WHY WI-FI WANTS to BE FREE As the Telecommunications Industry Wavers, a Global Grassroots Movement Is Building the Next-Generation Wireless Network

Total Page:16

File Type:pdf, Size:1020Kb

WHY WI-FI WANTS to BE FREE As the Telecommunications Industry Wavers, a Global Grassroots Movement Is Building the Next-Generation Wireless Network By Terry Schmidt and Anthony Townsend WHY WI-FI WANTS TO BE FREE As the telecommunications industry wavers, a global grassroots movement is building the next-generation wireless network. hile wireless carriers around the world have battled through the telecom bust, a grassroots movement has quietly deployed no-cost open wireless hotspots in cities acrossW the globe. In the process, these activists have trans- formed 802.11b wireless local area network (WLAN) tech- nology from an indoor novelty for cable replacement to an outdoor amenity that transforms the urban landscape—key developments of this grassroots wireless movement are high- lighted here. The community-based open wireless move- ment that has taken root in cities around the world in the last two years has demonstrated an alternative model for the widespread diffusion of wireless broadband networks. The experiences of early efforts in this area offer many insights COMMUNICATIONS OF THE ACM May 2003/Vol. 46, No. 5 47 PUT SIMPLY, WIRELESS NETWORKS WANT TO BE FREE. BY “FREE,” WE MEAN THAT HOMES, OFFICES, AND PUBLIC SPACES WILL INCREASINGLY BE EXPECTED TO PROVIDE HASSLE-FREE WIRELESS BANDWIDTH. into the possible futures for wireless networking. unlimited Wi-Fi access throughout the network. Like the Internet and Web, wireless LANs became In the U.S., wireless hotspots were targeted toward a mass market technology due to open standards that business travelers and were deployed at locations fre- unleashed powerful competitive forces and innova- quented by business travelers, such as airport tion. While many WLAN technologies were being lounges, upscale hotels, and coffee-shop chains. sold throughout the 1990s, it was the establishment However, unlike in Asia, cellular carriers did not of the 802.11b standard by the IEEE, followed by directly own the U.S. hotspot providers. Consumers Apple’s aggressive launch of the Airport line of were slow to subscribe, driven away by average WLAN products in 1999 that set the stage for mass monthly fees of over $50, very limited network cov- market development. After many other market erage, and the proliferation of free Wi-Fi hotspots. entrants, by the summer of 2002 there were an esti- By summer 2002, one of the largest U.S. hotspot mated 15 to 18 million 802.11b networks [3]. companies, MobileStar, was bankrupt. Not surpris- Affectionately renamed “Wi-Fi” (for wireless ingly, the company later re-emerged as a division of fidelity) by a consortium of manufacturers, 802.11b T-Mobile USA, a cellular carrier seeking early entry quickly edged out competing WLAN standards. to the WLAN access market. Even Intel ceded victory, abandoning the competing Hotspot providers (at least in the U.S.) had a HomeRF WLAN standard in early 2001 and throw- challenging road to profitability in a world where ing its weight behind Wi-Fi. By fall 2002, Wi-Fi unmetered Wi-Fi broadband was increasingly plen- emerged as a serious threat to so-called “third-gener- tiful. Driven by the rapid drop in the cost of Wi-Fi ation” cellular data networks, a long anticipated hardware, no-fee wireless networks were popping up upgrade to wide area wireless networks [2]. everywhere—in universities, offices, city parks, and The 802.11b standard was open, which allowed homes. Dartmouth University’s open network in many manufacturers to quickly enter the WLAN New Hampshire alone boasted over 500 nodes cov- market. In 1999, WLAN base stations cost as much ering many of the campus buildings and grounds as $1,000. Competition continually drove prices [3]. By the fall of 2002, there was a good chance that lower, and at the time this article was written the anytime you walked onto a university campus or average price of a Wi-Fi base station was just $100. into a large office building, its owner would be offer- Client devices experienced similar rapid price ing free Wi-Fi connectivity as a basic amenity. declines, dropping to less than $50, and were Thus while pay networks experienced slow sub- quickly integrated as standard equipment in new scriber growth, property owners and building man- laptops and handheld computers. agers moved quickly to provide the valuable amenity of wireless connectivity within their spaces. Like the Building the Hotspots Internet a decade earlier, the idea of a “wireless As the number of Wi-Fi client devices and users cloud” spread from universities into the broader grew during 2000–2002, a massive worldwide ini- market. Once it reached homes and businesses, tak- tiative began to deploy network infrastructure to ing it outdoors was the next step. This would be the support this new broadband medium. New and old province of the free wireless movement. firms were motivated to deploy infrastructure in places where early adopters would congregate. In The Rise of the Open Network South Korea, Japan, and Singapore, wireless carriers As Wi-Fi spread quickly in 2000–2001, activists and raced to deploy Wi-Fi hotspots at popular gathering hackers around the world began testing the limits of places. These Asian hotspot networks leveraged high what could be achieved with this exciting new tech- rates of mobile Internet use with the density of nology. The most novel of the resulting innovations Asian cities to create a successful business model, was the redeployment of Wi-Fi to provide connec- typically charging the equivalent of $15–$20 for tivity not only indoors in homes and offices (the 48 May 2003/Vol. 46, No. 5 COMMUNICATIONS OF THE ACM original design goal), but also outdoors in parks, com). In major cities, the open wireless network now porches, and plazas. These activists quickly found rivals leading commercial WLAN networks. For each other through email and Web connections, and example, at the time this article was written, in New began organizing volunteers and deploying coopera- York City the NYCwireless network (95 active tive public wireless networks. nodes) was competing with the two main pay wire- The hotspots deployed by these grassroots wire- less LAN systems operated by T-Mobile USA (120 less-networking groups were a dramatic departure nodes) and Wayport (3 nodes) [9]. from the pay hotspots set up by companies such as The free wireless movement’s overall sustainability T-Mobile. Instead of requiring expensive usage fees, is being bolstered by expanding participation and these networks would be open to all at absolutely no partnership beyond the core group of individuals cost. Instead of extensive security layers designed to who started it. Spearheaded by NYCwireless’ incor- thwart eavesdropping, users would be expected to poration as a non-profit organization in April 2002, provide the desired level of security themselves using and resulting from collaboration with many existing existing tools like SSH, SSL, PGP, and VPNs. businesses and government agencies, the con- The spread of these free wireless networks was stituency of support behind the idea of ubiquitous, rapid. Most places where you would want wireless free (to the user) wireless networks is rapidly grow- bandwidth already had wired bandwidth in abun- ing. But why do free wireless networks have such dance. Creating a hotspot was just a matter of widespread appeal? installing a wireless base station, or access point, and It is the expert opinion of the authors that the advertising its presence through any of several means popularity of open wireless networks is a combina- provided by the open wireless community.1 For tion of open standards and the benefits of mass-pro- larger areas or outdoor spaces such as parks and duction and interoperability they bring, and the plazas, directional antennas and amplifiers could be intrinsic value that a wireless “cloud” brings to the used to sculpt a coverage zone using the meager one place in which it is located. Compared to the typical watt of power permitted by the FCC for unlicensed cost of waste disposal or powering the lights, band- operators in the 2.4GHz band.2 width is inexpensive. For example, maintaining the Individuals had many incentives to contribute to Bryant Park Wireless Network and leasing its T1 expanding the free network. First, there was a sense backbone connection costs less than the park spends of mutual cooperation: “I will set up my free node in on trash bags!3 Thus it makes more economic sense the hopes that others will too, and I will have access for building owners, schools, and even entire neigh- when I’m away from home.” Second, similar to the borhoods to deploy their own open wireless infra- open source software movement, there was a certain structure, rather than to contract this service out to amount of prestige in the wireless networking com- a for-profit provider. munity for those who were node operators rather Put simply, wireless networks want to be free. By than merely users. Finally, the utopian dream of “free,” we mean that homes, offices, and public completely undermining the stranglehold of cellular spaces will increasingly be expected to provide has- and landline telecommunications companies was an sle-free wireless bandwidth. Open wireless networks, enticing goal. which do not require users to log on or authenticate After two years, the free network movement has their identity, are already widely deployed and offer established beachheads in every major American city, far easier and more uniform access to the Internet and throughout Europe and Australia. This free than any pay network might provide. Usage statistics public hotspot network serves more varied locations support this conclusion as well—the authors’ surveys than any commercial Wi-Fi network. From Manhat- of pay hotspots in Manhattan rarely find active tan’s Bryant Park to Portland’s Pioneer Square, in users, while Bryant Park’s network logs an average of independent coffee shops and on the stoops of over 50 users per weekday.
Recommended publications
  • Life Cycle of Municipal Wi-Fi
    A Service of Leibniz-Informationszentrum econstor Wirtschaft Leibniz Information Centre Make Your Publications Visible. zbw for Economics Tseng, Chien-Kai; Huang, Kuang-Chiu Conference Paper Life Cycle of Municipal Wi-Fi 14th Asia-Pacific Regional Conference of the International Telecommunications Society (ITS): "Mapping ICT into Transformation for the Next Information Society", Kyoto, Japan, 24th-27th June, 2017 Provided in Cooperation with: International Telecommunications Society (ITS) Suggested Citation: Tseng, Chien-Kai; Huang, Kuang-Chiu (2017) : Life Cycle of Municipal Wi- Fi, 14th Asia-Pacific Regional Conference of the International Telecommunications Society (ITS): "Mapping ICT into Transformation for the Next Information Society", Kyoto, Japan, 24th-27th June, 2017, International Telecommunications Society (ITS), Calgary This Version is available at: http://hdl.handle.net/10419/168493 Standard-Nutzungsbedingungen: Terms of use: Die Dokumente auf EconStor dürfen zu eigenen wissenschaftlichen Documents in EconStor may be saved and copied for your Zwecken und zum Privatgebrauch gespeichert und kopiert werden. personal and scholarly purposes. Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle You are not to copy documents for public or commercial Zwecke vervielfältigen, öffentlich ausstellen, öffentlich zugänglich purposes, to exhibit the documents publicly, to make them machen, vertreiben oder anderweitig nutzen. publicly available on the internet, or to distribute or otherwise use the documents in public. Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, If the documents have been made available under an Open gelten abweichend von diesen Nutzungsbedingungen die in der dort Content Licence (especially Creative Commons Licences), you genannten Lizenz gewährten Nutzungsrechte. may exercise further usage rights as specified in the indicated licence.
    [Show full text]
  • Lab Report: 2.1.3 Connect to an Ethernet Network
    Lab Report: 2.1.3 Connect to an Ethernet Network Performance Your Score: 0 of 2 (0%) Elapsed Time: 9 seconds Task Summary Actions you were required to perform: In In Office 1, connect the twisted pair cable between the workstation and the wall plate In In Office 1, confirm that the workstation has a connection to the local network and the Internet Explanation To complete this lab, use twisted pair cable with RJ45 connectors to connect to a wired Ethernet network. RJ45 connectors have eight wires (as seen below) and are larger than RJ11 connectors. Complete the following steps: 1. Under Office 1, select Hardware to go to the workstation. 2. Above the computer, select Back to switch to the back view of the computer. 3. On the Shelf, expand the Cables category. 4. Select the RJ45 cable. 5. In the Selected Component window, drag and drop the connector to the Ethernet port on the computer. 6. In the Selected Component window, drag the other connector to the Ethernet port on the wall outlet. 7. Select Click to view Windows 10 on the monitor to confirm that the workstation has a connection to the local network and the internet. 8. In the notification area, right-click the Network icon and select Open Network and Sharing Center. The diagram should indicate an active connection to the network and the internet. Lab Report: 2.2.3 Connect a Cable Modem Performance Your Score: 0 of 4 (0%) Elapsed Time: 6 seconds Task Summary Actions you were required to perform: In Connect the cable modem to the Internet using the RG-6 cable In Connect the computer to the cable modem using the Ethernet cable In Plug in the cable modem In Confirm that the computer is properly connected to the Internet Explanation In this lab, your task is to complete the following: Connect the components to make the internet connection.
    [Show full text]
  • Book IG 1800 British Telecom Rev A.Book
    Notice to Users ©2003 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior written approval. 2WIRE PROVIDES NO WARRANTY WITH REGARD TO THIS MANUAL, THE SOFTWARE, OR OTHER INFORMATION CONTAINED HEREIN AND HEREBY EXPRESSLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE WITH REGARD TO THIS MANUAL, THE SOFTWARE, OR SUCH OTHER INFORMATION, IN NO EVENT SHALL 2WIRE, INC. BE LIABLE FOR ANY INCIDENTAL, CONSEQUENTIAL, OR SPECIAL DAMAGES, WHETHER BASED ON TORT, CONTRACT, OR OTHERWISE, ARISING OUT OF OR IN CONNECTION WITH THIS MANUAL, THE SOFTWARE, OR OTHER INFORMATION CONTAINED HEREIN OR THE USE THEREOF. 2Wire, Inc. reserves the right to make any modification to this manual or the information contained herein at any time without notice. The software described herein is governed by the terms of a separate user license agreement. Updates and additions to software may require an additional charge. Subscriptions to online service providers may require a fee and credit card information. Financial services may require prior arrangements with participating financial institutions. © British Telecommunications Plc 2002. BTopenworld and the BTopenworld orb are registered trademarks of British Telecommunications plc. British Telecommunications Plc registered office is at 81 Newgate Street, London EC1A 7AJ, registered in England No. 180000. ___________________________________________________________________________________________________________________________ Owner’s Record The serial number is located on the bottom of your Intelligent Gateway. Record the serial number in the space provided here and refer to it when you call Customer Care. Serial Number:__________________________ Safety Information • Use of an alternative power supply may damage the Intelligent Gateway, and will invalidate the approval that accompanies the Intelligent Gateway.
    [Show full text]
  • Mobile Devices 1 Development of Mobile Devices Berker Sönmez
    Mobile Devices 1 Development of Mobile Devices Berker Sönmez Faculty of Computer and Informatics 040100101 Oğuz Onur Kul Faculty of Computer and Informatics 040100105 Erdem Emekligil Faculty of Computer and Informatics 150110702 English 201 Sueda Albayrak December 22, 2011 Mobile Devices 2 Thesis: The hardware, software and connection technologies of mobile devices have developed greatly in the recent years. I. Hardware A. Inside Components 1. Chips 2. Batteries B. Outside Components 1. Cameras 2. Touch sense technologies II. Software A. New operating systems 1. iOS 2. Android B. Functional applications 1. Medical applications 2. Game applications III. Connection technologies A. New generation wireless technologies 1. 802.11(Wifi) and 802.16(WiMax) 2. Bluetooth, IrDA and HomeRF B. Advanced communication protocols 1. 3G technology 2. 4G (LTE) technology Mobile Devices 3 Technology is one of the fastest growing entities in science. Day after day, many improvements are being made, many ideas and inventions are being added to this entity. In the recent years, mobile technology gained importance since people have started living in different places and it is important to provide communication among them. Mobile devices are small, portable equipments that are used to carry out various tasks without being obliged to stay in a certain place. In the recent years, the most popular mobile devices have been mobile phones since they have become everyday objects which people carry in their pockets to wherever they travel. Using mobile devices, it is possible to view e-mails, play games, read books and complete many other tasks on the go. Therefore, the importance of mobile phones can not be overlooked.
    [Show full text]
  • Generating Signals for Wireless Lans, Part I: IEEE 802.11B
    Products: SMIQ, AMIQ, WinIQSIM™, SMIQK16, AMIQK16 Generating Signals for Wireless LANs, Part I: IEEE 802.11b With Wireless Local Area Networks (WLAN) already entering the mass markets, generating signals to WLAN standards will become increasingly important. Signal sources are needed in R&D (or production) to test RF modules, to evaluate basic receiver functionality or when new designs are being evolved. This Application Note focuses on the most commonly used standard IEEE 802.11b. Topics covered include technical aspects of the physical layers as well as details on configuring available signal sources. Subject to change – Gernot Bauer 8/2002 – 1GP49_1E Generating Signals for WLANs, Part I: 802.11b Contents 1 Introduction to Wireless LAN Systems......................................................................................3 2 The IEEE 802.11 and 11b Standards ..........................................................................................5 2.1 The 802.11 and 11b PHY ....................................................................................................6 2.1.1 Defined Transmission Methods.................................................................................6 2.1.1.1 Low Rate Modulation with Barker Spreading................................................7 2.1.1.2 High Rate CCK Modulation...........................................................................8 2.1.1.3 High Rate PBCC Modulation ........................................................................9 2.1.2 The PLCP..................................................................................................................9
    [Show full text]
  • Understanding Wireless Security on Your Spectralink 84-Series
    Best Practices Understanding Wireless Security on Your Spectralink Spectralink 84-Series Wireless Phones Spectralink’s 84-Series wireless phones meet the highest security requirements. By the time you deploy your 84-Series wireless phones, most of your basic security issues have already been ironed out by AP vendors and security servers to conform to federal regulations in place to protect personal privacy. Medical information, for example, is protected by HIPPA (Health Insurance Portability and Accountability Act) or PCI (Payment Card Industry). If you have general security questions after the deployment of your 84-Series phone, this best practices document should have the answers, or at least point you in the right direction. System Affected 84-Series Handsets Some Basics About Encryption and Authentication On Wi-Fi networks there can be a trade-off between good security and good audio. The most rigorous enterprise-level security can protect against eavesdropping and unauthorized toll calls, but it can also increase server demand, resulting in latency and audio packet loss. Implementing less robust, personal-level security measures will reduce server processing demands, ease configuration, and smooth audio flow through your network, but may not provide adequate security for many enterprise Wi-Fi networks. The good news: Proper configuration of 84-Series phones offers the best of both worlds, ensuring excellent audio in the most robust security environments. Table 1 highlights the correlation between security and audio relating to various Wi-Fi encryption and authentication techniques, with considerations for configuring the phones for the best security and audio. Number? March 2015 Best Practices Understanding Wireless Security Table 1: Enterprise Environment Security Trade-Offs Wireless Security in Audio Ease of Configuration and Other General Information Security Enterprise Method Environments WEP Poor Excellent Easy to administer, little processing overhead, adequate security for many home wi-fi networks.
    [Show full text]
  • Security Gateway Overview
    Security Gateway Overview This chapter contains general overview information about the Security Gateway (SecGW) running on an VPC-DI Virtualized Service Module (VSM) as a VPC-VSM instance. The following topics are covered in this chapter: • Product Overview, page 1 • Network Deployment, page 3 • Packet Flow, page 4 • Standards, page 4 Product Overview The SecGW is a high-density IP Security (IPSec) gateway for mobile wireless carrier networks. It is typically used to secure backhaul traffic between the Radio Access Network (RAN) and the operator core network. IPSec is an open standards set that provides confidentiality, integrity, and authentication for data between IP layer peers. The SecGW uses IPSec-protected tunnels to connect outside endpoints. SecGW implements the parts of IKE/IPSec required for its role in mobile networks. The following types of LTE traffic may be carried over encrypted IPSec tunnels in the Un-trusted access domain: • S1-C and S1-U: Control and User Traffic between eNodeB and EPC • X2-C and X2-U: Control and User Traffic between eNodeBs during Handoff SecGW Administration Guide, StarOS Release 21.3 1 Security Gateway Overview SecGW Application • SPs typically carry only Control Traffic, however there exists a case for carrying non-Internet User traffic over secured tunnels Figure 1: SecGW Implementation SecGW Application The StarOS-based Security Gateway (SecGW) application is a solution for Remote-Access (RAS) and Site-to-Site (S2S) mobile network environments. It is implemented via StarOS as a WSG (Wireless Security Gateway) service that leverages the IPSec features supported by StarOS. For complete descriptions of supported IPSec features, see the IPSec Reference.
    [Show full text]
  • WIRELESS FIDELITY (Wi-Fi) BROADBAND NETWORK TECHNOLOGY: an OVERVIEW with OTHER BROADBAND WIRELESS NETWORKS
    WIRELESS FIDELITY (Wi-Fi) BROADBAND NETWORK TECHNOLOGY: AN OVERVIEW WITH OTHER BROADBAND WIRELESS NETWORKS by Chris A. Nwabueze, M. Eng., MNSE, MNIEEE, MIEE. Silas A. Akaneme, M. Eng., MNSE, MNIEEE, MIEEE Dept. of Electrical/Electronic Engineering, Anambra State University, Uli. E-mail: [email protected]. ABSTRACT Wireless Fidelity (Wi-Fi) broadband network technology has made tremendous impact in the growth of broadband wireless networks. There exists today several Wi-Fi access points that allow employees, partners and customers to access corporate data from almost anywhere and anytime. Wireless broadband networks are expected to grow in terms of broadband speed and coverage, while Wi-Fi can be integrated with WiMAX networks to provide Internet connectivity to mobile Wi-Fi users. This paper explores the Wi-Fi broadband wireless network technology, its uses, advantages and disadvantages, comparison with other broadband wireless networks and integration with WiMAX network. Key Words: Broadband, Wireless Fidelity (Wi-Fi), World Wide Interoperability for Microwave Access (WiMAX), IEEE 802.11 standards. 1.0 INTRODUCTION 802.11a [12]. Wi-Fi is owned by the Wi-Fi Wi-Fi stands for “Wireless Fidelity” and Alliance which is a consortium of separate was used to describe Wireless LAN and independent companies agreeing to a (WLAN) products that are based on the set common interoperable products based IEEE 802.11 standards. Wi-Fi uses both on the family of IEEE 802.11 standards single carrier direct-sequence spread [11]. spectrum radio technology and multi-carrier Wi-Fi certifies products via a set of OFDM (Orthogonal Frequency Division established test procedures to establish Multiplexing) radio technology.
    [Show full text]
  • High-Speed Internet Connection Guide Welcome
    High-Speed Internet Connection Guide Welcome Welcome to Suddenlink High-Speed Internet Thank you for choosing Suddenlink as your source for quality home entertainment and communications! There is so much to enjoy with Suddenlink High-Speed Internet including: + Easy self-installation + WiFi@Home availability + Easy access to your Email + Free access to Watch ESPN This user guide will help you get up and running in an instant. If you have any other questions about your service please visit help.suddenlink.com or contact our 24/7 technical support. Don’t forget to register online for a Suddenlink account at suddenlink.net for great features and access to email, billing statements, Suddenlink2GO® and more! 1 Table of Contents Connecting Your High Speed Internet Connecting Your High-Speed Internet Your Suddenlink Self-Install Kit includes Suddenlink Self-Install Kit ..................................................................................... 3 Connecting your computer to a Suddenlink modem ....................................... 4 the following items: Connecting a wireless router or traditional router to Suddenlink ................. 5 Getting Started Microsoft Windows XP or Higher ......................................................................... 6 Cable Modem Power Adapter Mac OS X ................................................................................................................. 6 Register Your Account Online ................................................................................7 Suddenlink WiFi@Home
    [Show full text]
  • Wireless Security Evolution
    Wireless Security Evolution Kevin Hayes Distinguished Engineer Atheros Communications AboutAbout myselfmyself Engineer for Atheros Communications since 2000 Interests in OS and systems design, L2/L3 networking, QoS and security Participant/Contributor to IEEE 802.11 TGf (Inter Access Point Protocols) TGi (WLAN Security) TGk (Radio system measurement) TGn (High rate WLAN) TGr (Fast, secure handoff) TGs (WLAN mesh) TGw (Security for WLAN Management Frames) 2 WirelessWireless isis RockingRocking OurOur World!World! Devices Traditional WLAN connectivity (laptops, APs) CE devices Sony PSP, Microsoft Zune, Satellite+WLAN media players, … VOIP phones Services Hotspot connectivity Gateways controlled by service providers Video distribution – IPTV Skype and other voice services Other streaming services – iTunes, Rhapsody See http://www.wi-fi.org for list of WFA certified devices 3 We’veWe’ve beenbeen herehere beforebefore Circa 1994, connection was king, no security awareness Connection speed was measurement of connection quality 19.2 Kbps…woo-hoo! No e-commerce, No SSL Rare for brick-n-mortar enterprise to have Net presence, let alone a firewall Today, we have reasonable Net security. But the WLAN cometh: >60% home wireless networks unsecured Wireless usage model presents new opportunities to attackers Many more threats than before Users expect wireless connections to add no new security exposure We need standards to design security into WLANs 4 802.11802.11 backgroundbackground IEEE 802.11 is a subset of IEEE 802 LAN
    [Show full text]
  • Wireless Networks Book
    Wireless Networks Local and Ad Hoc Networks Ivan Marsic Department of Electrical and Computer Engineering and the CAIP Center Rutgers University Contents CHAPTER 1................................................................................................... INTRODUCTION ..............................................................................................................................1 1.1 Summary and Bibliographical Notes................................................................................................... 6 CHAPTER 2 THE RADIO CHANNEL.......................................................................1 2.1 Introduction........................................................................................................................................ 1 2.1.1 Decibels and Signal Strength ............................................................................................................ 4 2.2 Channel Implementation..................................................................................................................... 5 2.2.1 Transmission Rate ........................................................................................................................... 5 2.2.2 Symbols To Signals.......................................................................................................................... 6 2.2.3 Modulation ...................................................................................................................................... 6 2.2.4 Noise and Error
    [Show full text]
  • Analysis of Wifi and Wimax and Wireless Network Coexistence
    International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.6, November 2014 ANALYSIS OF WIFI AND WIMAX AND WIRELESS NETWORK COEXISTENCE Shuang Song and Biju Issac School of Computing, Teesside University, Middlesbrough, UK ABSTRACT Wireless networks are very popular nowadays. Wireless Local Area Network (WLAN) that uses the IEEE 802.11 standard and WiMAX (Worldwide Interoperability for Microwave Access) that uses the IEEE 802.16 standard are networks that we want to explore. WiMAX has been developed over 10 years, but it is still unknown to most people. However compared to WLAN, it has many advantages in transmission speed and coverage area. This paper will introduce these two technologies and make comparisons between WiMAX and WiFi. In addition, wireless network coexistence of WLAN and WiMAX will be explored through simulation. Lastly we want to discuss the future of WiMAX in relation to WiFi. KEY WORDS WiMAX, WiFi, wireless network, wireless coexistence, network simulation 1. INTRODUCTION With the development of multimedia communication, people need wireless broadband access with higher speed, larger coverage and mobility. The emergence of WiMAX (Worldwide Interoperability for Microwave Access) technology met the people's demand for wireless Internet to some extent. If wireless LAN technology (WLAN) solves the access problem of the "last one hundred meters", then WiMAX technology is the best access solution of the "last mile". Though WiMAX is an emerging and extremely competitive wireless broadband access technology, the development prospects of its market is still unknown. Hybrid networks as a supplement to cell based or IP packet based services, can fully reflect the characteristics of wide network coverage.
    [Show full text]