Lokesh Wifi
Lokesh Wifi
Lokesh Wifi
1.ABSTRACT
Wi-Fi is a Wireless technology that uses the radio frequency to transmit data through
air. With the rise of Wireless Fidelity (Wi-Fi) , technology comes the rise of the
hotspot -public access Wireless Local Area Networks (WLANs) that allow anyone
with a Wi-Fi capable notebook or PDA to connect to the Internet or a corporate
intranet in airports, hotels, coffee shops, or even campgrounds and fast food
restaurants.
This paper contributes an alternative billing architecture using virtual prepaid tokens
(VPTs) and experimentally evaluates its performance. Users buy VPTs at the point
and time of access, using a third-party online payment server. Therefore, such an
account is more flexible than is a conventional pay-per-use account, which can be
used only to purchase access from a specific provider or set of providers.
I have made this report file on the topic Wi-Fi Technology; I have tried my best to
elucidate all the relevant detail to the topic to be included in the report. While in the
beginning I have tried to give a general view about this topic. My efforts and
wholehearted co-corporation of each and everyone has ended on a successful note. I
express my sincere gratitude to …………..who assisting me throughout the
preparation of this topic. I thank him for providing me the reinforcement, confidence
and most importantly the track for the topic whenever I needed it
2.INTRODUCTION
Wi-Fi is a Wireless technology that uses the radio frequency to transmit data
through air. With the rise of Wireless Fidelity (Wi-Fi) , technology comes the rise of
the hotspot -public access Wireless Local Area Networks (WLANs) that allow
anyone with a Wi-Fi capable notebook or PDA to connect to the Internet or a
corporate intranet in airports, hotels, coffee shops, or even campgrounds and fast
food restaurants.
History
The concept of Wi-Fi is very old but its implementation is not so old. At first ALOHA
System is a wireless network system that is used to connect Hawaii island via a network in
the year 1971. Where the protocol is used for this was ALOHA protocol and the network
used packet transfer. Later it’s converted to IEEE 802.11 protocol.
Then in 1985, the Federal Communications Commission (FCC) released a new network for
general uses which works on 900 Mhz, 2.4 GHz, and 5.8 GHz bandwidth. This is known as
the ISM band. Also, IBM introduced a Token Ring LAN network for connecting several
computers, it can transfer data at 4 Mb/s speed. Then in 1988, a wireless cashier system was
invented based on the Token Ring LAN network known as waveLAN, it operates at
900MHz or 2.4 GHz band and offers speeds of 1 to 2 Mbps. Then it was converted to IEEE
802.11LAN/MAN standards in 1989. ?Then in 1990, IEEE 802.11 Working Group for
Wireless LANs is established by Vic Hayes, who was known as the “Father of WiFi”.
Then in 1994, Dr. Alex Hills introduced a research project on the wireless network, which
provided coverage of the network to 7 buildings wirelessly.
Then in 1996 Commonwealth Scientific and Industrial Research Organization
(CSIRO) introduced a wireless network based on the same protocol 802.11, later it was
known as IEEE 802.11a standards.
Then after all this in 1997 the first version of Wi-Fi is released officially which is 802.11
and it can support a maximum of 2 Mb/s link speed. Then in 1999, the link speed is
increased to 11 Mb/s over the 2.4 GHz frequency band, this version is known as 802.11b
Then after a month, the IEEE 802.11a standard is approved officially, which provides up to
54 Mb/s link speed over the 5 GHz band, but the signal range is weaker than the 2.4 GHz
band.
After this two more versions were introduced that are, 802.11i and 802.11e. In 802.11i, the
security mechanism was increased and in 802.11e, Voice over Wireless LAN and
multimedia streaming are involved.
Then in 2009, 802.11n is developed, which supports both 2.4 GHz and 5 GHz
radiofrequency. And these are used simultaneously by dual-band routers and can reach
maximum speeds of 600 Mbps.
Experiments show that users arriving at a hotspot can buy a VPT and gain full
Internet connectivity in less than 15 seconds, i.e. much less time than it would take to
buy and activate a physical token. VPTs can be used in hotspots that employ a
captive portal or 802.1x to authenticate users. Most current hotspots use a captive
portal, but 802.1x enables much better security. In particular, 802.1x enables mutual
authentication between user and hotspot and encryption keys at the link layer.
• User Authentication
• 802.1x
• EAP
• TKIP (Temporal Key Integrity Protocol) encryption
• RC4, dynamic encryption keys (session based)
• 48 bit IV
• per packet key mixing function
• Fixes all issues found from WEP
• Uses Message Integrity Code (MIC) Michael
• Ensures data integrity
• Old hardware should be upgradeable to WPA
• WPA comes in two flavors
If you want to understand wireless networking at its simplest level, think about a pair
of walkie-talkies that you might purchase at Market. These are small radios that can
transmit and receive radio signals.
The two basic components of a Wi-Fi network are a computer device outfitted with a
low-power radio and another radio-equipped gadget known as an access point, which
is wired to the Internet or a local network. The two communicate with each other over
a free slice of the radio spectrum reserved for consumer use and inhabited by
microwave ovens and cordless phones.
First of all devices called laptop or home pc or any network which want to access
internet or connected to their network to another office network. They want to insert
wi-fi card which card give facilities to access wireless networking.
They first of all connected to the access point which give the connection Gate to
connect to the internet after that signals go to the computer server which is wired
connected to the access point .and computer server connected to internet server.
Which provide the internet facilities to computer or they also using another office
network through transmitter.
Now the question is that how they converted signal to transmit data? in that In
the small figure you saw that computer data combined with addressing and codes for
security. And this combined signals send to transmitter and in the last antenna convert
them into radio waves.
Our wireless Wi-Fi network gives instant and convenient access to the internet at
cafe’s and meeting room hotspots through out Brindabella Bussiness park as well as
the airport terminal direct internet access is provided by approved internet service
providers with a variety of global roaming providers supported where approved and
arranged by tenants, IT departments and with layers of security suiting every
requirement, wireless networking is also available directed into tenancies to access
your business applications and emails at even higher speeds
And utilizing tenants own interest gateways. The Wi-Fi infrastructure is operated and
managed by Camberra international airport.
The two basic components of a Wi-Fi network are a computer device outfitted with a
low-power radio and another radio-equipped gadget known as an access point, which
is wired to the Internet or a local network. The two communicate with each other over
a free slice of the radio spectrum reserved for consumer use and inhabited by
microwave ovens and cordless phones.
• AP is not required.
• Client devices within a cell can communicate directly with each other.
• It is useful for setting up of a wireless network quickly and easily.
6. Advantages
• Flexible: With a wireless network you and your staff can have uninterrupted
access to people, information and tools as you and they move through the
workplace with your mobile PC.
• Customized: Your wireless network can be configured the way you want it.-
even combined with your current wired network.
• Secure: Current standards utilize 64- and 128-bit WEP encryption and help
guard the network from intruders and protect data in transit. Add in
technology and you have increased WLAN protection important for mission-
critical data.
7.1Disadvantages
Spectrum assignments and operational limitations are not consistent
worldwide
Power consumption is fairly high compared to some other low-bandwidth
standards. Wi-Fi networks have limited range.
Wi-Fi pollution, or an excessive number of access points in the area,
especially on the same or neighboring channel, can prevent access and
interfere with the use of other access points by others.
7.2Limitations
It has a limited bandwidth of about 83.5 MHz.
Frequency spectrum used by IEEE 802.11b is shared by many other systems
like microwave ovens, cordless phones etc. This frequency sharing causes
interference problem. Security techniques are not reliable yet.
8. Applications of Wi-Fi
Wi-Fi has many applications, it is used in all the sectors where a computer or any
digital media is used, also for entertaining Wi-Fi is used. Some of the applications
are mentioned below.
Accessing Internet: Using Wi-Fi we can access the internet in any Wi-Fi-
capable device wirelessly.
We can stream or cast audio or video wirelessly on any device using Wi-
Fi for our entertainment.
We can share files, data, etc between two or more computers or mobile
phones using Wi-Fi, and the speed of the data transfer rate is also very
high. Also, we can print any document using a Wi-Fi printer, this is very
much used nowadays.
network, so the call quality is very good. Many mobile phones are already
getting the support of VoWi-Fi.
Wi-Fi in offices: In an office, all the computers are interconnected using Wi-Fi.
For Wi-Fi, there are no wiring complexities. Also, the speed of the network is
good. For Wi-Fi, a project can be presented to all the members at a time in the
form of an excel sheet, ppt, etc. For Wi-Fi, there is no network loss as in cable
due to cable break.
Also using W-Fi a whole city can provide network connectivity by deploying
routers at a specific area to access the internet. Already schools, colleges, and
universities are providing networks using Wi-Fi because of its flexibility.
9.Conclusion
Wireless Hot Spots (airports, hotels, coffee shops, convention centers and any
other place where someone can connect to a wireless network) are being
installed worldwide. All this means Wi-Fi truly does provide unprecedented
freedom. Plus, it is cool, and it is fun as those in the know say, Once you go
wireless, you will never want to use a cable again. There are real and
measurable benefits to using a wireless network versus a standard wired
network.
For a home installation customer, the greatest benefit is that there are no
wites needed:
you don’t need to drill holes in walls and floors; you don’t need to drag
cables hide them under rugs. One Wi-Fi access point can provide network
access for any typically sized home. And if you live in a rental or a historical
building, you may not be allowed to drill holes-that makes wireless your only
solution.
Wi-Fi use is growing fast in homes, public access areas and businesses- both
large and small. The Wi-Fi Alliance is active with many industry
organizations and is working closely with manufacturers to make sure that
existing Wi-Fi gear is compatible with wireless technologies developed in
future.
REFERENCES
1. McConnell, Steve (2004). Code Complete (2nd ed.). Microsoft Press. pp. 29.
ISBN07356-1967-0.
2. Tran, Eushiuan (1999). "Verification/Validation/Certification".In Koopman, Topics
in Dependable Embedded Systems. USA: Carnegie Mellon University.
http://www.ece.cmu.edu/~koopman/des_s99/verification/index.html.Retrieved
20080113.
3. see D. Gelperin and W.C. Hetzel
4. Introduction,Code Coverage Analysis, Steve Cornett
5. Laycock, G. T. (1993) (PostScript).The Theory and Practice of Specification
BasedSoftware Testing.Dept of Computer Science, Sheffield University, UK.
http://www.mcs.le.ac.uk/people/gtl1/thesis.ps.gz.Retrieved 2008-02-13.
6. Patton, Ron. Software Testing.
7. Binder, Robert V. (1999). Testing Object-Oriented Systems: Objects, Patterns, and
Tools. Addison-Wesley Professional. p. 45. ISBN0-201-80938-9.
8. Beizer, Boris (1990). Software Testing Techniques (Second ed.). New York: Van
Nostrand Reinhold. pp. 21,430. ISBN0-442-20672-0.
9. IEEE (1990). IEEE Standard Computer Dictionary: A Compilation of IEEE Standard
Computer Glossaries. New York: IEEE. ISBN1559370793.