Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
An investigation into wireless internet with critical analysis of its implementation process in the real world
1. 7CS004 Design & Implementation of 4th Generation Networks
An investigation into wireless internet with critical analysis of its
implementation process in the real world
5380 words
David Horne
2. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
1
Contents
Introduction
1.0 What is wireless internet?
1.1 IEEE Standards
1.2 Frequencybandsandchannels
1.3 Forwarderror correction
1.4 Security
1.5 Wirelessnetworkclassifications
2.0 Deployment strategies
2.1 Coverage
2.2 Capacity
2.3 Outside interference
2.4 Controllers
2.5 Mesh networks
3.0 Enterprise Networks
3.1 Hospitality
3.2 Education
3.3 Retail
3.4 Healthcare
3.5 Transportation
3.6 Warehousing
4.0 Carrier Grade Services
4.1 Wirelessbroadbandaccess
4.2 Cellularoffload
4.3 Managed services
4.4 Smart citiesand the Internetof Things
Conclusion
References
3. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
2
Introduction
OFCOMreports that mobile devicesare now the mostcommon methodforaccessingthe internet
with33% of subscribers usingtheirsmartphoneas theirprimarymethodforaccessingonline
content. Wirelesssolutionsare quicklybecomingthe methodof choice forcommunicationsbetween
devicesandpeople andasa result, the popularityandfunctionalityof wirelessnetworks has
increased forbothbusinessanddomesticpurposes. The planninganddevelopmentof these systems
have become paramounttosupportthe continuedgrowthinwirelessenableddevices andthe
increasingdataratestheydemand.Many organizationsare now lookingtowirelessinternetasa
viable solutiontonotonlyimprove connectivity,butalsoasa solutiontoconnectassetsthatwere
previouslyoutof reach.
Thispaperwill look athow wirelessinternetisimplementedinthe real world includingthe
technologyused,factorsaffectingdeployment andthe standardsemployed. (OFCOM,2015)
1.0 What is wireless internet?
Wirelesscommunicationbetweendevicesisnow astandard formof transferringdataasmost
devicesnowincorporate awirelessadaptoroutof the box.Flexible networkaccessanda reduced
cost to deployinfrastructurehasincreasedthe popularityof wirelessnetworksmakingthemareal
alternative toawirednetworkforbothpermanentandtemporaryinstallations.Toensure
interoperabilitybetweendifferentvendors,variousspecificationshave beendevisedbythe IEEE
underthe 802.11 standard whichquicklybecame the de-factostandardknownaswifi. The original
standardspecified dataratesof 1 and 2 Mb/s to be transmittedusinginfra-red(IR) orthe Industrial
ScientificMedical (ISM) bandusingCSMA/CA asthe mediaaccessmethodemployed inEthernet
protocol.The problemwiththe original standardisitwasnot veryspecificwhichleadto
interoperabilityissuesbetweenvendorsandsothe followingstandardswere ratifiedasaway to not
onlyimprove performance,buttoallowcompatibilitybetweendiffering standardsand products.
1.1 IEEE Standards
The 802.11 standardsare a setof mediaaccesscontrol (MAC) and physical layer(PHY) specifications
to be workedto whenimplementingawirelessnetwork. There are multiplestandardsavailable
whichcovera varietyof aspectsincludingsecurity,qualityof service andthe wirelessstandards
themselves.AsstatedonRadio-electronics.com, these are:
802.11a: networkbearerutilizingthe 5 GHz ISM bandwitha raw data rate upto 54 Mbps.
802.11b: networkbearerusing the 2.4 GHz ISMband witha raw data rate up to 11 Mbps.
802.11e: standardfor qualityof service andprioritizingtraffic.
802.11f: standardfor traffichandover.
802.11g: networkbearerutilizingthe 2.4 GHz ISMband witha raw data rate upto 54 Mbps.
802.11h: standard forpowercontrol.
802.11i: standardfor encryptionandauthentication.
802.11j: standardfor interworking.
802.11k: standardformeasurementreporting.
802.11n: networkbearerutilizing2.4GHz and5 GHz ISMbandswith raw data ratesup to
600 Mbps.
802.11s: standard formeshnetworks.
4. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
3
802.11ac: networkbeareroperatingbelow 6GHz to provide datarates at 1 Gbpsand above
for multi-stationoperationand500 Mbps for a single link.
802.11ad: networkbearerforveryhighthroughputoperatingatupto 60 GHz.
802.11af: wifi utilizingUHFspectrumwhite space.
802.11ah: standardfor unlicensedspectrumbelow 1GHz to provide longrange
communicationsandsupport forthe Internetof Things. (Radio-electronics.com, 2012)
The ETHW describesthe networkbearerstandardsas the mostwell-knownof the 802.11 standards:
802.11b
Operatinginthe unlicensed2.4GHz bandwithan 83.5 MHz channel,802.11b usesthe Ethernet
protocol to achieve real worldthroughputof around5.9 Mb/s. Using the same modulationscheme
as the original standardmakes productseasytoupgrade to supportthe new standard whichleadsto
large scale commercial acceptance,particularlywhenApple launcheditsAirportproduct.
802.11a
Usingthe same core protocol of the original standard,butinthe 5 GHz band,witha 52 sub-carrier
OFDMair interface toproduce a maximumraw data rate of 54 Mb/s and a realisticdatarate of 24
Mb/s. The advantage of usingthe 5 GHz bandisthat 2.4 GHz iscongestedwithmanyusersand
devices leaving5GHz relativelyinterference free. Due tothe higherfrequency,penetrationthrough
wallsislessandusershave to have an almostline of sightmeaningahighernumberof accesspoints
are requiredtogive sufficientcoverage.
802.11g
A thirdmodulationstandardwasratifiedinJune 2003 alsousingthe 2.4 GHz band withan 83.5 MHz
wide channel butintroducedreal worldthroughputof around24.7 Mb/sand backward compatibility
with802.11b as itutilizesthe same frequencies.As aresult,the majorityof dual-bandproductsthen
became tri-bandsupportinga, band g standardswhichensuredthe bestpossible throughputinany
environment.
802.11n
802.11n buildsuponpreviousstandardsbyintroducing MIMO,whichincreasesdatathroughputby
addingadditional antennasandusingspacial multiplexing.Real worlddatathroughputlevelsare 100
Mb/s minimum,andcoverage improves byexploitingspacial diversity.(ETHW,2015)
1.2 Frequency bands and channels
The most utilizedfrequencieslieinthe unlicensed2.4GHz bandas it was the firstto be usedin the
consumermarketandranges from2.4000 to 2.4835 GHz. This bandcontains fourteenchannels
spaced5 MHz apart,exceptforthe last twowhich are 12 MHz apart, with13 beingallowedforuse
across Europe as definedbyETSI.The 802.11 standardsspecifyabandwidthof 22 MHz with25 MHz
of separationmeaningthatadjacentchannelswill overlapandinterfere witheachotherunlessonly
three are used.( Radio-electronics.com,2012)
5. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
4
Fig. 1
Figure 1 above showsthe three available 20MHz channelswhich coverfive channelseach. Routers
usingthe 802.11n standardwill alsoallow the selectionof a40 MHz channel whichallowshigher
data ratesto be transmittedbutcanalso increase interference.
Fig. 2
Figure 2 above showshowwiderchannelscanallow anincreaseddatarate withoutincreasinglevels
of interference. (ZenInternet,1999)
Due to highlevelsof trafficinthe 2.4 GHz band;the 5 GHz ISMband isbeingusedmore oftenwhich
allowsforhigherdatarates. Made up of four frequencybands,5.1,5.3, 5.4 and 5.8 GHz, with24
channelsavailableand20 MHz bandwidth,nochannelsoverlapallowingall tobe utilizedinasingle
wirelessnetwork. However,due tothe higherfrequency,the range of a 5 GHz signal is shorteras itis
unable topenetrate solidobjectsaswell asa lower2.4 GHz signal.Asthe propertiesof both2.4 GHz
and 5GHz complementeachother, manufacturerssuchasNetgearoftenutilize both aspartof the
same wirelessnetworkto helpspreadtrafficload.(Netgear,2016)
The original 802.11 standardspecified twodifferenttypesof spreadspectrumtransmission;
frequencyhopping(FHSS) and directsequence spreadspectrum (DHSS).
FHSS
Frequencyhopping dividesthe 2.4GHz bandintoseventy-five 1MHz channelsand utilizesthe
switchingof spectrum duringtransmission toallow datatobe transmittedacrossa widerfrequency
bandthan the initial informationsignal.The transmittermustworktogetherwiththe receiverby
sendingadata burst onthe centerfrequencyinformingthe receiverwhichfrequencyisabouttobe
utilised.The patterninwhichthe transmitterchoosesthe orderof the frequenciestohopis
controlledbyanalgorithmwhichcaneitherbe preplannedorcompletelyrandom. (Search
Networking,2002)
6. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
5
DHSS
Directsequence spreadspectrum dividesthe 2.4GHz bandinto 22 MHz channelswhichoverlap and
usesa technique knownaschippingtomodulate asignal thattoleratessome signal loss.Originally
the Barker chippingcode wasused alongwithBPSKandQPSKto produce data rates of one or two
Mbps. The 802.11b standardreleasedin1999 introducedamore efficientchippingmethodcalled
complimentarycode keying(CCK) whichincreasedthe topdatarate to 11 Mbps but alsosupported
interoperabilityof DSSSradiosandadjustable datarates.(SearchNetworking,2007)
From 802.11g onwards,OFDMhasbeenintroduced whichbreaksupthe bandwidthinto seven
smallersubcarriers perchannel whichare orthogonallypolarizedwitheachotherto avoid
interference onthe overlap.The subcarriersare spacedexactlysothatthe maximumpowerof one
subcarriercoincideswith the minimumpowerof the nextwhichresultsinmaximumspectral
efficiencyandminimal interference.
Fig.3
Figure 3 above showsthe frequencydomainof anOFDMsystemwhichallowsagreaterdata
throughputdue tothe increasednumberof symbols acrossthe mostefficientuse of bandwidth.
(National Instruments,2014)
In January2014, 802.11ac was releasedwhich increaseddatathroughputonce againby utilizing256
QAMmodulationallowing24non-overlappingunlicensednational informationinfrastructure (UNII)
channelsinthe 5GHz band. There are now fourtypesof modulationusedtovarydata rates tohelp
increase efficiencyand reliabilityof communicationsinabusy RF environment. (Intel,2016)
1.3 ForwardError Correction
To helpimprove reliabilityinanoisyenvironment,forwarderrorcorrection(FEC) canbe addedto
the data streamto improve errorrecovery.FECcan be expressedasa ratioand isessentiallyatrade
-off betweenefficiencyandreliability.Asthe amountof FEC isincreased,soisthe reliability,
however,the efficiencyof the transmissionisdecreasedsoitisimportant forthe access pointto find
the correct balance basedonits ownalgorithm.Layertwoerrorsand frame corruptionare some of
the traditional indicatorsusedtosignal adownshiftinmodulationscheme,however,thisisnot
alwaysthe correct decision.The ‘Rate MyWifi’ white paperpublishedbyRuckusexplainshow
interference istransientbynature,whichcanmake it hard to predictthe bestsolutionasinsome
cases,increasingthe datarate couldworkbetteras data occupiesthe channel fora shorterperiodof
time. (Ruckus:Rate My Wifi,2012)
7. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
6
1.4 Security
Ciscoexplains thatthere are twomethodsof authenticationspecifiedinthe 802.11 standards;open
and sharedkeyauthentication whichcansometimesbe accompaniedbythe Service SetIdentifier
(SSID) andMediaAccessControl (MAC) authenticationalthoughthese are notspecified,theyare
common. The SSID allowsseparationof awirelessLAN andalthoughitdoesnotprovide anysort of
data privacy,the SSIDmust be configuredcorrectlytoallow aclientaccessto the network.
Authenticationusingthe MACaddress allowsclientdevicesaccessonlyif theyare listedonalocal
listor authenticationserverandif theyare,openor sharedkeyauthenticationwouldthentake
place. (Cisco:WirelessLAN Security,2014)
OpenAuthentication
Thisallowsthe accesspointto accept anyrequestforauthenticationandisdesignedtogive quick
access to a network.Made upof the requestandthe response,openauthenticationisdesignedfor
data acquisitiondevicessuchasbarcode readerswhere onlythe SSIDisneededtogainaccess.
WEP Encryption
WiredEquivalentPrivacy(WEP) isasharedauthenticationprotocolwhich utilizesasymmetrickey
streamcipherbasedonthe RC4 algorithm. Whena clientrequestsaccesstoanaccess point,the
WEP keyisaddedto some data to create an initializationvector(IV) bythe client,the accesspoint
thendecryptsthe vector, andif the keysmatch,the clientisauthenticated.However,there isroom
for exploitationinthismethodasthe IV issentin non-encryptedtextoverthe airinterface andcan
be repeatedwhenmultipleclientsare onthe network.Ina busyenvironment, amalicioususercan
eavesdropand quickly collectIV’sandwhenenoughhave beencollecteditbecomeseasytodecrypt
the key.
WPA Encryption
Wifi protectedaccesswasratifiedin2003 by the Wifi Alliance asaresponse tothe flawsinWEP
encryption. Several enhancementsweremade includingamessage integritychecknamed‘Michael.’
The newstandard isknownas the Temporal KeyIntegrityProtocol (TKIP),whichincludes Michael,
was a significantimprovementoveralthoughthere werestillissuesasitwas basedonthe old WEP
protocol.
WPA2 Encryption
WPA2 wasintroducedin2004 due to increasingconcernsoverMichael,whichintroducedthe
securityprotocol usedbythe US government;AES.
WPS Encryption
Wifi ProtectedSetupwaslaunched in2007 and allowsuserstopressa buttonon the access point
and thento addan eight digitpinonthe clientdevice toauthenticate.The premise thatyouhave to
pressthe button on the access pointplayedabigpart in the securityof thissystem.However, a
weaknesswasdiscoveredinthe waythe accesspointexaminesthe data.The firstfourdigitsandthe
nextthree digitsof the pinare examinedseparately,withthe lastnumberof the pinbeing a
8. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
7
checksum.Whenthisisbrokendown,ittranslatesas only11,000 attemptstoguessthe correct pin
whichcan be done by computerina matter of hours. (Metageek,2012)
1.5 Wireless Network Classifications
The specificationof the networkincluding the numberof devices, the areaof coverage andthe
informationbeingtransmittedall affectthe technologiesused.The typesof networkare listedby
Jerome HenryinhisWirelessNetworks&Topologiese-bookforCisco:
WPAN:Wirelesspersonalareanetworkshave ashortrange of around 10 metresto connect
a minimumamountof deviceswithlittle power. Bluetoothisanexample.
WLAN:Wirelesslocal areanetworksextendthe connectiontoaround100 metres,can
supporta much largernumberof usersand therefore consume more power.
WMAN:Wirelessmetropolitanareanetworkscoveramuchlarger geographical area,
typicallycities.Applicationsvaryandcan include pointtopointorpointto multipointlinksto
coverthe largerdistances.Licensedfrequenciesare oftenusedtoensure the qualityof
communicationswithalowerchance of interference.
WWAN:Wirelesswide areanetworksprovide connectivityoveragreaterarea still;mobile
operatorsare good examplesof these networks thatagainuse licensedfrequenciesto
ensure a higherquality of communication.(WirelessNetworks&Topologies,2012)
2.0 Deployment Strategies
Whendeployingawirelessnetwork,there are some parameters whichmustbe established tomake
the deploymentasuccess,suchas:
Numberof devicesyouexpecttoserve simultaneously
Type of traffic
Throughputrequired
Numberof accesspointsrequired
Locationsto be covered
Thisinformationcanbe providedbystakeholdersaswell asnetworkmonitoringtoolsif awireless
networkalreadyexists,butthe firstassessmenttobe made is the coverage and capacityrequiredfor
the systemas advisedin‘The BeginnersGuide toCoverage &Capacity’byIainVipas.
2.1 Coverage
The variablestobe consideredwhendesigninganetworkforcoverage include powerlimitations,
antennagain,andthe physical environment.A manual site surveyincludingheatmap will provide
the informationtocalculate the numberof accesspointsneeded,alongwiththeirlocations, to
provide adequate coveragefor the network. Accesspointlocationsshouldbe recordedbasedona
signal level of -65dbtoallowconnectivityformobile devices.
9. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
8
2.2 Capacity
The capacity requirementof the networkishardertocalculate as an RF measurementof anaccess
pointisno longerpossiblealthoughitissometimespossible toestimateuserdense areasdepending
on the physical layoutof the building.Itisalsoworthconsideringif higherthroughputisrequired
throughoutthe networkashigherfrequencybandsmaybe utilizedwhichwill affectthe coverage of
the networkdue to the higherfrequenciesused.(The BeginnersGuide toCoverage &Capacity,
2015)
2.3 Outside Interference
Justas coverage predictionscanbe made duringa manual survey,aspectrumanalysis study should
alsobe conducted tolookforany spuriousfrequenciesinthe areathatmightaffectthe throughput
of the wirelessnetwork. If interference isfound,stepscanbe takentomitigate itseffectsuchas
movingthe affectedaccesspoint,shieldingthe device thatisbroadcastingthe interferingsignal or
removingitfromthe area. Interference canaffectboththroughputandcapacitydependingonthe
powerof the interference,the lengthof time the interferingsignal isbroadcastingandwhetherthe
interferingsignal istransmitting onaconstant frequencyorsweepingacrossarange. It is alsoworth
beingaware thatunlike Ethernetnetworks,interference canbe introducedatany time,notjustat
the installation stage.(Cisco:20Myths of Wifi Interference,2015)
2.4 Controllers
There are multiplewaysinwhichtocontrol the networkonce ithas beendeployed.Traditionally,
access pointswere all hardwiredbackto the WLAN controller whichcentrallymanagedsystem
configurationandmobilitymanagementprotocols;however,thiscreatesasingle pointof failure and
increasesinstallationcostsasa cable infrastructure isrequiredaswell asthe costof the controller,
managementserver, andsoftware licenses.
Developmentsincloud-basedarchitecturehave removedthe needforall hardware except
the access pointswithall control,configurationandmobilizationdeliveredasa service bya cloud
basedcontrollerhostedinadata center.Asthe controllerisnow deliveredas aservice,the expense
isleveragedoverthousandsof deploymentswithaccessavailable throughawebbrowsermeaning
quickerdeploymentandease of operation. A recentIndySogi publicationexplainsthatthisalso
reducesanybottleneckthatcouldoccuras controllershave afinite capacitywhichwhenreached
can increase latencyandcause packetsto be dropped.(TraditionalWirelessvsCloudWireless
Solutions,2015)
2.5 MeshNetworks
The publication‘WirelessMeshNetworking’explainshow wirelessmeshnetworksare createdusing
a decentralizedinfrastructurethatallowsthe connectionof wirelessnodeswithoutthe connection
of a traditional wiredinfrastructure. Eachnode isa providertransmittingonlyasfaras the next,
whichcreatesa group of nodesthatcommunicate witheachother,notonlyback to a centralized
controller,removingacentral pointof failure.Thiscreatesamore stable networkasad-hocrouting
can be implementedshouldconditionschange onpartof the network. Withthe needfora wired
infrastructure reduced,the costof deploymentisalsoreducedmakingita more attractive optionfor
some organizations.However,lessinfrastructure,alsoleadstolessbandwidth,asavailable
throughputisreducedasthe numberof wirelesshopsincreases.(WirelessMeshNetworking,2004)
10. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
9
3.0 Enterprise Networks
Wirelessinternethasbecome aprerequisiteforbusinessesacrossa varietyof industrieswhich
require abetterperforming,more reliable wirelessconnection. The abilitytoimplementascalable
solutionthatiscentrallymanaged,while reducingcostandincreasingmobility,isanattractive
propositionformanybusinesseswitheachhavingdifferentneedsandusesforthe network.
3.1 Hospitality
Internetaccesshasbecome a standardtechnologyforthe hospitalityindustry overthe lastfew
years.KimReadydescribeshowbusinessowners now realizethe importance of allowingcustomers
access to the internetusingtheirsmartphones,tabletsandlaptops. Servicescanbe offeredona
tieredsystemallowingrestrictednetworkaccessforfree withthe optiontoupgrade toa premium
connectionfora fee.
Informationgatheredthroughtrackingsoftwarecanprovide useful analyticswhichcanbe
usedto profile usersandenhance businessmarketing.Retailerscanalsoutilize the wirelessnetwork
to processcard paymentsfromhandheldterminalsalthoughthe system will needtobe PCI
complianttoensure customerdataissecure. (How Wifi Transformedthe HospitalityIndustry,2016)
3.2 Education
Technological progressisallowingthe educationsector toenable studentstobringtheir device to
facilitate collaboration,increaseproductivityandreceive personalizedtutoring.Studentscanuse
theirdevicestopre-recordlectures,take notes andconductresearchtocreate an immediate
learningenvironmentwhile atthe same time havingapositive ecological effectbysavingthe
amountof waste paperproduced.Staff canalsotake advantage of a high-qualitywirelessnetwork
by usingitto distribute learningmaterialstostudents,aswellasconductstaff meetingsandother
administrativeduties. The Centre forDigital Educationwrote awhite paperadvisingthat IT
administrators,inparticular,wouldplayadifferentrole whenlookingafterawireless systemrather
as insteadof manuallylookingafterthe network,userconfigurationwouldbe muchmore prevalent
and couldinclude:
Manage userdevice identitiesandauthorizations
Resource restrictionforunwantedsites,in particular, socialmedia
Sendingcontenttospecificusers
Sendingcontenttousersina specificarea
AdministerspecificnetworksremotelysuchasVLAN configuration
Tailorresource usage to certaintimesof the dayor specificusers
Authorizingandblockingsanctioned/unsanctioneddevices
Thiscan be achievedbyutilizingmobiledevice managementsoftware acrossthe whole wireless
networksoevengeographicallydispersedcampusescanbe controlledcentrallyusinglongrange
wirelessbridgesandwireless mesh/e-meshconfigurations.(Centre forDigital EducationWhite
Paper,2013)
11. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
10
3.3 Retail
In 2016, Arqivaconducteda studywhichfound customersare usingmobile devices asasecond
shoppingcompanion, notonlyasa wayto buy,but to researchproducts,geta secondopinionand
share experiences.The implicationsforretailersare that shoppersare more likelytodwell longer,
spendmore,recommendyourbrandandhave an overall betterexperience if theycangetonline
while inyourstore.Thisisnot justlimitedtoyoungerpeople either;almostathirdof customers
olderthan61 years oldare goingonline tohelp theirbuyingdecisionsofflinebycheckingpricesand
readinghonestproductreviewsfromimpartial sources. Totake advantage of thiscaptive audience,
retailersare usingtargetedmarketing,datacollectionandrunningloyaltyappstoimprove the
customers overall retail experience.(Arqiva:Retail Perspective,2016)
3.4 Healthcare
Wirelessnetworksare alreadydeployedthroughoutmanyhealthcare establishmentstohelp
facilitate the everydayworkingsof missioncritical applicationssuchas medical records,real-time
access to x-raysandMRI Scans. Protectingthisvaluable patientinformationisessential forhospital
administrators assecurity mustbe implementedusinghigh encryptionandextralayersof
authenticationtopreventunauthorizedaccess. Mobilityshouldalsobe consideredinthisinstance
so that clinical andbusinessapplicationdataisalwaysavailabletostaff whichcanbe achievedby
adheringtobestpracticesindesign,installation,andconfiguration.(Wifi Alliance:DiscoverWifi –
Healthcare,2016)
3.5 Transportation
Transport hubscan be a place where alot of devicesaccumulate wantingaccesstothe internetas
passengerswaitfortrains,buses,andaeroplanes.Passengerscanchecktimetables,booktickets
and allowcommuterstoworkon theirjourneytoandfrom work.Fortransport companies,real time
monitoringof footfall vialocationservicescanallow staff tooptimize schedules,reduce congestion
and improve safety.(Wireless-mag.com, 2015)
3.6 Warehousing
Warehousescreate aunique environmentinwhichtodeployawirelessnetworkasthe highceilings,
and tall shelvingis constantlychangingdue tovariable stocklevelswhichcanpotentiallyinhibitthe
line of site andpropagationof the access point. Charlie Clemmeradvisesthatif the stockisto be
controlledusingaRFIDmethod,coverage reliabilityiskeytoprovide accurate recordsandthe stock
itself couldcause the problemasgoodswithahigherRF absorptionrate couldpotentiallyremain
uncheckedif the transponderisoutof range of the access point.Asa large amountof data isbeing
transferred;bandwidthrequirementswill be minimal.However,warehouseworkersrelyonspeed
to getthe jobdone whichmustalsobe consideredwhenplanninganetwork.(WirelessLAN Design
for Warehouses,2014)
12. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
11
4.0 Carrier Grade Services
Carriergrade wifi bringsbettercontrol andservice experience forusersof wirelessnetworksby
employingamore professional approachtonetwork deployment.The besteffortapproachto
wirelessnetworksissettobecome athingof the pastas highgrowthareassuch as the Internetof
Things(IoT), andsmart citieswill relyonaqualitywirelessconnection.Wifi isbecomingpartof a
strategicplatformforvendorsinthe contextof a portfolioof wirelessofferings.(Fiercewireless.com,
2015)
4.1 Wireless BroadbandAccess
Wirelessaccessisanattractive optioninareasthat do not have suitable wiredaccessinfrastructure
for consumerandbusinessmarketsaslinkscanbe deployedquicklyandata reducedcostwhen
comparedwithtraditional wiredinfrastructure. Operatingunderthe 802.16 standard, the
Worldwide InteroperabilityforMicrowave Access(WiMax) standard isdesignedtoservice
MetropolitanAreaNetworks(MAN) where largerdistanceshave tobe coveredandutilizes 2.5GHz,
3.5 GHz and 5.8 GHz frequencybands inEurope.IanPoole explainsthatthere are twoflavorsof
WiMax available,eachwithaspecificationthatsuitsadifferentapplication:
802.16d: Aimedat fixedwirelessapplicationsforlastmile deliveryasareplacementfor
cable or DSL. Providesdataratesup to 75Mbps witha cell coverage radiusof around75km.
802.16e: Aimedatthe mobile marketasan alternative tomore expensive cellularservices.
Providesdataratesup to 15 Mbps witha cell coverage radiusof 2-4 km.
To provide high-speeddatathroughput,WiMax utilizesbothOFDMand MIMO technologytoavoid
the effectsof multi-pathfade whenhigherbandwidthsare used.Asaresult,WiMax isa goodchoice
for non-lineof sightapplicationsdue tothe longersymbol periodsof the narrowerbandwidth
subcarriers.Toallowgreaterspectral efficiency, atime divisional duplex(TDD) mode isthe most
typical arrangementalongwithavarietyof modulationschemesrangingfromthe more resilient
BPSKand QPSKin the firstdata bursts,changingto16 QAMand 64QAM forlaterbursts enabling
higherdatathroughput.(Radio-electronics.com, 2015)
4.2 Cellular Offload
Mobile operatorsare increasinglyturningtowifi networksasa cost-effectivesolutiontoincreasethe
capacityof theirnetworks.Subscribersnow expecta seamlessuserexperience nomatterthe
locationandwifi networkscanhelpbyoffloadingdatatraffic awayfromthe radio accessnetwork
whichwill,inturn,reduce costsandchurn. To ensure the quality of service throughout,carrier-grade
wifi mustbe implementedtoenable operator’s full flexibilityindeployingaheterogeneousnetwork
that allowsautomaticnetworkselectionandauthentication,aswell as,interactionwiththe mobile
core networkforpolicyandbillingoperations.(Aptilo:Mobile DataOffloading,2014)
13. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
12
4.3 ManagedServices
Managed wirelessnetworksenable aremote managementandprovisioningsolutionfor
organizations withoutthe needforqualified techniciansonsite. Wirelesssolutionscanbe quickly
deployedutilizingself-optimizingaccesspointsthatscanthe area for RF interference anddetectany
rogue access pointsthatmay be attemptingtoinfiltrate the network.Userinformationcanalsobe
gatheredusinghotspotandguestpasseswhichcanbe translatedintorevenue eitherdirectly
throughchargeable access,orindirectlythroughtargetedadvertising. ArubaNetworksadvisethe
advantagestothistype of deployment are multipliedwhenmultiple sitesare involvedas
managementof multi-site,multi-vendornetworkscanall be managedviaa single,central
administrator,savingonbothmanagementandinstallationcosts.(ArubaNetworks:ManagedWifi &
MobilityServices,2012)
4.4 Stadiums & Arenas
Wirelessnetworksforsportseventsandarenasrequire ahigh-density multi-purposesolution that
can supporttrafficfroma multitude of users,eachwithdifferentnetworkdemands.Pointof sale,
ticketingandbusinessmanagementsystemsall have specificaccessandsecurityrequirements
whichmustbe cateredforwhile guestsandfans expectaflawlessuserexperience asif theywere
browsingathome. Extreme Networksadvise variousstrategiescanbe usedbyvenue owners to
monetize the network:
Encourage fansto report onsocial mediato increase brandreach
Promote loyaltyprograms, sell VIPpackagesandseatupgradestofansinside the venue
Generate advertisingrevenue viamobile appanddigital signage
Navigate fanstomerchandise andfoodstallstoincrease spendingperperson
Data in transitinspectioncan provide real-time insightintousersbrowsinghabits,movementsand
bandwidthconsumptionrelatingtoappswhichcan be translatedforfuture monetizationprojects.
Administrative usersrequire amore bespoke solutionasindividual requirementsare more
specificandpotentiallymore demandingdue tomissioncritical applications.Itisessential that
mediaandpressservicesreceiveahigh-qualitycoverage andconnectivity solutiontoallow themto
functionwithoutissuethroughoutthe eventwhetheritisvoice,dataor videotraffic.Itisimportant
that the wirelessnetworkisconfiguredcorrectlytoallow stable,secure trafficprioritizationunder
heavynetworkload.(ExtremeNetworks:HighDensityWifi Offering,2014)
4.5 Smart Cities andthe Internet of Things
Developmentsintechnologyhave broughtaboutaninflux of smartdevicesthatrequire constant
connectivitytothe internet.Buildings,lights,meters,andstreetscanall now be monitoredand
controlledremotelyfromacentral positioneitherbyothercomputersora networkadministrator.
Wifi isthe defaultmediumforthisconnectivityasitcan enable connectivityirrespective of location
or device;however,the problemsofarhas beencreatingaubiquitousstandardthatallowsthe
interoperabilityof these devices,sothere have beenanumberof developmentstotryandwork
aroundthisissue.
14. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
13
Wifi Direct
Thiscertificationsupportsatechnologythatallowsdevicestocommunicate directlywitheachother
irrespectiveof vendor.Thisgivesthe ability toshare informationquicklyandeasilywithoutthe need
for an internetconnection.Userscanview otherdevicesto requestalinkor be invitedbyother
devicesviaaWifi ProtectedSetupGroup.
Wifi Aware
Locationand proximityservicesprovide discoveryservicesforusersanddevicesinthe local area
evenwithoutacellular,GPSorwifi connection.Thisfunctionalitycanprovide valuableinformation
for retailersastheypushtoprovide customizedmarketingtodrive revenue andvalue.Social media
can alsotake advantage of thisfunctionenablingusersinthe local areato connect to eachother
directlyinsteadof viathe internet.
Wifi HaLow
Offeringlowpower,longrange connectivity,HaLow hasbeendesignedforavarietyof power
efficientdevicessuchassmart homes,connectedcars,andsmart cityenvironments.Utilizinga
lower900 MHz band,HaLow’srange isvastlyincreasedasitcan easilypenetrate wallsandother
barriers.
WiGig
Operatinginthe 60 GHz band, WiGighas beendesignedasasolutiontodelivermulti-gigabitspeeds,
lowlatencyandsecure connectivitytoallow displayextensions,wirelessdockingandultra-high
definitionstreaming.(Wifi Alliance:DiscoverWifi,2016)
LiFi
A lightbasedcommunicationstechnologywhichcanbe usedtoprovide greatercapacitytoexisting
wirelessnetworks. Modulatingthe intensityof the lightishow dataistransmittedand when
receivedbyaphoto-sensitive detector,isdemodulated backintoelectronicform.(Pure LiFi:Whatis
LiFi?2014)
15. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
14
Conclusion
Whendeployingawirelessinternetsolution,anumberof factorshave to be consideredif the result
isto be a success.Whetherthe problemislongrange connectivity,additional capacityorcomplete
coverage;the scope of the problem mustbe establishedbydiscussingrequirementswith
stakeholderstosecure clarification onthe performance requiredfromthe network. Todothis,both
a predictive andmanual site surveymustbe conducted toassessanyphysical limitationsthatmay
affectthe method of deployment.Additionally, 802.11 standardsmustalsobe chosenbasedon
stakeholderrequirementsasthiswill alsoaffect bothphysical deploymentandconfiguration aspects
of the network.Thisdoes nothave tobe a single choice;multiplestandardscanbe deployedon
differentfrequencybandsusingthe later802.11 standards whichcan provide higherdataratesand
increasedcapacityon5 GHz, alongside reliability,range andinteroperability of the 2.4GHz band.
The use of unlicensedfrequenciesenhances the riskof interference due tomultiple radios
broadcastinginthe same band; 2.4 GHz carriesa greaterriskof thisas it has beenutilizedforlonger.
However,itwill eventuallybegintohappeninthe 5 GHz band as well asthe numberof capable
devicesincreases. If highqualityandhighreliabilityare compulsoryrequirements,licensed
frequenciescouldbe abetterchoice dependingonbudget.
Organizationsthatdeployawirelesssolutioncouldsee acompleteoverhaulinthe waythey
operate as usersnolongerneedawiredconnectiontoaccessonline content.BYODschemescould
revolutionizeeducation andtrainingasuserscan have constant access to an enormousamountof
resourcesoutside the confinesof the classroomandworkinghours.Devicesthatcan now be made
handheldcanalsochange the way retailersoperate inbothwarehousingandonthe shopflooras
RFiDtechnologyallowsformore accurate stockcontrol and expresscheckoutsystemsfor
customers.Customerswillalsobegintosee amore personalized approachasretailersand
hospitality suppliersembrace bigdataanalyticstounderstandtheirmarketsbycreatinguserprofiles
basedon who and whatthey are buying. Withthese large amountsof databeingcollected,security
has become ahuge concern,as eventhe highestlevel of standardencryptioncanbe brokenina few
hoursusinga computer.
As the level of smartdeviceshasescalatedtothe pointof smartcities;new wireless
standardsare emergingtoenable awhole hostof devices toconnectviavariousprotocols.The
latestdevelopmentshave beencreated withaparticularapplicationinmindwhichisashiftfrom
previousstandardswhichconcentratedonimprovingwirelesscommunicationof devicesacrossthe
board.This increase inwirelesstechnologieshasseenamove awayfromtraditional infrastructureto
cloud-basedsolutionsandself-optimizingmeshnetworkswhichhave dramaticallyreducedthe cost
of deploymentbothregarding laborandequipment.Thisreductionincostandincrease in
functionalityiswhymanyorganizationsare seeingawirelessnetworkasavaluable assettotheir
business.
16. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
15
References
Anne Morris. (2015). More than half of operators plan to deploy carrier-grade Wi-Fi. Available:
http://www.fiercewireless.com/europe/story/report-more-half-operators-plan-deploy-carrier-grade-wi-fi/2015-10-12. Last
accessed 25/04/16
Aptilonetworks. (2014). Mobile Data Offloading. Available: http://www.aptilo.com/mobile-data-offloading/wifi-offload-
3g-4g. Last accessed 26/04/16
Arqiva. (2016). Retail Perspective. WirelessNation. 1 (1), 1-14
Aruba Networks. (2012). Managed Wifi and Mobility Services. Available:
http://www.arubanetworks.com/pdf/solutions/SB_MSP.pdf. Last accessed26/04/16
Center for Digital Education. (2013). Wireless ConnectivityinEducation. Center for Digital Education White Paper. 1 (1), 1-8
Charlie Clemmer. (2014). Hostile Environments WirelessLAN Designfor Warehouses. WirelessLan Professionals Summit
2014. 1 (1), 1-32
Cisco. (2014). 20 Myths of Wi-Fi Interference. Available:
http://www.cisco.com/c/en/us/products/collateral/wireless/spectrum-expert-wi-
fi/prod_white_paper0900aecd807395a9.html. Last accessed19/04/16
Cisco. (2014). A Comprehensive Review of 802.11 Wireless LAN Security and the Cisco Wireless Security Suite. Available:
http://www.cisco.com/c/en/us/products/collateral/wireless/aironet-1200-access-
point/prod_white_paper09186a00800b469f.html. Last accessed 16/04/16
ETHW. (2015). Wireless Lan 802.11 Wi-Fi. Available: http://ethw.org/Wireless_LAN_802.11_Wi-Fi. Last accessed16/04/16
Extreme Networks. (2014). Extreme Networks HighDensityWi-Fi Offering. Venue Grade Wifi Solution Data Sheet. 1 (1), 1-2
IainVipas. (2015). Beginners guide to coverage vs capacity for WLAN designs. Available:
http://www.digitalairwireless.com/wireless-blog/recent/beginners-guide-to-coverage-vs-capacity-for-wlan-designs.html.
Last accessed 19/04/16
Ian Poole. (2009). WiMAX IEEE 802.16 technology tutorial. Available: http://www.radio-
electronics.com/info/wireless/wimax/wimax.php. Last accessed 25/04/16
Ian Poole. (2012). IEEE 802.11 Wi-Fi Standards. Available: http://www.radio-electronics.com/info/wireless/wi-fi/ieee-802-
11-standards-tutorial.php. Last accessed12/04/16
Ian Poole. (2012). Wi-Fi / WLAN Channels, Frequencies, Bands & Bandwidths. Available: http://www.radio-
electronics.com/info/wireless/wi-fi/80211-channels-number-frequencies-bandwidth.php. Last accessed13/04/16
IndySogi. (2015). Traditional Wireless Vs. Cloud Wireless Solutions.Available: https://www.nettitude.co.uk/tradition-
wireless-vs-cloud-wireless-solutions/. Last accessed25/04/16
Intel. (2016). Different Wifi Protocols & Data Rates. Available:
http://www.intel.com/content/www/us/en/support/network-and-i-o/wireless-networking/000005725.html. Last accessed
14/04/16
Jerome Henry. (2012). Wireless Networks and Topologies. In:Cisco Press CCNA Wireless. eBook:CiscoPress. 118
Kim Reddy. (2016). How Wifi transformed the hospitality industry. Available: http://www.purdi.com/general/how-wi-fi-
transformed-the-hospitality-industry/. Last accessed 20/04/16
Margaret Rouse. (2002). Direct Sequence Spread Spectrum (DSSS).Available:
http://searchmobilecomputing.techtarget.com/answer/Direct-Sequence-Spread-Spectrum-DSSS. Last accessed13/04/16
Margaret Rouse. (2007). FrequencyHopping Spread Spectrum. Available:
http://searchnetworking.techtarget.com/definition/frequency-hopping-spread-spectrum. Last accessed13/04/16
Metageek. (2012). wirelesssecuritybasics. Available: http://blogs.metageek.net/blog/2012/12/wireless-security-basics/.
Last accessed 16/04/16
NationalInstruments. (2014). OFDM& Multi-Channel CommunicationSystems. National Instruments Measurement
Fundamentals. 1 (1), 1-8
Netgear Knowledge Base. (2016).What is the difference between 2.4 GHz and 5GHz? Available:
http://kb.netgear.com/app/answers/detail/a_id/29396/~/what-is-the-difference-between-2.4-ghz-and-5ghz%3F. Last
accessed 13/04/16
Ofcom. (2015). The UK is now a Smartphone Society. Available:http://media.ofcom.org.uk/news/2015/cmr-uk-2015/. Last
accessed 28/04/16
pureLiFi. (2014). What is Li-Fi?. Available: http://purelifi.com/what_is_li-fi/. Last accessed 28/04/16
Ruckus. (2012). Rate mywifi. Ruckus Wireless White Paper. 1 (1), 1-4
Tomas Krag andSebastian Büettrich. (2004). WirelessMeshNetworking. O'ReillyWireless Devcenter. 1 (1), 1
Wifi Alliance. (2016). Discover Wifi - Healthcare. Available: http://www.wi-fi.org/discover-wi-fi/healthcare. Last accessed
21/04/16
Wifi Alliance. (2016). Discover Wifi. Available: http://www.wi-fi.org/discover-wi-fi. Last accessed26/04/16
Wireless. (2015). Ruckus unveils enhancedlocation-based Wi-Fi services solution. Available: http://www.wireless-
mag.com/News/34107/ruckus-unveils-enhanced-location-based-wi-fi-services-solution-.aspx. Last accessed 24/04/16
17. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
16
Zen Internet. (1999). Broadband:Understanding Wireless Channels. Available:
https://support.zen.co.uk/kb/Knowledgebase/Broadband-Understanding-Wireless-Channels. Last accessed 13/04/16