Wireless LAN
Encyclopedia
A wireless local area network (WLAN) links two or more devices using some wireless distribution method (typically spread-spectrum
or OFDM radio), and usually providing a connection through an access point to the wider internet. This gives users the mobility to move around within a local coverage area and still be connected to the network. Most modern WLANs are based on IEEE 802.11
standards, marketed under the Wi-Fi
brand name.
Wireless LANs have become popular in the home due to ease of installation, and the increasing to offer wireless access to their customers; often for free. Large wireless network projects are being put up in many major cities: New York City
, for instance, has begun a pilot program to provide city workers in all five boroughs of the city with wireless Internet access
.
, a professor at the University of Hawaii
, developed the world’s first wireless computer communication network, ALOHAnet
, using low-cost ham-like radios. The system included seven computers deployed over four islands to communicate with the central computer on the Oahu Island without using phone lines.
WLAN hardware was initially so expensive that it was only used as an alternative to cabled LAN in places where cabling was difficult or impossible. Early development included industry-specific solutions and proprietary protocols, but at the end of the 1990s these were replaced by standards, primarily the various versions of IEEE 802.11 (in products using the Wi-Fi
brand name). An alternative ATM
-like 5 GHz standardized technology, HiperLAN/2
, has so far not succeeded in the market, and with the release of the faster 54 Mbit/s 802.11a (5 GHz) and 802.11g (2.4 GHz) standards, almost certainly never will. Since 2002 there has been newer standard added to 802.11; 802.11n which operates on both the 5Ghz and 2.4Ghz bands at 300 Mbit/s, most newer routers including those manufactured by Apple Inc. can broadcast a wireless network on both wireless bands, this is called dualband.
A HomeRF
group was formed in 1997 to promote a technology aimed for residential use, but disbanded at the end of 2002.
All stations are equipped with wireless network interface controllers (WNICs).
Wireless stations fall into one of two categories: access points
, and clients.
Access points (APs), normally routers, are base stations for the wireless network. They transmit and receive radio frequencies for wireless enabled devices to communicate with.
Wireless clients can be mobile devices such as laptops, personal digital assistant
s, IP phones
and other smartphone
s, or fixed devices such as desktops
and workstation
s that are equipped with a wireless network interface.
There are two types of BSS: Independent BSS (also referred to as IBSS), and infrastructure BSS.
Every BSS has an identification (ID) called the BSSID, which is the MAC address
of the access point servicing the BSS.
An independent BSS (IBSS) is an ad-hoc network
that contains no access points, which means they can not connect to any other basic service set.
An infrastructure can communicate with other stations not in the same basic service set by communicating through access points.
The concept of a DS can be used to increase network coverage through roaming between cells.
DS can be wired or wireless. Current wireless distribution systems are mostly based on WDS or MESH protocols, though other systems are in use.
This is accomplished using the Independent Basic Service Set (IBSS).
A peer-to-peer
(P2P) network allows wireless devices to directly communicate with each other. Wireless devices within range of each other can discover and communicate directly without involving central access points. This method is typically used by two computers so that they can connect to each other to form a network.
If a signal strength meter is used in this situation, it may not read the strength accurately and can be misleading, because it registers the strength of the strongest signal, which may be the closest computer.
IEEE 802.11
defines the physical layer (PHY) and MAC (Media Access Control) layers based on CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance). The 802.11 specification includes provisions designed to minimize collisions, because two mobile units may both be in range of a common access point, but out of range of each other.
The 802.11 has two basic modes of operation: Ad hoc mode enables peer-to-peer transmission between mobile units. Infrastructure mode in which mobile units communicate through an access point that serves as a bridge to a wired network infrastructure is the more common wireless LAN application the one being covered. Since wireless communication uses a more open medium for communication in comparison to wired LANs, the 802.11 designers also included shared-key encryption mechanisms: Wired Equivalent Privacy
(WEP), Wi-Fi Protected Access
(WPA, WPA2), to secure wireless computer networks.
bridge allows the connection of devices on a wired Ethernet network to a wireless network. The bridge acts as the connection point to the Wireless LAN.
An access point can be either a main, relay or remote base station. A main base station is typically connected to the wired Ethernet. A relay base station relays data between remote base stations, wireless clients or other relay stations to either a main or another relay base station. A remote base station accepts connections from wireless clients and passes them to relay or main stations. Connections between "clients" are made using MAC addresses rather than by specifying IP assignments.
All base stations in a Wireless Distribution System must be configured to use the same radio channel, and share WEP keys or WPA keys if they are used. They can be configured to different service set identifiers. WDS also requires that every base station be configured to forward to others in the system.
WDS may also be referred to as repeater mode because it appears to bridge and accept wireless clients at the same time (unlike traditional bridging). It should be noted, however, that throughput in this method is halved for all clients connected wirelessly.
When it is difficult to connect all of the access points in a network by wires, it is also possible to put up access points as repeaters.
Spread spectrum
Spread-spectrum techniques are methods by which a signal generated in a particular bandwidth is deliberately spread in the frequency domain, resulting in a signal with a wider bandwidth...
or OFDM radio), and usually providing a connection through an access point to the wider internet. This gives users the mobility to move around within a local coverage area and still be connected to the network. Most modern WLANs are based on IEEE 802.11
IEEE 802.11
IEEE 802.11 is a set of standards for implementing wireless local area network computer communication in the 2.4, 3.6 and 5 GHz frequency bands. They are created and maintained by the IEEE LAN/MAN Standards Committee . The base version of the standard IEEE 802.11-2007 has had subsequent...
standards, marketed under the Wi-Fi
Wi-Fi
Wi-Fi or Wifi, is a mechanism for wirelessly connecting electronic devices. A device enabled with Wi-Fi, such as a personal computer, video game console, smartphone, or digital audio player, can connect to the Internet via a wireless network access point. An access point has a range of about 20...
brand name.
Wireless LANs have become popular in the home due to ease of installation, and the increasing to offer wireless access to their customers; often for free. Large wireless network projects are being put up in many major cities: New York City
New York City Department of Information Technology and Telecommunications
The New York City Department of Information Technology and Telecommunications is the city agency that "oversees the City's use of existing and emerging technologies in government operations, and its delivery of services to the public"...
, for instance, has begun a pilot program to provide city workers in all five boroughs of the city with wireless Internet access
Internet access
Many technologies and service plans for Internet access allow customers to connect to the Internet.Consumer use first became popular through dial-up connections in the 20th century....
.
History
Norman AbramsonNorman Abramson
Norman Abramson is an American engineer and computer scientist, most known for developing the ALOHAnet system for wireless computer communication....
, a professor at the University of Hawaii
University of Hawaii
The University of Hawaii System, formally the University of Hawaii and popularly known as UH, is a public, co-educational college and university system that confers associate, bachelor, master, and doctoral degrees through three university campuses, seven community college campuses, an employment...
, developed the world’s first wireless computer communication network, ALOHAnet
ALOHAnet
ALOHAnet, also known as the ALOHA System, or simply ALOHA, was a pioneering computer networking system developed at the University of Hawaii. ALOHAnet became operational in June, 1971, providing the first public demonstration of a wireless packet data network.The ALOHAnet used a new method of...
, using low-cost ham-like radios. The system included seven computers deployed over four islands to communicate with the central computer on the Oahu Island without using phone lines.
"In 1979, F.R. Gfeller and U. Bapst published a paper in the IEEE Proceedings reporting an experimental wireless local area network using diffused infraredInfraredInfrared light is electromagnetic radiation with a wavelength longer than that of visible light, measured from the nominal edge of visible red light at 0.74 micrometres , and extending conventionally to 300 µm...
communications. Shortly thereafter, in 1980, P. Ferrert reported on an experimental application of a single code spread spectrumSpread spectrumSpread-spectrum techniques are methods by which a signal generated in a particular bandwidth is deliberately spread in the frequency domain, resulting in a signal with a wider bandwidth...
radio for wireless terminal communications in the IEEE National Telecommunications Conference. In 1984, a comparison between infrared and CDMA spread spectrum communications for wireless office information networks was published by Kaveh PahlavanKaveh PahlavanKaveh Pahlavan , is a Professor of Electrical and Computer Engineering, a Professor of Computer Science, and Director of the Center for Wireless Information Network Studies, Worcester Polytechnic Institute, Worcester, Massachusetts....
in IEEE Computer Networking Symposium which appeared later in the IEEE Communication Society Magazine. In May 1985, the efforts of Marcus led the FCC to announce experimental ISM bandISM bandThe industrial, scientific and medical radio bands are radio bands reserved internationally for the use of radio frequency energy for industrial, scientific and medical purposes other than communications....
s for commercial application of spread spectrum technology. Later on, M. Kavehrad reported on an experimental wireless PBX system using code division multiple access. These efforts prompted significant industrial activities in the development of a new generation of wireless local area networks and it updated several old discussions in the portable and mobile radio industry.
The first generation of wireless data modems was developed in the early 1980s by amateur radioAmateur radioAmateur radio is the use of designated radio frequency spectrum for purposes of private recreation, non-commercial exchange of messages, wireless experimentation, self-training, and emergency communication...
operators, who commonly referred to this as packet radioPacket radioPacket radio is a form of packet switching technology used to transmit digital data via radio or wireless communications links. It uses the same concepts of data transmission via Datagram that are fundamental to communications via the Internet, as opposed to the older techniques used by dedicated...
. They added a voice band data communication modem, with data rates below 9600-bit/s, to an existing short distance radio system, typically in the two meter amateur band. The second generation of wireless modems was developed immediately after the FCC announcement in the experimental bands for non-military use of the spread spectrum technology. These modems provided data rates on the order of hundreds of kbit/s. The third generation of wireless modem then aimed at compatibility with the existing LANs with data rates on the order of Mbit/s. Several companies developed the third generation products with data rates above 1 Mbit/s and a couple of products had already been announced by the time of the first IEEE Workshop on Wireless LANs."
"The first of the IEEE Workshops on Wireless LANIEEE Workshops on Wireless LANIn May 1991, the first Institute of Electrical and Electronic Engineers workshop on Wireless LANs was held at the Worcester Polytechnic Institute, Worcester, Massachusetts. The workshop was scheduled in coordination with a meeting of the IEEE 802.11 Wireless Access Methods and Physical Layer...
was held in 1991. At that time early wireless LAN products had just appeared in the market and the IEEE 802.11IEEE 802.11IEEE 802.11 is a set of standards for implementing wireless local area network computer communication in the 2.4, 3.6 and 5 GHz frequency bands. They are created and maintained by the IEEE LAN/MAN Standards Committee . The base version of the standard IEEE 802.11-2007 has had subsequent...
committee had just started its activities to develop a standard for wireless LANs. The focus of that first workshop was evaluation of the alternative technologies. By 1996, the technology was relatively mature, a variety of applications had been identified and addressed and technologies that enable these applications were well understood. Chip sets aimed at wireless LAN implementations and applications, a key enabling technology for rapid market growth, were emerging in the market. Wireless LANs were being used in hospitals, stock exchanges, and other in building and campus settings for nomadic access, point-to-point LAN bridges, ad-hoc networking, and even larger applications through internetworking. The IEEE 802.11 standard and variants and alternatives, such as the wireless LAN interoperability forum and the European HiperLANHIPERLANHiperLAN is a Wireless LAN standard. It is a European alternative for the IEEE 802.11 standards . It is defined by the European Telecommunications Standards Institute . In ETSI the standards are defined by the BRAN project...
specification had made rapid progress, and the unlicensed PCS Unlicensed Personal Communications ServicesUnlicensed Personal Communications ServicesUnlicensed Personal Communications Services or UPCS band describes the 1920-1930 MHz frequency band allocated by the United States Federal Communications Commission for short range Personal Communications Services applications in the United States, such as the Digital Enhanced Cordless...
and the proposed SUPERNet, later on renamed as U-NII, bands also presented new opportunities."
WLAN hardware was initially so expensive that it was only used as an alternative to cabled LAN in places where cabling was difficult or impossible. Early development included industry-specific solutions and proprietary protocols, but at the end of the 1990s these were replaced by standards, primarily the various versions of IEEE 802.11 (in products using the Wi-Fi
Wi-Fi
Wi-Fi or Wifi, is a mechanism for wirelessly connecting electronic devices. A device enabled with Wi-Fi, such as a personal computer, video game console, smartphone, or digital audio player, can connect to the Internet via a wireless network access point. An access point has a range of about 20...
brand name). An alternative ATM
Asynchronous Transfer Mode
Asynchronous Transfer Mode is a standard switching technique designed to unify telecommunication and computer networks. It uses asynchronous time-division multiplexing, and it encodes data into small, fixed-sized cells. This differs from approaches such as the Internet Protocol or Ethernet that...
-like 5 GHz standardized technology, HiperLAN/2
HIPERLAN
HiperLAN is a Wireless LAN standard. It is a European alternative for the IEEE 802.11 standards . It is defined by the European Telecommunications Standards Institute . In ETSI the standards are defined by the BRAN project...
, has so far not succeeded in the market, and with the release of the faster 54 Mbit/s 802.11a (5 GHz) and 802.11g (2.4 GHz) standards, almost certainly never will. Since 2002 there has been newer standard added to 802.11; 802.11n which operates on both the 5Ghz and 2.4Ghz bands at 300 Mbit/s, most newer routers including those manufactured by Apple Inc. can broadcast a wireless network on both wireless bands, this is called dualband.
A HomeRF
HomeRF
HomeRF was a wireless networking specification for home devices to be connected to each other. It was developed in 1998 by the HomeRF Working Group, a consortium of mobile wireless companies that included Proxim Wireless, Siemens, Motorola, Philips and more than 100 other companies...
group was formed in 1997 to promote a technology aimed for residential use, but disbanded at the end of 2002.
Stations
All components that can connect into a wireless medium in a network are referred to as stations.All stations are equipped with wireless network interface controllers (WNICs).
Wireless stations fall into one of two categories: access points
Wireless access point
In computer networking, a wireless access point is a device that allows wireless devices to connect to a wired network using Wi-Fi, Bluetooth or related standards...
, and clients.
Access points (APs), normally routers, are base stations for the wireless network. They transmit and receive radio frequencies for wireless enabled devices to communicate with.
Wireless clients can be mobile devices such as laptops, personal digital assistant
Personal digital assistant
A personal digital assistant , also known as a palmtop computer, or personal data assistant, is a mobile device that functions as a personal information manager. Current PDAs often have the ability to connect to the Internet...
s, IP phones
Voice over IP
Voice over Internet Protocol is a family of technologies, methodologies, communication protocols, and transmission techniques for the delivery of voice communications and multimedia sessions over Internet Protocol networks, such as the Internet...
and other smartphone
Smartphone
A smartphone is a high-end mobile phone built on a mobile computing platform, with more advanced computing ability and connectivity than a contemporary feature phone. The first smartphones were devices that mainly combined the functions of a personal digital assistant and a mobile phone or camera...
s, or fixed devices such as desktops
Desktop computer
A desktop computer is a personal computer in a form intended for regular use at a single location, as opposed to a mobile laptop or portable computer. Early desktop computers are designed to lay flat on the desk, while modern towers stand upright...
and workstation
Workstation
A workstation is a high-end microcomputer designed for technical or scientific applications. Intended primarily to be used by one person at a time, they are commonly connected to a local area network and run multi-user operating systems...
s that are equipped with a wireless network interface.
Basic service set
The basic service set (BSS) is a set of all stations that can communicate with each other.There are two types of BSS: Independent BSS (also referred to as IBSS), and infrastructure BSS.
Every BSS has an identification (ID) called the BSSID, which is the MAC address
MAC address
A Media Access Control address is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used for numerous network technologies and most IEEE 802 network technologies, including Ethernet...
of the access point servicing the BSS.
An independent BSS (IBSS) is an ad-hoc network
Wireless ad-hoc network
A wireless ad-hoc network is a decentralized type of wireless network. The network is ad hoc because it does not rely on a preexisting infrastructure, such as routers in wired networks or access points in managed wireless networks...
that contains no access points, which means they can not connect to any other basic service set.
An infrastructure can communicate with other stations not in the same basic service set by communicating through access points.
Extended service set
An extended service set (ESS) is a set of connected BSSs. Access points in an ESS are connected by a distribution system. Each ESS has an ID called the SSID which is a 32-byte (maximum) character string.Distribution system
A distribution system (DS) connects access points in an extended service set.The concept of a DS can be used to increase network coverage through roaming between cells.
DS can be wired or wireless. Current wireless distribution systems are mostly based on WDS or MESH protocols, though other systems are in use.
Peer-to-peer
An ad-hoc network is a network where stations communicate only peer to peer (P2P). There is no base and no one gives permission to talk.This is accomplished using the Independent Basic Service Set (IBSS).
A peer-to-peer
Peer-to-peer
Peer-to-peer computing or networking is a distributed application architecture that partitions tasks or workloads among peers. Peers are equally privileged, equipotent participants in the application...
(P2P) network allows wireless devices to directly communicate with each other. Wireless devices within range of each other can discover and communicate directly without involving central access points. This method is typically used by two computers so that they can connect to each other to form a network.
If a signal strength meter is used in this situation, it may not read the strength accurately and can be misleading, because it registers the strength of the strongest signal, which may be the closest computer.
IEEE 802.11
IEEE 802.11
IEEE 802.11 is a set of standards for implementing wireless local area network computer communication in the 2.4, 3.6 and 5 GHz frequency bands. They are created and maintained by the IEEE LAN/MAN Standards Committee . The base version of the standard IEEE 802.11-2007 has had subsequent...
defines the physical layer (PHY) and MAC (Media Access Control) layers based on CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance). The 802.11 specification includes provisions designed to minimize collisions, because two mobile units may both be in range of a common access point, but out of range of each other.
The 802.11 has two basic modes of operation: Ad hoc mode enables peer-to-peer transmission between mobile units. Infrastructure mode in which mobile units communicate through an access point that serves as a bridge to a wired network infrastructure is the more common wireless LAN application the one being covered. Since wireless communication uses a more open medium for communication in comparison to wired LANs, the 802.11 designers also included shared-key encryption mechanisms: Wired Equivalent Privacy
Wired Equivalent Privacy
Wired Equivalent Privacy is a weak security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified in September 1999, its intention was to provide data confidentiality comparable to that of a traditional wired network...
(WEP), Wi-Fi Protected Access
Wi-Fi Protected Access
Wi-Fi Protected Access and Wi-Fi Protected Access II are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks...
(WPA, WPA2), to secure wireless computer networks.
Bridge
A bridge can be used to connect networks, typically of different types. A wireless EthernetEthernet
Ethernet is a family of computer networking technologies for local area networks commercially introduced in 1980. Standardized in IEEE 802.3, Ethernet has largely replaced competing wired LAN technologies....
bridge allows the connection of devices on a wired Ethernet network to a wireless network. The bridge acts as the connection point to the Wireless LAN.
Wireless distribution system
A Wireless Distribution System enables the wireless interconnection of access points in an IEEE 802.11 network. It allows a wireless network to be expanded using multiple access points without the need for a wired backbone to link them, as is traditionally required. The notable advantage of WDS over other solutions is that it preserves the MAC addresses of client packets across links between access points.An access point can be either a main, relay or remote base station. A main base station is typically connected to the wired Ethernet. A relay base station relays data between remote base stations, wireless clients or other relay stations to either a main or another relay base station. A remote base station accepts connections from wireless clients and passes them to relay or main stations. Connections between "clients" are made using MAC addresses rather than by specifying IP assignments.
All base stations in a Wireless Distribution System must be configured to use the same radio channel, and share WEP keys or WPA keys if they are used. They can be configured to different service set identifiers. WDS also requires that every base station be configured to forward to others in the system.
WDS may also be referred to as repeater mode because it appears to bridge and accept wireless clients at the same time (unlike traditional bridging). It should be noted, however, that throughput in this method is halved for all clients connected wirelessly.
When it is difficult to connect all of the access points in a network by wires, it is also possible to put up access points as repeaters.
Roaming
There are 2 definitions for wireless LAN roaming:- Internal Roaming (1): The Mobile Station (MS) moves from one access point (AP) to another AP within a home network because the signal strength is too weak. An authentication server (RADIUS) assumes the re-authentication of MS via 802.1x (e.g. with PEAPProtected Extensible Authentication ProtocolThe Protected Extensible Authentication Protocol, also known as Protected EAP or simply PEAP, is a protocol that encapsulates the Extensible Authentication Protocol within an encrypted and authenticated Transport Layer Security tunnel...
). The billing of QoS is in the home network. A Mobile Station roaming from one access point to another often interrupts the flow of data between the Mobile Station and an application connected to the network. The Mobile Station, for instance, periodically monitors the presence of alternative access points (ones that will provide a better connection). At some point, based upon proprietary mechanisms, the Mobile Station decides to re-associate with an access point having a stronger wireless signal. The Mobile Station, however, may lose a connection with an access point before associating with another access point. In order to provide reliable connections with applications, the Mobile Station must generally include software that provides session persistence.
- External Roaming (2): The MS (client) moves into a WLAN of another Wireless Internet Service Provider (WISP) and takes their services (Hotspot). The user can independently of his home network use another foreign network, if this is open for visitors. There must be special authentication and billing systems for mobile services in a foreign network.