The period between
completion of packet transmission and start of the ACK frame is one Short Inter Frame Space
(SIFS). ACK frames have a higher priority than other traffic. Fast acknowledgement is one of the
salient features of the 802.11 standard, because it requires ACKs to be handled at the MAC
sublayer.
-
8/2/2019 Term Paper Aatif
8/15
Transmissions other than ACKs must wait at least one DCF inter frame space (DIFS)
before transmitting data. If a transmitter senses a busy medium, it determines a random back-
off period by setting an internal timer to an integer number of slot times. Upon expiration of a
DIFS, the timer begins to decrement. If the timer reaches zero, the station may begin
transmission. However, if the channel is seized by another station before the timer reaches
zero, the timer setting is retained at the decremented value for subsequent transmission.
OPERATION BASICS
When a wireless adapter is turned on, it begins to scan across the wireless frequencies
for wireless APs and other wireless clients in ad hoc mode. Assuming that the wireless client is
configured to operate in infrastructure mode, the wireless adapter chooses a wireless AP with
which to connect. This selection is made automatically by using SSID and signal strength and
frame error rate information. Next, the wireless adapter switches to the assigned channel of the
selected wireless AP and negotiates the use of a port. This is known as establishing anassociation.
If the signal strength of the wireless AP is too low, the error rate too high, or if instructed
by the operating system (in the case of Windows XP), the wireless adapter scans for other
wireless APs to determine whether a different wireless AP can provide a stronger signal or
lower error rate. If such a wireless AP is located, the wireless adapter switches to the channel of
that wireless AP and negotiates the use of a port. This is known as reassociation.
Reassociation with a different wireless AP can occur for several reasons. The signal can
weaken as either the wireless adapter moves away from the wireless AP or the wireless AP
becomes congested with too much traffic or interference. By switching to another wireless AP,the wireless adapter can distribute the load to other wireless APs, increasing the performance
for other wireless clients. You can achieve contiguous coverage over large areas by placing
your wireless APs so that their signal areas overlap slightly. As a wireless client roams across
different signal areas, it can associate and reassociate from one wireless AP to another,
maintaining a continuous logical connection to the wired network.
SECURITY
Because wireless is a shared medium, everything that is transmitted or received over a
wireless network can be intercepted. Encryption and authentication are always considered when
developing a wireless networking system. The goal of adding these security features is to make
wireless traffic as secure as wired traffic. The IEEE 802.11b standard provides a mechanism to
do this by encrypting the traffic and authenticating nodes via the Wired Equivalent Privacy
(WEP) protocol.
The IEEE 802.11 standard defines the following mechanisms for wireless security:
-
8/2/2019 Term Paper Aatif
9/15
Authentication through the open system and shared key authentication types
Data confidentiality through Wired Equivalent Privacy (WEP)
Open system authentication does not provide authentication, only identification using the
wireless adapter's MAC address. Open system authentication is used when no authentication is
required. Some wireless APs allow the configuration of the MAC addresses of allowed wirelessclients. However, this is not secure because the MAC address of a wireless client can be
spoofed.
Shared key authentication verifies that an authenticating wireless client has knowledge
of a shared secret. This is similar to preshared key authentication in Internet Protocol security
(IPsec). The 802.11 standard currently assumes that the shared key is delivered to participating
STAs through a secure channel that is independent of IEEE 802.11. In practice, this secret is
manually configured for both the wireless AP and client. Because the shared key authentication
secret must be distributed manually, this method of authentication does not scale to a large
infrastructure mode network (for example, corporate campuses and public places, such as malls
and airports). Additionally, shared key authentication is not secure and is not recommended for
use.
WEP VULNERABILITIES
Not long after WEP was developed, a series of independent research studies began to
expose its cryptographic weaknesses. Even with WEP enabled, third parties with a moderate
amount of technical know-how and resources could breach WLAN security. Three key
difficulties were identified:
1. WEP uses a single, static shared key. It remains the same unless a network
administrator manually changes it on all devices in the WLAN, a task that becomes ever more
daunting as the size of the WLAN increases.
2. At the time of its introduction, WEP employed a necessarily short 40-bit encryption
scheme. The scheme was the maximum allowed by US export standards at that time. In 1997,
the US government deemed the export of data cryptography to be as threatening to national
security as the export of weapons of mass destruction. By necessity, Wi-Fi security had to be
weak if the specification was to be adopted as an international standard and if products were to
be freely exported.
3. Other technical problems contributed to its vulnerability, including attacks that could lead
to the recovery of the WEP key itself.
Together, these issues exposed that WEP was not sufficient for enterprise-class
security.
-
8/2/2019 Term Paper Aatif
10/15
Wi-Max
Introduction
WiMAX (Worldwide Interoperability for Microwave Access) is a telecommunications protocol that
provides fixed and mobile Internet access. The current WiMAX revision provides up to 40Mbit/s[with the IEEE 802.16m update expected to offer up to 1 Gbit/s fixed speeds. The name
"WiMAX" was created by the WiMAX Forum, which was formed in June 2001 to promote
conformity and interoperability of the standard. The forum describes WiMAX as "a standards-
based technology enabling the delivery of last mile wireless broadband access as an alternative
to cable and DSL"
Technology Used:
The IEEE standard for WiMax is 802.16 and falls under the category of wireless metropolitan
area network. WiMax operates on two frequency bands:
1. 2-11GHz
2. 10-66GHz
And has a range of 50 Km with the speed of 80Mbps.
This enables the smaller wireless LANs to be interconnected by WiMax creating a large
wireless MAN. Networking between can be achieved without the need of expensive cabling. It
also enables to provide high speed wireless broadband access to users.
WiMAX refers to interoperable implementations of the IEEE 802.16 wireless-networks standard
, in similarity with Wi-Fi, which refers to interoperable implementations of the IEEE 802.11
Wireless LAN standard . The WiMAX Forum certification allows vendors to sell their equipment
as WiMAX (Fixed or Mobile) certified, thus ensuring a level of interoperability with other certified
products, as long as they fit the same profile.
The IEEE 802.16 standard forms the basis of 'WiMAX' and is sometimes referred to colloquially
as "WiMAX", "Fixed WiMAX", "Mobile WiMAX", "802.16d" and "802.16e." Clarification of the
formal names are as follow:
The 802.16a specification, which is an extension of IEEE802.16, covers bands in the
2GHz-to-11GHz range
802.16-2004 is also known as 802.16d, which refers to the working party that hasdeveloped that standard. It is sometimes referred to as "Fixed WiMAX," since it has no support
for mobility.
802.16e-2005, often abbreviated to 802.16e, is an amendment to 802.16-2004. It
introduced support for mobility, among other things and is therefore also known as "Mobile
WiMAX".
-
8/2/2019 Term Paper Aatif
11/15
Mobile WiMAX is the WiMAX incarnation that has the most commercial interest to date and is
being actively deployed in many countries. Mobile WiMAX is also the basis of future revisions of
WiMAX.
The WiMax Technology provides:
1. The high speed of broadband service
2. Wireless rather than wired access, that makes it lot less expensive than cable or DSL.
3. Broad coverage like the cell phone network instead of small WiFi hotspots.
Working Of WiMax
WiMAX technology works little different than WiFi technology. In wifi computers can be
connected through wireless LAN card to nearby access point, wireless router or any Hotspot, it
does not works this way when we talk about connectivity in WiMAX. WiMAX network
connectivity constitutes of two parts, one can define as WiMAX tower or WiMAX booster, it isknown as WiMAX Base station, whereas the other portion is WiMax receiver. Lets talk about
them in little details for better understanding the working.
1. WiMAX base station: As name explains base station is place where WiMax signals are
broadcasted. It consists of electronic devices and WiMax Tower. This tower works exactly like
GSM network phones towers standing high up in the air to broadcast radio signals. WiMAX
tower base station can cover up 10Km radius. In theory it suggests to cover a lot more distance
than just 10Km, it can reach some where about 50 km (30 miles), but in fact due to certain
-
8/2/2019 Term Paper Aatif
12/15
geographical limitations it goes as far as 10 km approx. 6 mils. Any wireless connecting device
for WiMAX will connect to WiMAX network if fallen in to the range.
2. WiMAX Receiver: It is device or devices which receives the signals from WiMAX base
station and connects to the WiMAX networks. These devices are usually stand alone Antenna
or PCMCIA slot card for laptops or computers. Connecting to WiMAX base stations works as
similar as connection of Wifi to access point works, the only difference is that WiMAX covers
much wider area.
Uses Of WiMax:
1. An internet service company could put a tower within a few miles of your home. Its
service may be purchased and you can decide on either a modem, upgraded computer with
built-in WiMAX circuitry or a PCMCIA card for your existing computer. Intel has promised to
install WiMAX architecture in all of its computer chips starting in 2005 and provide mobility by
2007. This integration of WiMAX capabilities into products should further deflate the cost ofWiMAX related services. Speed will be faster than cable, costs will be much less because the
provider will neither have to install - nor maintain - expensive cable plant
2. WiMAX uses line-of-site to transmit an internet signal to a second tower or as backhaul.
It also is said to use non line-of-site mode for the last mile, to reach urban and rural residences
and businesses.
3. WiMAX technology is used to transmit to several WiFi Hot Spots. Recently, during the
Tour de France, journalists were provided with WiMAX technology from Intel and France
Telecom/Orange. The system served WiFi Hot Spots with WiMAX being used for backhaul.
The installation at each stage took less than an hour, giving reporters better-than-DSL speedsto submit t information
4. WiMAX is an access solution for urban locations with high-density populations
5. Providing portable mobile broadband connectivity across cities and countries through a
variety of devices.
6. Providing a wireless alternative to cable and DSL for "last mile" broadband access.
7. Providing a source of Internet connectivity as part of a business continuity plan
-
8/2/2019 Term Paper Aatif
13/15
Advantages Of WiMax
1. Wimax Coverage
The single station of Wimax can operate and provide coverage for hundred of users at a timeand manage sending and receiving of data at very high speed with full of network security.
2. Wimax High Speed
The High speed of connectivity over long distance and high speed voice makes it more
demanded in hardly populated areas plus compacted areas.
3. Multi-functionality within Wimax Technology
Wimax Technology perform a variety of task at a time such as offering high speed internet,
providing telephone service, transformation of data, video streaming, voice application etc.
4. Potential and development
Wimax Technology is a great invention for new Era because Wimax has enough potential for
developing and opportunity to offer various types of services for new generation. Now you can
connect internet anywhere and browse any site and make possible online conference with
mobile internet, multimedia application never let you bored, IPTV stay you up to date etc.
5. Stay in touch with end user
Wimax network always keep stay in touch with your friends and all others using same Wimax
network because it provide absolute communication service to the end users to make possible
rich communications
6. Wimax Infrastructure
Wimax infrastructure is very easy and flexible therefore it provides maximum reliability of
network and consent to actual access to end users.
7. Wimax, cheap network
Wimax is a well known wireless network now days because it provide a low cost network
substitute to internet services offered via ADSL, modem or local area network.
8. Wimax and Wi-Fi
The Wimax network providing much higher speed and very long range as compared to WiFi
Technology.
9. Smart antenna and Mesh Topology
-
8/2/2019 Term Paper Aatif
14/15
The use of smart antenna in Wimax network offering high quality widest array which enable you
to make possible communication on long route without any encryption. It offers 2.3, 2.7, 3.3,
3.8GHz frequency ranges. The use of Mesh topology in Wimax network for the expansion is an
extensive spectrum of antennas for commercial as well as for residential users.
10. Ultra wide Band
The unique and excellent infrastructure of Wimax is offering Ultra-Wideband. Its exclusive
design is providing range from 2 to 10 GHz and outstanding time response.
Disadvantages Of WiMax
1. Within line-of-site
One could have the speed of 10 Mbps at 10 kilometers. In the urban environment (without the
optical visibility) users can have 10 Mbps at two kilometers. If users are moving, the speed candrop significantly.
2. Bandwidth is shared among users
Bandwidth is shared among users in a given radio sector. If there are many
users in one sector, they will have lower speed. Users could have 2, 4, 6, 8, or 10 Mbps of the
shared bandwidth.
3. Bad weather conditions
Bad weather conditions such as rain could interrupt the signal.
4. Interfarence
Other wireless equipment could cause interference.
5. Power Consumption
WiMAX is a very power-consuming technology and requires significant electrical support.
6. Installation And Operational Cost
High installation and operational cost.
-
8/2/2019 Term Paper Aatif
15/15
Comparison Of Various Wireless Technologies
Bluetooth Wi-Fi (a) Wi-Fi (b) Wi-Fi (n) WiMax
Standard 802.15 802.11a 802.11b 802.11n 802.16Frequency(GHz)
2.45 5 2.4 2.4 2-66
Speed (Mbps) 0.72 54 11 54 80
Range 10m 50m 100m 100m 50Km
Advantages Low Cost Speed Low Cost Speed Speed, Range
Disadvantages
Range Cost Speed Cost,Range
Cost
Network Pear to Pear Pear toPear &IP
Pear toPear &IP
Pear toPear &IP
IP
IP NetworkConnectivity No Yes Yes Yes Yes
Application CableReplacement
LAN,Internet
LAN,Internet
LAN,Internet
Metro AreaBroadbandInterconnectivity
SpectrumType
Unlicensed Unlicensed
Unlicensed
Unlicensed
Licensed