SlideShare a Scribd company logo
1 of 17
7CS004 Design & Implementation of 4th Generation Networks
An investigation into wireless internet with critical analysis of its
implementation process in the real world
5380 words
David Horne
7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
1
Contents
Introduction
1.0 What is wireless internet?
1.1 IEEE Standards
1.2 Frequencybandsandchannels
1.3 Forwarderror correction
1.4 Security
1.5 Wirelessnetworkclassifications
2.0 Deployment strategies
2.1 Coverage
2.2 Capacity
2.3 Outside interference
2.4 Controllers
2.5 Mesh networks
3.0 Enterprise Networks
3.1 Hospitality
3.2 Education
3.3 Retail
3.4 Healthcare
3.5 Transportation
3.6 Warehousing
4.0 Carrier Grade Services
4.1 Wirelessbroadbandaccess
4.2 Cellularoffload
4.3 Managed services
4.4 Smart citiesand the Internetof Things
Conclusion
References
7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
2
Introduction
OFCOMreports that mobile devicesare now the mostcommon methodforaccessingthe internet
with33% of subscribers usingtheirsmartphoneas theirprimarymethodforaccessingonline
content. Wirelesssolutionsare quicklybecomingthe methodof choice forcommunicationsbetween
devicesandpeople andasa result, the popularityandfunctionalityof wirelessnetworks has
increased forbothbusinessanddomesticpurposes. The planninganddevelopmentof these systems
have become paramounttosupportthe continuedgrowthinwirelessenableddevices andthe
increasingdataratestheydemand.Many organizationsare now lookingtowirelessinternetasa
viable solutiontonotonlyimprove connectivity,butalsoasa solutiontoconnectassetsthatwere
previouslyoutof reach.
Thispaperwill look athow wirelessinternetisimplementedinthe real world includingthe
technologyused,factorsaffectingdeployment andthe standardsemployed. (OFCOM,2015)
1.0 What is wireless internet?
Wirelesscommunicationbetweendevicesisnow astandard formof transferringdataasmost
devicesnowincorporate awirelessadaptoroutof the box.Flexible networkaccessanda reduced
cost to deployinfrastructurehasincreasedthe popularityof wirelessnetworksmakingthemareal
alternative toawirednetworkforbothpermanentandtemporaryinstallations.Toensure
interoperabilitybetweendifferentvendors,variousspecificationshave beendevisedbythe IEEE
underthe 802.11 standard whichquicklybecame the de-factostandardknownaswifi. The original
standardspecified dataratesof 1 and 2 Mb/s to be transmittedusinginfra-red(IR) orthe Industrial
ScientificMedical (ISM) bandusingCSMA/CA asthe mediaaccessmethodemployed inEthernet
protocol.The problemwiththe original standardisitwasnot veryspecificwhichleadto
interoperabilityissuesbetweenvendorsandsothe followingstandardswere ratifiedasaway to not
onlyimprove performance,buttoallowcompatibilitybetweendiffering standardsand products.
1.1 IEEE Standards
The 802.11 standardsare a setof mediaaccesscontrol (MAC) and physical layer(PHY) specifications
to be workedto whenimplementingawirelessnetwork. There are multiplestandardsavailable
whichcovera varietyof aspectsincludingsecurity,qualityof service andthe wirelessstandards
themselves.AsstatedonRadio-electronics.com, these are:
 802.11a: networkbearerutilizingthe 5 GHz ISM bandwitha raw data rate upto 54 Mbps.
 802.11b: networkbearerusing the 2.4 GHz ISMband witha raw data rate up to 11 Mbps.
 802.11e: standardfor qualityof service andprioritizingtraffic.
 802.11f: standardfor traffichandover.
 802.11g: networkbearerutilizingthe 2.4 GHz ISMband witha raw data rate upto 54 Mbps.
 802.11h: standard forpowercontrol.
 802.11i: standardfor encryptionandauthentication.
 802.11j: standardfor interworking.
 802.11k: standardformeasurementreporting.
 802.11n: networkbearerutilizing2.4GHz and5 GHz ISMbandswith raw data ratesup to
600 Mbps.
 802.11s: standard formeshnetworks.
7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
3
 802.11ac: networkbeareroperatingbelow 6GHz to provide datarates at 1 Gbpsand above
for multi-stationoperationand500 Mbps for a single link.
 802.11ad: networkbearerforveryhighthroughputoperatingatupto 60 GHz.
 802.11af: wifi utilizingUHFspectrumwhite space.
 802.11ah: standardfor unlicensedspectrumbelow 1GHz to provide longrange
communicationsandsupport forthe Internetof Things. (Radio-electronics.com, 2012)
The ETHW describesthe networkbearerstandardsas the mostwell-knownof the 802.11 standards:
802.11b
Operatinginthe unlicensed2.4GHz bandwithan 83.5 MHz channel,802.11b usesthe Ethernet
protocol to achieve real worldthroughputof around5.9 Mb/s. Using the same modulationscheme
as the original standardmakes productseasytoupgrade to supportthe new standard whichleadsto
large scale commercial acceptance,particularlywhenApple launcheditsAirportproduct.
802.11a
Usingthe same core protocol of the original standard,butinthe 5 GHz band,witha 52 sub-carrier
OFDMair interface toproduce a maximumraw data rate of 54 Mb/s and a realisticdatarate of 24
Mb/s. The advantage of usingthe 5 GHz bandisthat 2.4 GHz iscongestedwithmanyusersand
devices leaving5GHz relativelyinterference free. Due tothe higherfrequency,penetrationthrough
wallsislessandusershave to have an almostline of sightmeaningahighernumberof accesspoints
are requiredtogive sufficientcoverage.
802.11g
A thirdmodulationstandardwasratifiedinJune 2003 alsousingthe 2.4 GHz band withan 83.5 MHz
wide channel butintroducedreal worldthroughputof around24.7 Mb/sand backward compatibility
with802.11b as itutilizesthe same frequencies.As aresult,the majorityof dual-bandproductsthen
became tri-bandsupportinga, band g standardswhichensuredthe bestpossible throughputinany
environment.
802.11n
802.11n buildsuponpreviousstandardsbyintroducing MIMO,whichincreasesdatathroughputby
addingadditional antennasandusingspacial multiplexing.Real worlddatathroughputlevelsare 100
Mb/s minimum,andcoverage improves byexploitingspacial diversity.(ETHW,2015)
1.2 Frequency bands and channels
The most utilizedfrequencieslieinthe unlicensed2.4GHz bandas it was the firstto be usedin the
consumermarketandranges from2.4000 to 2.4835 GHz. This bandcontains fourteenchannels
spaced5 MHz apart,exceptforthe last twowhich are 12 MHz apart, with13 beingallowedforuse
across Europe as definedbyETSI.The 802.11 standardsspecifyabandwidthof 22 MHz with25 MHz
of separationmeaningthatadjacentchannelswill overlapandinterfere witheachotherunlessonly
three are used.( Radio-electronics.com,2012)
7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
4
Fig. 1
Figure 1 above showsthe three available 20MHz channelswhich coverfive channelseach. Routers
usingthe 802.11n standardwill alsoallow the selectionof a40 MHz channel whichallowshigher
data ratesto be transmittedbutcanalso increase interference.
Fig. 2
Figure 2 above showshowwiderchannelscanallow anincreaseddatarate withoutincreasinglevels
of interference. (ZenInternet,1999)
Due to highlevelsof trafficinthe 2.4 GHz band;the 5 GHz ISMband isbeingusedmore oftenwhich
allowsforhigherdatarates. Made up of four frequencybands,5.1,5.3, 5.4 and 5.8 GHz, with24
channelsavailableand20 MHz bandwidth,nochannelsoverlapallowingall tobe utilizedinasingle
wirelessnetwork. However,due tothe higherfrequency,the range of a 5 GHz signal is shorteras itis
unable topenetrate solidobjectsaswell asa lower2.4 GHz signal.Asthe propertiesof both2.4 GHz
and 5GHz complementeachother, manufacturerssuchasNetgearoftenutilize both aspartof the
same wirelessnetworkto helpspreadtrafficload.(Netgear,2016)
The original 802.11 standardspecified twodifferenttypesof spreadspectrumtransmission;
frequencyhopping(FHSS) and directsequence spreadspectrum (DHSS).
FHSS
Frequencyhopping dividesthe 2.4GHz bandintoseventy-five 1MHz channelsand utilizesthe
switchingof spectrum duringtransmission toallow datatobe transmittedacrossa widerfrequency
bandthan the initial informationsignal.The transmittermustworktogetherwiththe receiverby
sendingadata burst onthe centerfrequencyinformingthe receiverwhichfrequencyisabouttobe
utilised.The patterninwhichthe transmitterchoosesthe orderof the frequenciestohopis
controlledbyanalgorithmwhichcaneitherbe preplannedorcompletelyrandom. (Search
Networking,2002)
7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
5
DHSS
Directsequence spreadspectrum dividesthe 2.4GHz bandinto 22 MHz channelswhichoverlap and
usesa technique knownaschippingtomodulate asignal thattoleratessome signal loss.Originally
the Barker chippingcode wasused alongwithBPSKandQPSKto produce data rates of one or two
Mbps. The 802.11b standardreleasedin1999 introducedamore efficientchippingmethodcalled
complimentarycode keying(CCK) whichincreasedthe topdatarate to 11 Mbps but alsosupported
interoperabilityof DSSSradiosandadjustable datarates.(SearchNetworking,2007)
From 802.11g onwards,OFDMhasbeenintroduced whichbreaksupthe bandwidthinto seven
smallersubcarriers perchannel whichare orthogonallypolarizedwitheachotherto avoid
interference onthe overlap.The subcarriersare spacedexactlysothatthe maximumpowerof one
subcarriercoincideswith the minimumpowerof the nextwhichresultsinmaximumspectral
efficiencyandminimal interference.
Fig.3
Figure 3 above showsthe frequencydomainof anOFDMsystemwhichallowsagreaterdata
throughputdue tothe increasednumberof symbols acrossthe mostefficientuse of bandwidth.
(National Instruments,2014)
In January2014, 802.11ac was releasedwhich increaseddatathroughputonce againby utilizing256
QAMmodulationallowing24non-overlappingunlicensednational informationinfrastructure (UNII)
channelsinthe 5GHz band. There are now fourtypesof modulationusedtovarydata rates tohelp
increase efficiencyand reliabilityof communicationsinabusy RF environment. (Intel,2016)
1.3 ForwardError Correction
To helpimprove reliabilityinanoisyenvironment,forwarderrorcorrection(FEC) canbe addedto
the data streamto improve errorrecovery.FECcan be expressedasa ratioand isessentiallyatrade
-off betweenefficiencyandreliability.Asthe amountof FEC isincreased,soisthe reliability,
however,the efficiencyof the transmissionisdecreasedsoitisimportant forthe access pointto find
the correct balance basedonits ownalgorithm.Layertwoerrorsand frame corruptionare some of
the traditional indicatorsusedtosignal adownshiftinmodulationscheme,however,thisisnot
alwaysthe correct decision.The ‘Rate MyWifi’ white paperpublishedbyRuckusexplainshow
interference istransientbynature,whichcanmake it hard to predictthe bestsolutionasinsome
cases,increasingthe datarate couldworkbetteras data occupiesthe channel fora shorterperiodof
time. (Ruckus:Rate My Wifi,2012)
7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
6
1.4 Security
Ciscoexplains thatthere are twomethodsof authenticationspecifiedinthe 802.11 standards;open
and sharedkeyauthentication whichcansometimesbe accompaniedbythe Service SetIdentifier
(SSID) andMediaAccessControl (MAC) authenticationalthoughthese are notspecified,theyare
common. The SSID allowsseparationof awirelessLAN andalthoughitdoesnotprovide anysort of
data privacy,the SSIDmust be configuredcorrectlytoallow aclientaccessto the network.
Authenticationusingthe MACaddress allowsclientdevicesaccessonlyif theyare listedonalocal
listor authenticationserverandif theyare,openor sharedkeyauthenticationwouldthentake
place. (Cisco:WirelessLAN Security,2014)
OpenAuthentication
Thisallowsthe accesspointto accept anyrequestforauthenticationandisdesignedtogive quick
access to a network.Made upof the requestandthe response,openauthenticationisdesignedfor
data acquisitiondevicessuchasbarcode readerswhere onlythe SSIDisneededtogainaccess.
WEP Encryption
WiredEquivalentPrivacy(WEP) isasharedauthenticationprotocolwhich utilizesasymmetrickey
streamcipherbasedonthe RC4 algorithm. Whena clientrequestsaccesstoanaccess point,the
WEP keyisaddedto some data to create an initializationvector(IV) bythe client,the accesspoint
thendecryptsthe vector, andif the keysmatch,the clientisauthenticated.However,there isroom
for exploitationinthismethodasthe IV issentin non-encryptedtextoverthe airinterface andcan
be repeatedwhenmultipleclientsare onthe network.Ina busyenvironment, amalicioususercan
eavesdropand quickly collectIV’sandwhenenoughhave beencollecteditbecomeseasytodecrypt
the key.
WPA Encryption
Wifi protectedaccesswasratifiedin2003 by the Wifi Alliance asaresponse tothe flawsinWEP
encryption. Several enhancementsweremade includingamessage integritychecknamed‘Michael.’
The newstandard isknownas the Temporal KeyIntegrityProtocol (TKIP),whichincludes Michael,
was a significantimprovementoveralthoughthere werestillissuesasitwas basedonthe old WEP
protocol.
WPA2 Encryption
WPA2 wasintroducedin2004 due to increasingconcernsoverMichael,whichintroducedthe
securityprotocol usedbythe US government;AES.
WPS Encryption
Wifi ProtectedSetupwaslaunched in2007 and allowsuserstopressa buttonon the access point
and thento addan eight digitpinonthe clientdevice toauthenticate.The premise thatyouhave to
pressthe button on the access pointplayedabigpart in the securityof thissystem.However, a
weaknesswasdiscoveredinthe waythe accesspointexaminesthe data.The firstfourdigitsandthe
nextthree digitsof the pinare examinedseparately,withthe lastnumberof the pinbeing a
7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
7
checksum.Whenthisisbrokendown,ittranslatesas only11,000 attemptstoguessthe correct pin
whichcan be done by computerina matter of hours. (Metageek,2012)
1.5 Wireless Network Classifications
The specificationof the networkincluding the numberof devices, the areaof coverage andthe
informationbeingtransmittedall affectthe technologiesused.The typesof networkare listedby
Jerome HenryinhisWirelessNetworks&Topologiese-bookforCisco:
 WPAN:Wirelesspersonalareanetworkshave ashortrange of around 10 metresto connect
a minimumamountof deviceswithlittle power. Bluetoothisanexample.
 WLAN:Wirelesslocal areanetworksextendthe connectiontoaround100 metres,can
supporta much largernumberof usersand therefore consume more power.
 WMAN:Wirelessmetropolitanareanetworkscoveramuchlarger geographical area,
typicallycities.Applicationsvaryandcan include pointtopointorpointto multipointlinksto
coverthe largerdistances.Licensedfrequenciesare oftenusedtoensure the qualityof
communicationswithalowerchance of interference.
 WWAN:Wirelesswide areanetworksprovide connectivityoveragreaterarea still;mobile
operatorsare good examplesof these networks thatagainuse licensedfrequenciesto
ensure a higherquality of communication.(WirelessNetworks&Topologies,2012)
2.0 Deployment Strategies
Whendeployingawirelessnetwork,there are some parameters whichmustbe established tomake
the deploymentasuccess,suchas:
 Numberof devicesyouexpecttoserve simultaneously
 Type of traffic
 Throughputrequired
 Numberof accesspointsrequired
 Locationsto be covered
Thisinformationcanbe providedbystakeholdersaswell asnetworkmonitoringtoolsif awireless
networkalreadyexists,butthe firstassessmenttobe made is the coverage and capacityrequiredfor
the systemas advisedin‘The BeginnersGuide toCoverage &Capacity’byIainVipas.
2.1 Coverage
The variablestobe consideredwhendesigninganetworkforcoverage include powerlimitations,
antennagain,andthe physical environment.A manual site surveyincludingheatmap will provide
the informationtocalculate the numberof accesspointsneeded,alongwiththeirlocations, to
provide adequate coveragefor the network. Accesspointlocationsshouldbe recordedbasedona
signal level of -65dbtoallowconnectivityformobile devices.
7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
8
2.2 Capacity
The capacity requirementof the networkishardertocalculate as an RF measurementof anaccess
pointisno longerpossiblealthoughitissometimespossible toestimateuserdense areasdepending
on the physical layoutof the building.Itisalsoworthconsideringif higherthroughputisrequired
throughoutthe networkashigherfrequencybandsmaybe utilizedwhichwill affectthe coverage of
the networkdue to the higherfrequenciesused.(The BeginnersGuide toCoverage &Capacity,
2015)
2.3 Outside Interference
Justas coverage predictionscanbe made duringa manual survey,aspectrumanalysis study should
alsobe conducted tolookforany spuriousfrequenciesinthe areathatmightaffectthe throughput
of the wirelessnetwork. If interference isfound,stepscanbe takentomitigate itseffectsuchas
movingthe affectedaccesspoint,shieldingthe device thatisbroadcastingthe interferingsignal or
removingitfromthe area. Interference canaffectboththroughputandcapacitydependingonthe
powerof the interference,the lengthof time the interferingsignal isbroadcastingandwhetherthe
interferingsignal istransmitting onaconstant frequencyorsweepingacrossarange. It is alsoworth
beingaware thatunlike Ethernetnetworks,interference canbe introducedatany time,notjustat
the installation stage.(Cisco:20Myths of Wifi Interference,2015)
2.4 Controllers
There are multiplewaysinwhichtocontrol the networkonce ithas beendeployed.Traditionally,
access pointswere all hardwiredbackto the WLAN controller whichcentrallymanagedsystem
configurationandmobilitymanagementprotocols;however,thiscreatesasingle pointof failure and
increasesinstallationcostsasa cable infrastructure isrequiredaswell asthe costof the controller,
managementserver, andsoftware licenses.
Developmentsincloud-basedarchitecturehave removedthe needforall hardware except
the access pointswithall control,configurationandmobilizationdeliveredasa service bya cloud
basedcontrollerhostedinadata center.Asthe controllerisnow deliveredas aservice,the expense
isleveragedoverthousandsof deploymentswithaccessavailable throughawebbrowsermeaning
quickerdeploymentandease of operation. A recentIndySogi publicationexplainsthatthisalso
reducesanybottleneckthatcouldoccuras controllershave afinite capacitywhichwhenreached
can increase latencyandcause packetsto be dropped.(TraditionalWirelessvsCloudWireless
Solutions,2015)
2.5 MeshNetworks
The publication‘WirelessMeshNetworking’explainshow wirelessmeshnetworksare createdusing
a decentralizedinfrastructurethatallowsthe connectionof wirelessnodeswithoutthe connection
of a traditional wiredinfrastructure. Eachnode isa providertransmittingonlyasfaras the next,
whichcreatesa group of nodesthatcommunicate witheachother,notonlyback to a centralized
controller,removingacentral pointof failure.Thiscreatesamore stable networkasad-hocrouting
can be implementedshouldconditionschange onpartof the network. Withthe needfora wired
infrastructure reduced,the costof deploymentisalsoreducedmakingita more attractive optionfor
some organizations.However,lessinfrastructure,alsoleadstolessbandwidth,asavailable
throughputisreducedasthe numberof wirelesshopsincreases.(WirelessMeshNetworking,2004)
7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
9
3.0 Enterprise Networks
Wirelessinternethasbecome aprerequisiteforbusinessesacrossa varietyof industrieswhich
require abetterperforming,more reliable wirelessconnection. The abilitytoimplementascalable
solutionthatiscentrallymanaged,while reducingcostandincreasingmobility,isanattractive
propositionformanybusinesseswitheachhavingdifferentneedsandusesforthe network.
3.1 Hospitality
Internetaccesshasbecome a standardtechnologyforthe hospitalityindustry overthe lastfew
years.KimReadydescribeshowbusinessowners now realizethe importance of allowingcustomers
access to the internetusingtheirsmartphones,tabletsandlaptops. Servicescanbe offeredona
tieredsystemallowingrestrictednetworkaccessforfree withthe optiontoupgrade toa premium
connectionfora fee.
Informationgatheredthroughtrackingsoftwarecanprovide useful analyticswhichcanbe
usedto profile usersandenhance businessmarketing.Retailerscanalsoutilize the wirelessnetwork
to processcard paymentsfromhandheldterminalsalthoughthe system will needtobe PCI
complianttoensure customerdataissecure. (How Wifi Transformedthe HospitalityIndustry,2016)
3.2 Education
Technological progressisallowingthe educationsector toenable studentstobringtheir device to
facilitate collaboration,increaseproductivityandreceive personalizedtutoring.Studentscanuse
theirdevicestopre-recordlectures,take notes andconductresearchtocreate an immediate
learningenvironmentwhile atthe same time havingapositive ecological effectbysavingthe
amountof waste paperproduced.Staff canalsotake advantage of a high-qualitywirelessnetwork
by usingitto distribute learningmaterialstostudents,aswellasconductstaff meetingsandother
administrativeduties. The Centre forDigital Educationwrote awhite paperadvisingthat IT
administrators,inparticular,wouldplayadifferentrole whenlookingafterawireless systemrather
as insteadof manuallylookingafterthe network,userconfigurationwouldbe muchmore prevalent
and couldinclude:
 Manage userdevice identitiesandauthorizations
 Resource restrictionforunwantedsites,in particular, socialmedia
 Sendingcontenttospecificusers
 Sendingcontenttousersina specificarea
 AdministerspecificnetworksremotelysuchasVLAN configuration
 Tailorresource usage to certaintimesof the dayor specificusers
 Authorizingandblockingsanctioned/unsanctioneddevices
Thiscan be achievedbyutilizingmobiledevice managementsoftware acrossthe whole wireless
networksoevengeographicallydispersedcampusescanbe controlledcentrallyusinglongrange
wirelessbridgesandwireless mesh/e-meshconfigurations.(Centre forDigital EducationWhite
Paper,2013)
7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
10
3.3 Retail
In 2016, Arqivaconducteda studywhichfound customersare usingmobile devices asasecond
shoppingcompanion, notonlyasa wayto buy,but to researchproducts,geta secondopinionand
share experiences.The implicationsforretailersare that shoppersare more likelytodwell longer,
spendmore,recommendyourbrandandhave an overall betterexperience if theycangetonline
while inyourstore.Thisisnot justlimitedtoyoungerpeople either;almostathirdof customers
olderthan61 years oldare goingonline tohelp theirbuyingdecisionsofflinebycheckingpricesand
readinghonestproductreviewsfromimpartial sources. Totake advantage of thiscaptive audience,
retailersare usingtargetedmarketing,datacollectionandrunningloyaltyappstoimprove the
customers overall retail experience.(Arqiva:Retail Perspective,2016)
3.4 Healthcare
Wirelessnetworksare alreadydeployedthroughoutmanyhealthcare establishmentstohelp
facilitate the everydayworkingsof missioncritical applicationssuchas medical records,real-time
access to x-raysandMRI Scans. Protectingthisvaluable patientinformationisessential forhospital
administrators assecurity mustbe implementedusinghigh encryptionandextralayersof
authenticationtopreventunauthorizedaccess. Mobilityshouldalsobe consideredinthisinstance
so that clinical andbusinessapplicationdataisalwaysavailabletostaff whichcanbe achievedby
adheringtobestpracticesindesign,installation,andconfiguration.(Wifi Alliance:DiscoverWifi –
Healthcare,2016)
3.5 Transportation
Transport hubscan be a place where alot of devicesaccumulate wantingaccesstothe internetas
passengerswaitfortrains,buses,andaeroplanes.Passengerscanchecktimetables,booktickets
and allowcommuterstoworkon theirjourneytoandfrom work.Fortransport companies,real time
monitoringof footfall vialocationservicescanallow staff tooptimize schedules,reduce congestion
and improve safety.(Wireless-mag.com, 2015)
3.6 Warehousing
Warehousescreate aunique environmentinwhichtodeployawirelessnetworkasthe highceilings,
and tall shelvingis constantlychangingdue tovariable stocklevelswhichcanpotentiallyinhibitthe
line of site andpropagationof the access point. Charlie Clemmeradvisesthatif the stockisto be
controlledusingaRFIDmethod,coverage reliabilityiskeytoprovide accurate recordsandthe stock
itself couldcause the problemasgoodswithahigherRF absorptionrate couldpotentiallyremain
uncheckedif the transponderisoutof range of the access point.Asa large amountof data isbeing
transferred;bandwidthrequirementswill be minimal.However,warehouseworkersrelyonspeed
to getthe jobdone whichmustalsobe consideredwhenplanninganetwork.(WirelessLAN Design
for Warehouses,2014)
7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
11
4.0 Carrier Grade Services
Carriergrade wifi bringsbettercontrol andservice experience forusersof wirelessnetworksby
employingamore professional approachtonetwork deployment.The besteffortapproachto
wirelessnetworksissettobecome athingof the pastas highgrowthareassuch as the Internetof
Things(IoT), andsmart citieswill relyonaqualitywirelessconnection.Wifi isbecomingpartof a
strategicplatformforvendorsinthe contextof a portfolioof wirelessofferings.(Fiercewireless.com,
2015)
4.1 Wireless BroadbandAccess
Wirelessaccessisanattractive optioninareasthat do not have suitable wiredaccessinfrastructure
for consumerandbusinessmarketsaslinkscanbe deployedquicklyandata reducedcostwhen
comparedwithtraditional wiredinfrastructure. Operatingunderthe 802.16 standard, the
Worldwide InteroperabilityforMicrowave Access(WiMax) standard isdesignedtoservice
MetropolitanAreaNetworks(MAN) where largerdistanceshave tobe coveredandutilizes 2.5GHz,
3.5 GHz and 5.8 GHz frequencybands inEurope.IanPoole explainsthatthere are twoflavorsof
WiMax available,eachwithaspecificationthatsuitsadifferentapplication:
 802.16d: Aimedat fixedwirelessapplicationsforlastmile deliveryasareplacementfor
cable or DSL. Providesdataratesup to 75Mbps witha cell coverage radiusof around75km.
 802.16e: Aimedatthe mobile marketasan alternative tomore expensive cellularservices.
Providesdataratesup to 15 Mbps witha cell coverage radiusof 2-4 km.
To provide high-speeddatathroughput,WiMax utilizesbothOFDMand MIMO technologytoavoid
the effectsof multi-pathfade whenhigherbandwidthsare used.Asaresult,WiMax isa goodchoice
for non-lineof sightapplicationsdue tothe longersymbol periodsof the narrowerbandwidth
subcarriers.Toallowgreaterspectral efficiency, atime divisional duplex(TDD) mode isthe most
typical arrangementalongwithavarietyof modulationschemesrangingfromthe more resilient
BPSKand QPSKin the firstdata bursts,changingto16 QAMand 64QAM forlaterbursts enabling
higherdatathroughput.(Radio-electronics.com, 2015)
4.2 Cellular Offload
Mobile operatorsare increasinglyturningtowifi networksasa cost-effectivesolutiontoincreasethe
capacityof theirnetworks.Subscribersnow expecta seamlessuserexperience nomatterthe
locationandwifi networkscanhelpbyoffloadingdatatraffic awayfromthe radio accessnetwork
whichwill,inturn,reduce costsandchurn. To ensure the quality of service throughout,carrier-grade
wifi mustbe implementedtoenable operator’s full flexibilityindeployingaheterogeneousnetwork
that allowsautomaticnetworkselectionandauthentication,aswell as,interactionwiththe mobile
core networkforpolicyandbillingoperations.(Aptilo:Mobile DataOffloading,2014)
7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
12
4.3 ManagedServices
Managed wirelessnetworksenable aremote managementandprovisioningsolutionfor
organizations withoutthe needforqualified techniciansonsite. Wirelesssolutionscanbe quickly
deployedutilizingself-optimizingaccesspointsthatscanthe area for RF interference anddetectany
rogue access pointsthatmay be attemptingtoinfiltrate the network.Userinformationcanalsobe
gatheredusinghotspotandguestpasseswhichcanbe translatedintorevenue eitherdirectly
throughchargeable access,orindirectlythroughtargetedadvertising. ArubaNetworksadvisethe
advantagestothistype of deployment are multipliedwhenmultiple sitesare involvedas
managementof multi-site,multi-vendornetworkscanall be managedviaa single,central
administrator,savingonbothmanagementandinstallationcosts.(ArubaNetworks:ManagedWifi &
MobilityServices,2012)
4.4 Stadiums & Arenas
Wirelessnetworksforsportseventsandarenasrequire ahigh-density multi-purposesolution that
can supporttrafficfroma multitude of users,eachwithdifferentnetworkdemands.Pointof sale,
ticketingandbusinessmanagementsystemsall have specificaccessandsecurityrequirements
whichmustbe cateredforwhile guestsandfans expectaflawlessuserexperience asif theywere
browsingathome. Extreme Networksadvise variousstrategiescanbe usedbyvenue owners to
monetize the network:
 Encourage fansto report onsocial mediato increase brandreach
 Promote loyaltyprograms, sell VIPpackagesandseatupgradestofansinside the venue
 Generate advertisingrevenue viamobile appanddigital signage
 Navigate fanstomerchandise andfoodstallstoincrease spendingperperson
Data in transitinspectioncan provide real-time insightintousersbrowsinghabits,movementsand
bandwidthconsumptionrelatingtoappswhichcan be translatedforfuture monetizationprojects.
Administrative usersrequire amore bespoke solutionasindividual requirementsare more
specificandpotentiallymore demandingdue tomissioncritical applications.Itisessential that
mediaandpressservicesreceiveahigh-qualitycoverage andconnectivity solutiontoallow themto
functionwithoutissuethroughoutthe eventwhetheritisvoice,dataor videotraffic.Itisimportant
that the wirelessnetworkisconfiguredcorrectlytoallow stable,secure trafficprioritizationunder
heavynetworkload.(ExtremeNetworks:HighDensityWifi Offering,2014)
4.5 Smart Cities andthe Internet of Things
Developmentsintechnologyhave broughtaboutaninflux of smartdevicesthatrequire constant
connectivitytothe internet.Buildings,lights,meters,andstreetscanall now be monitoredand
controlledremotelyfromacentral positioneitherbyothercomputersora networkadministrator.
Wifi isthe defaultmediumforthisconnectivityasitcan enable connectivityirrespective of location
or device;however,the problemsofarhas beencreatingaubiquitousstandardthatallowsthe
interoperabilityof these devices,sothere have beenanumberof developmentstotryandwork
aroundthisissue.
7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
13
Wifi Direct
Thiscertificationsupportsatechnologythatallowsdevicestocommunicate directlywitheachother
irrespectiveof vendor.Thisgivesthe ability toshare informationquicklyandeasilywithoutthe need
for an internetconnection.Userscanview otherdevicesto requestalinkor be invitedbyother
devicesviaaWifi ProtectedSetupGroup.
Wifi Aware
Locationand proximityservicesprovide discoveryservicesforusersanddevicesinthe local area
evenwithoutacellular,GPSorwifi connection.Thisfunctionalitycanprovide valuableinformation
for retailersastheypushtoprovide customizedmarketingtodrive revenue andvalue.Social media
can alsotake advantage of thisfunctionenablingusersinthe local areato connect to eachother
directlyinsteadof viathe internet.
Wifi HaLow
Offeringlowpower,longrange connectivity,HaLow hasbeendesignedforavarietyof power
efficientdevicessuchassmart homes,connectedcars,andsmart cityenvironments.Utilizinga
lower900 MHz band,HaLow’srange isvastlyincreasedasitcan easilypenetrate wallsandother
barriers.
WiGig
Operatinginthe 60 GHz band, WiGighas beendesignedasasolutiontodelivermulti-gigabitspeeds,
lowlatencyandsecure connectivitytoallow displayextensions,wirelessdockingandultra-high
definitionstreaming.(Wifi Alliance:DiscoverWifi,2016)
LiFi
A lightbasedcommunicationstechnologywhichcanbe usedtoprovide greatercapacitytoexisting
wirelessnetworks. Modulatingthe intensityof the lightishow dataistransmittedand when
receivedbyaphoto-sensitive detector,isdemodulated backintoelectronicform.(Pure LiFi:Whatis
LiFi?2014)
7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
14
Conclusion
Whendeployingawirelessinternetsolution,anumberof factorshave to be consideredif the result
isto be a success.Whetherthe problemislongrange connectivity,additional capacityorcomplete
coverage;the scope of the problem mustbe establishedbydiscussingrequirementswith
stakeholderstosecure clarification onthe performance requiredfromthe network. Todothis,both
a predictive andmanual site surveymustbe conducted toassessanyphysical limitationsthatmay
affectthe method of deployment.Additionally, 802.11 standardsmustalsobe chosenbasedon
stakeholderrequirementsasthiswill alsoaffect bothphysical deploymentandconfiguration aspects
of the network.Thisdoes nothave tobe a single choice;multiplestandardscanbe deployedon
differentfrequencybandsusingthe later802.11 standards whichcan provide higherdataratesand
increasedcapacityon5 GHz, alongside reliability,range andinteroperability of the 2.4GHz band.
The use of unlicensedfrequenciesenhances the riskof interference due tomultiple radios
broadcastinginthe same band; 2.4 GHz carriesa greaterriskof thisas it has beenutilizedforlonger.
However,itwill eventuallybegintohappeninthe 5 GHz band as well asthe numberof capable
devicesincreases. If highqualityandhighreliabilityare compulsoryrequirements,licensed
frequenciescouldbe abetterchoice dependingonbudget.
Organizationsthatdeployawirelesssolutioncouldsee acompleteoverhaulinthe waythey
operate as usersnolongerneedawiredconnectiontoaccessonline content.BYODschemescould
revolutionizeeducation andtrainingasuserscan have constant access to an enormousamountof
resourcesoutside the confinesof the classroomandworkinghours.Devicesthatcan now be made
handheldcanalsochange the way retailersoperate inbothwarehousingandonthe shopflooras
RFiDtechnologyallowsformore accurate stockcontrol and expresscheckoutsystemsfor
customers.Customerswillalsobegintosee amore personalized approachasretailersand
hospitality suppliersembrace bigdataanalyticstounderstandtheirmarketsbycreatinguserprofiles
basedon who and whatthey are buying. Withthese large amountsof databeingcollected,security
has become ahuge concern,as eventhe highestlevel of standardencryptioncanbe brokenina few
hoursusinga computer.
As the level of smartdeviceshasescalatedtothe pointof smartcities;new wireless
standardsare emergingtoenable awhole hostof devices toconnectviavariousprotocols.The
latestdevelopmentshave beencreated withaparticularapplicationinmindwhichisashiftfrom
previousstandardswhichconcentratedonimprovingwirelesscommunicationof devicesacrossthe
board.This increase inwirelesstechnologieshasseenamove awayfromtraditional infrastructureto
cloud-basedsolutionsandself-optimizingmeshnetworkswhichhave dramaticallyreducedthe cost
of deploymentbothregarding laborandequipment.Thisreductionincostandincrease in
functionalityiswhymanyorganizationsare seeingawirelessnetworkasavaluable assettotheir
business.
7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
15
References
Anne Morris. (2015). More than half of operators plan to deploy carrier-grade Wi-Fi. Available:
http://www.fiercewireless.com/europe/story/report-more-half-operators-plan-deploy-carrier-grade-wi-fi/2015-10-12. Last
accessed 25/04/16
Aptilonetworks. (2014). Mobile Data Offloading. Available: http://www.aptilo.com/mobile-data-offloading/wifi-offload-
3g-4g. Last accessed 26/04/16
Arqiva. (2016). Retail Perspective. WirelessNation. 1 (1), 1-14
Aruba Networks. (2012). Managed Wifi and Mobility Services. Available:
http://www.arubanetworks.com/pdf/solutions/SB_MSP.pdf. Last accessed26/04/16
Center for Digital Education. (2013). Wireless ConnectivityinEducation. Center for Digital Education White Paper. 1 (1), 1-8
Charlie Clemmer. (2014). Hostile Environments WirelessLAN Designfor Warehouses. WirelessLan Professionals Summit
2014. 1 (1), 1-32
Cisco. (2014). 20 Myths of Wi-Fi Interference. Available:
http://www.cisco.com/c/en/us/products/collateral/wireless/spectrum-expert-wi-
fi/prod_white_paper0900aecd807395a9.html. Last accessed19/04/16
Cisco. (2014). A Comprehensive Review of 802.11 Wireless LAN Security and the Cisco Wireless Security Suite. Available:
http://www.cisco.com/c/en/us/products/collateral/wireless/aironet-1200-access-
point/prod_white_paper09186a00800b469f.html. Last accessed 16/04/16
ETHW. (2015). Wireless Lan 802.11 Wi-Fi. Available: http://ethw.org/Wireless_LAN_802.11_Wi-Fi. Last accessed16/04/16
Extreme Networks. (2014). Extreme Networks HighDensityWi-Fi Offering. Venue Grade Wifi Solution Data Sheet. 1 (1), 1-2
IainVipas. (2015). Beginners guide to coverage vs capacity for WLAN designs. Available:
http://www.digitalairwireless.com/wireless-blog/recent/beginners-guide-to-coverage-vs-capacity-for-wlan-designs.html.
Last accessed 19/04/16
Ian Poole. (2009). WiMAX IEEE 802.16 technology tutorial. Available: http://www.radio-
electronics.com/info/wireless/wimax/wimax.php. Last accessed 25/04/16
Ian Poole. (2012). IEEE 802.11 Wi-Fi Standards. Available: http://www.radio-electronics.com/info/wireless/wi-fi/ieee-802-
11-standards-tutorial.php. Last accessed12/04/16
Ian Poole. (2012). Wi-Fi / WLAN Channels, Frequencies, Bands & Bandwidths. Available: http://www.radio-
electronics.com/info/wireless/wi-fi/80211-channels-number-frequencies-bandwidth.php. Last accessed13/04/16
IndySogi. (2015). Traditional Wireless Vs. Cloud Wireless Solutions.Available: https://www.nettitude.co.uk/tradition-
wireless-vs-cloud-wireless-solutions/. Last accessed25/04/16
Intel. (2016). Different Wifi Protocols & Data Rates. Available:
http://www.intel.com/content/www/us/en/support/network-and-i-o/wireless-networking/000005725.html. Last accessed
14/04/16
Jerome Henry. (2012). Wireless Networks and Topologies. In:Cisco Press CCNA Wireless. eBook:CiscoPress. 118
Kim Reddy. (2016). How Wifi transformed the hospitality industry. Available: http://www.purdi.com/general/how-wi-fi-
transformed-the-hospitality-industry/. Last accessed 20/04/16
Margaret Rouse. (2002). Direct Sequence Spread Spectrum (DSSS).Available:
http://searchmobilecomputing.techtarget.com/answer/Direct-Sequence-Spread-Spectrum-DSSS. Last accessed13/04/16
Margaret Rouse. (2007). FrequencyHopping Spread Spectrum. Available:
http://searchnetworking.techtarget.com/definition/frequency-hopping-spread-spectrum. Last accessed13/04/16
Metageek. (2012). wirelesssecuritybasics. Available: http://blogs.metageek.net/blog/2012/12/wireless-security-basics/.
Last accessed 16/04/16
NationalInstruments. (2014). OFDM& Multi-Channel CommunicationSystems. National Instruments Measurement
Fundamentals. 1 (1), 1-8
Netgear Knowledge Base. (2016).What is the difference between 2.4 GHz and 5GHz? Available:
http://kb.netgear.com/app/answers/detail/a_id/29396/~/what-is-the-difference-between-2.4-ghz-and-5ghz%3F. Last
accessed 13/04/16
Ofcom. (2015). The UK is now a Smartphone Society. Available:http://media.ofcom.org.uk/news/2015/cmr-uk-2015/. Last
accessed 28/04/16
pureLiFi. (2014). What is Li-Fi?. Available: http://purelifi.com/what_is_li-fi/. Last accessed 28/04/16
Ruckus. (2012). Rate mywifi. Ruckus Wireless White Paper. 1 (1), 1-4
Tomas Krag andSebastian Büettrich. (2004). WirelessMeshNetworking. O'ReillyWireless Devcenter. 1 (1), 1
Wifi Alliance. (2016). Discover Wifi - Healthcare. Available: http://www.wi-fi.org/discover-wi-fi/healthcare. Last accessed
21/04/16
Wifi Alliance. (2016). Discover Wifi. Available: http://www.wi-fi.org/discover-wi-fi. Last accessed26/04/16
Wireless. (2015). Ruckus unveils enhancedlocation-based Wi-Fi services solution. Available: http://www.wireless-
mag.com/News/34107/ruckus-unveils-enhanced-location-based-wi-fi-services-solution-.aspx. Last accessed 24/04/16
7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess
in the real world – David Horne
16
Zen Internet. (1999). Broadband:Understanding Wireless Channels. Available:
https://support.zen.co.uk/kb/Knowledgebase/Broadband-Understanding-Wireless-Channels. Last accessed 13/04/16

More Related Content

What's hot

Performance analysis of IEEE 802.11ac based WLAN in wireless communication sy...
Performance analysis of IEEE 802.11ac based WLAN in wireless communication sy...Performance analysis of IEEE 802.11ac based WLAN in wireless communication sy...
Performance analysis of IEEE 802.11ac based WLAN in wireless communication sy...IJECEIAES
 
Zigbee sensor network integrated with 4 g for iot
Zigbee sensor network integrated with 4 g for iotZigbee sensor network integrated with 4 g for iot
Zigbee sensor network integrated with 4 g for ioteSAT Publishing House
 
S-87.3163_special assignment_ameeamin_200635
S-87.3163_special assignment_ameeamin_200635S-87.3163_special assignment_ameeamin_200635
S-87.3163_special assignment_ameeamin_200635Amee Amin
 
Evolution of LTE Towards B4G (2014)
Evolution of LTE Towards B4G (2014)Evolution of LTE Towards B4G (2014)
Evolution of LTE Towards B4G (2014)Jevgenij Kriv
 
Throughput improvement of ieee 802.15.4 based medical
Throughput improvement of ieee 802.15.4 based medicalThroughput improvement of ieee 802.15.4 based medical
Throughput improvement of ieee 802.15.4 based medicaliaemedu
 
Future Technology of Communication RoF (Radio over Fiber) and Fi-Wi (Fiber-Wi...
Future Technology of Communication RoF (Radio over Fiber) and Fi-Wi (Fiber-Wi...Future Technology of Communication RoF (Radio over Fiber) and Fi-Wi (Fiber-Wi...
Future Technology of Communication RoF (Radio over Fiber) and Fi-Wi (Fiber-Wi...IRJET Journal
 
IRJET - Range Enhancement of IoT Devices using LoRa
IRJET - Range Enhancement of IoT Devices using LoRaIRJET - Range Enhancement of IoT Devices using LoRa
IRJET - Range Enhancement of IoT Devices using LoRaIRJET Journal
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Wail Hassan
 
Device to Device communication
Device to Device communicationDevice to Device communication
Device to Device communicationSharu Sparky
 

What's hot (19)

Performance analysis of IEEE 802.11ac based WLAN in wireless communication sy...
Performance analysis of IEEE 802.11ac based WLAN in wireless communication sy...Performance analysis of IEEE 802.11ac based WLAN in wireless communication sy...
Performance analysis of IEEE 802.11ac based WLAN in wireless communication sy...
 
Wireless LANs and Mobile Networks
Wireless LANs and Mobile NetworksWireless LANs and Mobile Networks
Wireless LANs and Mobile Networks
 
L018218184
L018218184L018218184
L018218184
 
Zigbee based proposal
Zigbee based proposalZigbee based proposal
Zigbee based proposal
 
Darsh
DarshDarsh
Darsh
 
D017532629
D017532629D017532629
D017532629
 
Iot module2
Iot module2Iot module2
Iot module2
 
40120130405017
4012013040501740120130405017
40120130405017
 
Zigbee sensor network integrated with 4 g for iot
Zigbee sensor network integrated with 4 g for iotZigbee sensor network integrated with 4 g for iot
Zigbee sensor network integrated with 4 g for iot
 
S-87.3163_special assignment_ameeamin_200635
S-87.3163_special assignment_ameeamin_200635S-87.3163_special assignment_ameeamin_200635
S-87.3163_special assignment_ameeamin_200635
 
Loramesh
LorameshLoramesh
Loramesh
 
Evolution of LTE Towards B4G (2014)
Evolution of LTE Towards B4G (2014)Evolution of LTE Towards B4G (2014)
Evolution of LTE Towards B4G (2014)
 
Throughput improvement of ieee 802.15.4 based medical
Throughput improvement of ieee 802.15.4 based medicalThroughput improvement of ieee 802.15.4 based medical
Throughput improvement of ieee 802.15.4 based medical
 
Future Technology of Communication RoF (Radio over Fiber) and Fi-Wi (Fiber-Wi...
Future Technology of Communication RoF (Radio over Fiber) and Fi-Wi (Fiber-Wi...Future Technology of Communication RoF (Radio over Fiber) and Fi-Wi (Fiber-Wi...
Future Technology of Communication RoF (Radio over Fiber) and Fi-Wi (Fiber-Wi...
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 
What is WPAN?
What is WPAN?What is WPAN?
What is WPAN?
 
IRJET - Range Enhancement of IoT Devices using LoRa
IRJET - Range Enhancement of IoT Devices using LoRaIRJET - Range Enhancement of IoT Devices using LoRa
IRJET - Range Enhancement of IoT Devices using LoRa
 
Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)Module 15 (hacking wireless networks)
Module 15 (hacking wireless networks)
 
Device to Device communication
Device to Device communicationDevice to Device communication
Device to Device communication
 

Similar to An investigation into wireless internet with critical analysis of its implementation process in the real world

U.S. Wireless Overview & Outlook Presentation (V02C)
U.S. Wireless Overview & Outlook Presentation (V02C)U.S. Wireless Overview & Outlook Presentation (V02C)
U.S. Wireless Overview & Outlook Presentation (V02C)Mark Goldstein
 
Wireless Digital Subscriber Line
Wireless Digital Subscriber LineWireless Digital Subscriber Line
Wireless Digital Subscriber LineKashif Akram
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technologyNitin .
 
5G complete presentation 2016 upload
5G complete presentation 2016 upload5G complete presentation 2016 upload
5G complete presentation 2016 uploadNishanth C
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptdxmuthu
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptpmuthumca51
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityIOSR Journals
 
Mobile Networking and Ad hoc routing protocols validation
Mobile Networking and Ad hoc routing protocols validationMobile Networking and Ad hoc routing protocols validation
Mobile Networking and Ad hoc routing protocols validationIOSR Journals
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-FiBhushan Jadhav
 
Analysis of wifi and wimax and wireless network coexistence
Analysis of wifi and wimax and wireless network coexistenceAnalysis of wifi and wimax and wireless network coexistence
Analysis of wifi and wimax and wireless network coexistenceIJCNCJournal
 
Wireless network security
Wireless network security Wireless network security
Wireless network security Aurobindo Nayak
 
Scope of 5G technologies in 21st century
Scope of 5G technologies in 21st centuryScope of 5G technologies in 21st century
Scope of 5G technologies in 21st centuryanjansubbarao
 

Similar to An investigation into wireless internet with critical analysis of its implementation process in the real world (20)

02-Networks-Transction.pdf
02-Networks-Transction.pdf02-Networks-Transction.pdf
02-Networks-Transction.pdf
 
Wireless
WirelessWireless
Wireless
 
Wireless Networks-ASH-NEW
Wireless Networks-ASH-NEWWireless Networks-ASH-NEW
Wireless Networks-ASH-NEW
 
U.S. Wireless Overview & Outlook Presentation (V02C)
U.S. Wireless Overview & Outlook Presentation (V02C)U.S. Wireless Overview & Outlook Presentation (V02C)
U.S. Wireless Overview & Outlook Presentation (V02C)
 
Wireless Digital Subscriber Line
Wireless Digital Subscriber LineWireless Digital Subscriber Line
Wireless Digital Subscriber Line
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
11ac the next evolution of wi fi
11ac the next evolution of wi fi11ac the next evolution of wi fi
11ac the next evolution of wi fi
 
5G complete presentation 2016 upload
5G complete presentation 2016 upload5G complete presentation 2016 upload
5G complete presentation 2016 upload
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wimax
WimaxWimax
Wimax
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 
Mobile Networking and Ad hoc routing protocols validation
Mobile Networking and Ad hoc routing protocols validationMobile Networking and Ad hoc routing protocols validation
Mobile Networking and Ad hoc routing protocols validation
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-Fi
 
Analysis of wifi and wimax and wireless network coexistence
Analysis of wifi and wimax and wireless network coexistenceAnalysis of wifi and wimax and wireless network coexistence
Analysis of wifi and wimax and wireless network coexistence
 
Seminar presentation on 5G
Seminar presentation on 5GSeminar presentation on 5G
Seminar presentation on 5G
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
Download It
Download ItDownload It
Download It
 
Scope of 5G technologies in 21st century
Scope of 5G technologies in 21st centuryScope of 5G technologies in 21st century
Scope of 5G technologies in 21st century
 
Amar ppt
Amar pptAmar ppt
Amar ppt
 

Recently uploaded

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 

Recently uploaded (20)

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 

An investigation into wireless internet with critical analysis of its implementation process in the real world

  • 1. 7CS004 Design & Implementation of 4th Generation Networks An investigation into wireless internet with critical analysis of its implementation process in the real world 5380 words David Horne
  • 2. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess in the real world – David Horne 1 Contents Introduction 1.0 What is wireless internet? 1.1 IEEE Standards 1.2 Frequencybandsandchannels 1.3 Forwarderror correction 1.4 Security 1.5 Wirelessnetworkclassifications 2.0 Deployment strategies 2.1 Coverage 2.2 Capacity 2.3 Outside interference 2.4 Controllers 2.5 Mesh networks 3.0 Enterprise Networks 3.1 Hospitality 3.2 Education 3.3 Retail 3.4 Healthcare 3.5 Transportation 3.6 Warehousing 4.0 Carrier Grade Services 4.1 Wirelessbroadbandaccess 4.2 Cellularoffload 4.3 Managed services 4.4 Smart citiesand the Internetof Things Conclusion References
  • 3. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess in the real world – David Horne 2 Introduction OFCOMreports that mobile devicesare now the mostcommon methodforaccessingthe internet with33% of subscribers usingtheirsmartphoneas theirprimarymethodforaccessingonline content. Wirelesssolutionsare quicklybecomingthe methodof choice forcommunicationsbetween devicesandpeople andasa result, the popularityandfunctionalityof wirelessnetworks has increased forbothbusinessanddomesticpurposes. The planninganddevelopmentof these systems have become paramounttosupportthe continuedgrowthinwirelessenableddevices andthe increasingdataratestheydemand.Many organizationsare now lookingtowirelessinternetasa viable solutiontonotonlyimprove connectivity,butalsoasa solutiontoconnectassetsthatwere previouslyoutof reach. Thispaperwill look athow wirelessinternetisimplementedinthe real world includingthe technologyused,factorsaffectingdeployment andthe standardsemployed. (OFCOM,2015) 1.0 What is wireless internet? Wirelesscommunicationbetweendevicesisnow astandard formof transferringdataasmost devicesnowincorporate awirelessadaptoroutof the box.Flexible networkaccessanda reduced cost to deployinfrastructurehasincreasedthe popularityof wirelessnetworksmakingthemareal alternative toawirednetworkforbothpermanentandtemporaryinstallations.Toensure interoperabilitybetweendifferentvendors,variousspecificationshave beendevisedbythe IEEE underthe 802.11 standard whichquicklybecame the de-factostandardknownaswifi. The original standardspecified dataratesof 1 and 2 Mb/s to be transmittedusinginfra-red(IR) orthe Industrial ScientificMedical (ISM) bandusingCSMA/CA asthe mediaaccessmethodemployed inEthernet protocol.The problemwiththe original standardisitwasnot veryspecificwhichleadto interoperabilityissuesbetweenvendorsandsothe followingstandardswere ratifiedasaway to not onlyimprove performance,buttoallowcompatibilitybetweendiffering standardsand products. 1.1 IEEE Standards The 802.11 standardsare a setof mediaaccesscontrol (MAC) and physical layer(PHY) specifications to be workedto whenimplementingawirelessnetwork. There are multiplestandardsavailable whichcovera varietyof aspectsincludingsecurity,qualityof service andthe wirelessstandards themselves.AsstatedonRadio-electronics.com, these are:  802.11a: networkbearerutilizingthe 5 GHz ISM bandwitha raw data rate upto 54 Mbps.  802.11b: networkbearerusing the 2.4 GHz ISMband witha raw data rate up to 11 Mbps.  802.11e: standardfor qualityof service andprioritizingtraffic.  802.11f: standardfor traffichandover.  802.11g: networkbearerutilizingthe 2.4 GHz ISMband witha raw data rate upto 54 Mbps.  802.11h: standard forpowercontrol.  802.11i: standardfor encryptionandauthentication.  802.11j: standardfor interworking.  802.11k: standardformeasurementreporting.  802.11n: networkbearerutilizing2.4GHz and5 GHz ISMbandswith raw data ratesup to 600 Mbps.  802.11s: standard formeshnetworks.
  • 4. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess in the real world – David Horne 3  802.11ac: networkbeareroperatingbelow 6GHz to provide datarates at 1 Gbpsand above for multi-stationoperationand500 Mbps for a single link.  802.11ad: networkbearerforveryhighthroughputoperatingatupto 60 GHz.  802.11af: wifi utilizingUHFspectrumwhite space.  802.11ah: standardfor unlicensedspectrumbelow 1GHz to provide longrange communicationsandsupport forthe Internetof Things. (Radio-electronics.com, 2012) The ETHW describesthe networkbearerstandardsas the mostwell-knownof the 802.11 standards: 802.11b Operatinginthe unlicensed2.4GHz bandwithan 83.5 MHz channel,802.11b usesthe Ethernet protocol to achieve real worldthroughputof around5.9 Mb/s. Using the same modulationscheme as the original standardmakes productseasytoupgrade to supportthe new standard whichleadsto large scale commercial acceptance,particularlywhenApple launcheditsAirportproduct. 802.11a Usingthe same core protocol of the original standard,butinthe 5 GHz band,witha 52 sub-carrier OFDMair interface toproduce a maximumraw data rate of 54 Mb/s and a realisticdatarate of 24 Mb/s. The advantage of usingthe 5 GHz bandisthat 2.4 GHz iscongestedwithmanyusersand devices leaving5GHz relativelyinterference free. Due tothe higherfrequency,penetrationthrough wallsislessandusershave to have an almostline of sightmeaningahighernumberof accesspoints are requiredtogive sufficientcoverage. 802.11g A thirdmodulationstandardwasratifiedinJune 2003 alsousingthe 2.4 GHz band withan 83.5 MHz wide channel butintroducedreal worldthroughputof around24.7 Mb/sand backward compatibility with802.11b as itutilizesthe same frequencies.As aresult,the majorityof dual-bandproductsthen became tri-bandsupportinga, band g standardswhichensuredthe bestpossible throughputinany environment. 802.11n 802.11n buildsuponpreviousstandardsbyintroducing MIMO,whichincreasesdatathroughputby addingadditional antennasandusingspacial multiplexing.Real worlddatathroughputlevelsare 100 Mb/s minimum,andcoverage improves byexploitingspacial diversity.(ETHW,2015) 1.2 Frequency bands and channels The most utilizedfrequencieslieinthe unlicensed2.4GHz bandas it was the firstto be usedin the consumermarketandranges from2.4000 to 2.4835 GHz. This bandcontains fourteenchannels spaced5 MHz apart,exceptforthe last twowhich are 12 MHz apart, with13 beingallowedforuse across Europe as definedbyETSI.The 802.11 standardsspecifyabandwidthof 22 MHz with25 MHz of separationmeaningthatadjacentchannelswill overlapandinterfere witheachotherunlessonly three are used.( Radio-electronics.com,2012)
  • 5. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess in the real world – David Horne 4 Fig. 1 Figure 1 above showsthe three available 20MHz channelswhich coverfive channelseach. Routers usingthe 802.11n standardwill alsoallow the selectionof a40 MHz channel whichallowshigher data ratesto be transmittedbutcanalso increase interference. Fig. 2 Figure 2 above showshowwiderchannelscanallow anincreaseddatarate withoutincreasinglevels of interference. (ZenInternet,1999) Due to highlevelsof trafficinthe 2.4 GHz band;the 5 GHz ISMband isbeingusedmore oftenwhich allowsforhigherdatarates. Made up of four frequencybands,5.1,5.3, 5.4 and 5.8 GHz, with24 channelsavailableand20 MHz bandwidth,nochannelsoverlapallowingall tobe utilizedinasingle wirelessnetwork. However,due tothe higherfrequency,the range of a 5 GHz signal is shorteras itis unable topenetrate solidobjectsaswell asa lower2.4 GHz signal.Asthe propertiesof both2.4 GHz and 5GHz complementeachother, manufacturerssuchasNetgearoftenutilize both aspartof the same wirelessnetworkto helpspreadtrafficload.(Netgear,2016) The original 802.11 standardspecified twodifferenttypesof spreadspectrumtransmission; frequencyhopping(FHSS) and directsequence spreadspectrum (DHSS). FHSS Frequencyhopping dividesthe 2.4GHz bandintoseventy-five 1MHz channelsand utilizesthe switchingof spectrum duringtransmission toallow datatobe transmittedacrossa widerfrequency bandthan the initial informationsignal.The transmittermustworktogetherwiththe receiverby sendingadata burst onthe centerfrequencyinformingthe receiverwhichfrequencyisabouttobe utilised.The patterninwhichthe transmitterchoosesthe orderof the frequenciestohopis controlledbyanalgorithmwhichcaneitherbe preplannedorcompletelyrandom. (Search Networking,2002)
  • 6. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess in the real world – David Horne 5 DHSS Directsequence spreadspectrum dividesthe 2.4GHz bandinto 22 MHz channelswhichoverlap and usesa technique knownaschippingtomodulate asignal thattoleratessome signal loss.Originally the Barker chippingcode wasused alongwithBPSKandQPSKto produce data rates of one or two Mbps. The 802.11b standardreleasedin1999 introducedamore efficientchippingmethodcalled complimentarycode keying(CCK) whichincreasedthe topdatarate to 11 Mbps but alsosupported interoperabilityof DSSSradiosandadjustable datarates.(SearchNetworking,2007) From 802.11g onwards,OFDMhasbeenintroduced whichbreaksupthe bandwidthinto seven smallersubcarriers perchannel whichare orthogonallypolarizedwitheachotherto avoid interference onthe overlap.The subcarriersare spacedexactlysothatthe maximumpowerof one subcarriercoincideswith the minimumpowerof the nextwhichresultsinmaximumspectral efficiencyandminimal interference. Fig.3 Figure 3 above showsthe frequencydomainof anOFDMsystemwhichallowsagreaterdata throughputdue tothe increasednumberof symbols acrossthe mostefficientuse of bandwidth. (National Instruments,2014) In January2014, 802.11ac was releasedwhich increaseddatathroughputonce againby utilizing256 QAMmodulationallowing24non-overlappingunlicensednational informationinfrastructure (UNII) channelsinthe 5GHz band. There are now fourtypesof modulationusedtovarydata rates tohelp increase efficiencyand reliabilityof communicationsinabusy RF environment. (Intel,2016) 1.3 ForwardError Correction To helpimprove reliabilityinanoisyenvironment,forwarderrorcorrection(FEC) canbe addedto the data streamto improve errorrecovery.FECcan be expressedasa ratioand isessentiallyatrade -off betweenefficiencyandreliability.Asthe amountof FEC isincreased,soisthe reliability, however,the efficiencyof the transmissionisdecreasedsoitisimportant forthe access pointto find the correct balance basedonits ownalgorithm.Layertwoerrorsand frame corruptionare some of the traditional indicatorsusedtosignal adownshiftinmodulationscheme,however,thisisnot alwaysthe correct decision.The ‘Rate MyWifi’ white paperpublishedbyRuckusexplainshow interference istransientbynature,whichcanmake it hard to predictthe bestsolutionasinsome cases,increasingthe datarate couldworkbetteras data occupiesthe channel fora shorterperiodof time. (Ruckus:Rate My Wifi,2012)
  • 7. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess in the real world – David Horne 6 1.4 Security Ciscoexplains thatthere are twomethodsof authenticationspecifiedinthe 802.11 standards;open and sharedkeyauthentication whichcansometimesbe accompaniedbythe Service SetIdentifier (SSID) andMediaAccessControl (MAC) authenticationalthoughthese are notspecified,theyare common. The SSID allowsseparationof awirelessLAN andalthoughitdoesnotprovide anysort of data privacy,the SSIDmust be configuredcorrectlytoallow aclientaccessto the network. Authenticationusingthe MACaddress allowsclientdevicesaccessonlyif theyare listedonalocal listor authenticationserverandif theyare,openor sharedkeyauthenticationwouldthentake place. (Cisco:WirelessLAN Security,2014) OpenAuthentication Thisallowsthe accesspointto accept anyrequestforauthenticationandisdesignedtogive quick access to a network.Made upof the requestandthe response,openauthenticationisdesignedfor data acquisitiondevicessuchasbarcode readerswhere onlythe SSIDisneededtogainaccess. WEP Encryption WiredEquivalentPrivacy(WEP) isasharedauthenticationprotocolwhich utilizesasymmetrickey streamcipherbasedonthe RC4 algorithm. Whena clientrequestsaccesstoanaccess point,the WEP keyisaddedto some data to create an initializationvector(IV) bythe client,the accesspoint thendecryptsthe vector, andif the keysmatch,the clientisauthenticated.However,there isroom for exploitationinthismethodasthe IV issentin non-encryptedtextoverthe airinterface andcan be repeatedwhenmultipleclientsare onthe network.Ina busyenvironment, amalicioususercan eavesdropand quickly collectIV’sandwhenenoughhave beencollecteditbecomeseasytodecrypt the key. WPA Encryption Wifi protectedaccesswasratifiedin2003 by the Wifi Alliance asaresponse tothe flawsinWEP encryption. Several enhancementsweremade includingamessage integritychecknamed‘Michael.’ The newstandard isknownas the Temporal KeyIntegrityProtocol (TKIP),whichincludes Michael, was a significantimprovementoveralthoughthere werestillissuesasitwas basedonthe old WEP protocol. WPA2 Encryption WPA2 wasintroducedin2004 due to increasingconcernsoverMichael,whichintroducedthe securityprotocol usedbythe US government;AES. WPS Encryption Wifi ProtectedSetupwaslaunched in2007 and allowsuserstopressa buttonon the access point and thento addan eight digitpinonthe clientdevice toauthenticate.The premise thatyouhave to pressthe button on the access pointplayedabigpart in the securityof thissystem.However, a weaknesswasdiscoveredinthe waythe accesspointexaminesthe data.The firstfourdigitsandthe nextthree digitsof the pinare examinedseparately,withthe lastnumberof the pinbeing a
  • 8. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess in the real world – David Horne 7 checksum.Whenthisisbrokendown,ittranslatesas only11,000 attemptstoguessthe correct pin whichcan be done by computerina matter of hours. (Metageek,2012) 1.5 Wireless Network Classifications The specificationof the networkincluding the numberof devices, the areaof coverage andthe informationbeingtransmittedall affectthe technologiesused.The typesof networkare listedby Jerome HenryinhisWirelessNetworks&Topologiese-bookforCisco:  WPAN:Wirelesspersonalareanetworkshave ashortrange of around 10 metresto connect a minimumamountof deviceswithlittle power. Bluetoothisanexample.  WLAN:Wirelesslocal areanetworksextendthe connectiontoaround100 metres,can supporta much largernumberof usersand therefore consume more power.  WMAN:Wirelessmetropolitanareanetworkscoveramuchlarger geographical area, typicallycities.Applicationsvaryandcan include pointtopointorpointto multipointlinksto coverthe largerdistances.Licensedfrequenciesare oftenusedtoensure the qualityof communicationswithalowerchance of interference.  WWAN:Wirelesswide areanetworksprovide connectivityoveragreaterarea still;mobile operatorsare good examplesof these networks thatagainuse licensedfrequenciesto ensure a higherquality of communication.(WirelessNetworks&Topologies,2012) 2.0 Deployment Strategies Whendeployingawirelessnetwork,there are some parameters whichmustbe established tomake the deploymentasuccess,suchas:  Numberof devicesyouexpecttoserve simultaneously  Type of traffic  Throughputrequired  Numberof accesspointsrequired  Locationsto be covered Thisinformationcanbe providedbystakeholdersaswell asnetworkmonitoringtoolsif awireless networkalreadyexists,butthe firstassessmenttobe made is the coverage and capacityrequiredfor the systemas advisedin‘The BeginnersGuide toCoverage &Capacity’byIainVipas. 2.1 Coverage The variablestobe consideredwhendesigninganetworkforcoverage include powerlimitations, antennagain,andthe physical environment.A manual site surveyincludingheatmap will provide the informationtocalculate the numberof accesspointsneeded,alongwiththeirlocations, to provide adequate coveragefor the network. Accesspointlocationsshouldbe recordedbasedona signal level of -65dbtoallowconnectivityformobile devices.
  • 9. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess in the real world – David Horne 8 2.2 Capacity The capacity requirementof the networkishardertocalculate as an RF measurementof anaccess pointisno longerpossiblealthoughitissometimespossible toestimateuserdense areasdepending on the physical layoutof the building.Itisalsoworthconsideringif higherthroughputisrequired throughoutthe networkashigherfrequencybandsmaybe utilizedwhichwill affectthe coverage of the networkdue to the higherfrequenciesused.(The BeginnersGuide toCoverage &Capacity, 2015) 2.3 Outside Interference Justas coverage predictionscanbe made duringa manual survey,aspectrumanalysis study should alsobe conducted tolookforany spuriousfrequenciesinthe areathatmightaffectthe throughput of the wirelessnetwork. If interference isfound,stepscanbe takentomitigate itseffectsuchas movingthe affectedaccesspoint,shieldingthe device thatisbroadcastingthe interferingsignal or removingitfromthe area. Interference canaffectboththroughputandcapacitydependingonthe powerof the interference,the lengthof time the interferingsignal isbroadcastingandwhetherthe interferingsignal istransmitting onaconstant frequencyorsweepingacrossarange. It is alsoworth beingaware thatunlike Ethernetnetworks,interference canbe introducedatany time,notjustat the installation stage.(Cisco:20Myths of Wifi Interference,2015) 2.4 Controllers There are multiplewaysinwhichtocontrol the networkonce ithas beendeployed.Traditionally, access pointswere all hardwiredbackto the WLAN controller whichcentrallymanagedsystem configurationandmobilitymanagementprotocols;however,thiscreatesasingle pointof failure and increasesinstallationcostsasa cable infrastructure isrequiredaswell asthe costof the controller, managementserver, andsoftware licenses. Developmentsincloud-basedarchitecturehave removedthe needforall hardware except the access pointswithall control,configurationandmobilizationdeliveredasa service bya cloud basedcontrollerhostedinadata center.Asthe controllerisnow deliveredas aservice,the expense isleveragedoverthousandsof deploymentswithaccessavailable throughawebbrowsermeaning quickerdeploymentandease of operation. A recentIndySogi publicationexplainsthatthisalso reducesanybottleneckthatcouldoccuras controllershave afinite capacitywhichwhenreached can increase latencyandcause packetsto be dropped.(TraditionalWirelessvsCloudWireless Solutions,2015) 2.5 MeshNetworks The publication‘WirelessMeshNetworking’explainshow wirelessmeshnetworksare createdusing a decentralizedinfrastructurethatallowsthe connectionof wirelessnodeswithoutthe connection of a traditional wiredinfrastructure. Eachnode isa providertransmittingonlyasfaras the next, whichcreatesa group of nodesthatcommunicate witheachother,notonlyback to a centralized controller,removingacentral pointof failure.Thiscreatesamore stable networkasad-hocrouting can be implementedshouldconditionschange onpartof the network. Withthe needfora wired infrastructure reduced,the costof deploymentisalsoreducedmakingita more attractive optionfor some organizations.However,lessinfrastructure,alsoleadstolessbandwidth,asavailable throughputisreducedasthe numberof wirelesshopsincreases.(WirelessMeshNetworking,2004)
  • 10. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess in the real world – David Horne 9 3.0 Enterprise Networks Wirelessinternethasbecome aprerequisiteforbusinessesacrossa varietyof industrieswhich require abetterperforming,more reliable wirelessconnection. The abilitytoimplementascalable solutionthatiscentrallymanaged,while reducingcostandincreasingmobility,isanattractive propositionformanybusinesseswitheachhavingdifferentneedsandusesforthe network. 3.1 Hospitality Internetaccesshasbecome a standardtechnologyforthe hospitalityindustry overthe lastfew years.KimReadydescribeshowbusinessowners now realizethe importance of allowingcustomers access to the internetusingtheirsmartphones,tabletsandlaptops. Servicescanbe offeredona tieredsystemallowingrestrictednetworkaccessforfree withthe optiontoupgrade toa premium connectionfora fee. Informationgatheredthroughtrackingsoftwarecanprovide useful analyticswhichcanbe usedto profile usersandenhance businessmarketing.Retailerscanalsoutilize the wirelessnetwork to processcard paymentsfromhandheldterminalsalthoughthe system will needtobe PCI complianttoensure customerdataissecure. (How Wifi Transformedthe HospitalityIndustry,2016) 3.2 Education Technological progressisallowingthe educationsector toenable studentstobringtheir device to facilitate collaboration,increaseproductivityandreceive personalizedtutoring.Studentscanuse theirdevicestopre-recordlectures,take notes andconductresearchtocreate an immediate learningenvironmentwhile atthe same time havingapositive ecological effectbysavingthe amountof waste paperproduced.Staff canalsotake advantage of a high-qualitywirelessnetwork by usingitto distribute learningmaterialstostudents,aswellasconductstaff meetingsandother administrativeduties. The Centre forDigital Educationwrote awhite paperadvisingthat IT administrators,inparticular,wouldplayadifferentrole whenlookingafterawireless systemrather as insteadof manuallylookingafterthe network,userconfigurationwouldbe muchmore prevalent and couldinclude:  Manage userdevice identitiesandauthorizations  Resource restrictionforunwantedsites,in particular, socialmedia  Sendingcontenttospecificusers  Sendingcontenttousersina specificarea  AdministerspecificnetworksremotelysuchasVLAN configuration  Tailorresource usage to certaintimesof the dayor specificusers  Authorizingandblockingsanctioned/unsanctioneddevices Thiscan be achievedbyutilizingmobiledevice managementsoftware acrossthe whole wireless networksoevengeographicallydispersedcampusescanbe controlledcentrallyusinglongrange wirelessbridgesandwireless mesh/e-meshconfigurations.(Centre forDigital EducationWhite Paper,2013)
  • 11. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess in the real world – David Horne 10 3.3 Retail In 2016, Arqivaconducteda studywhichfound customersare usingmobile devices asasecond shoppingcompanion, notonlyasa wayto buy,but to researchproducts,geta secondopinionand share experiences.The implicationsforretailersare that shoppersare more likelytodwell longer, spendmore,recommendyourbrandandhave an overall betterexperience if theycangetonline while inyourstore.Thisisnot justlimitedtoyoungerpeople either;almostathirdof customers olderthan61 years oldare goingonline tohelp theirbuyingdecisionsofflinebycheckingpricesand readinghonestproductreviewsfromimpartial sources. Totake advantage of thiscaptive audience, retailersare usingtargetedmarketing,datacollectionandrunningloyaltyappstoimprove the customers overall retail experience.(Arqiva:Retail Perspective,2016) 3.4 Healthcare Wirelessnetworksare alreadydeployedthroughoutmanyhealthcare establishmentstohelp facilitate the everydayworkingsof missioncritical applicationssuchas medical records,real-time access to x-raysandMRI Scans. Protectingthisvaluable patientinformationisessential forhospital administrators assecurity mustbe implementedusinghigh encryptionandextralayersof authenticationtopreventunauthorizedaccess. Mobilityshouldalsobe consideredinthisinstance so that clinical andbusinessapplicationdataisalwaysavailabletostaff whichcanbe achievedby adheringtobestpracticesindesign,installation,andconfiguration.(Wifi Alliance:DiscoverWifi – Healthcare,2016) 3.5 Transportation Transport hubscan be a place where alot of devicesaccumulate wantingaccesstothe internetas passengerswaitfortrains,buses,andaeroplanes.Passengerscanchecktimetables,booktickets and allowcommuterstoworkon theirjourneytoandfrom work.Fortransport companies,real time monitoringof footfall vialocationservicescanallow staff tooptimize schedules,reduce congestion and improve safety.(Wireless-mag.com, 2015) 3.6 Warehousing Warehousescreate aunique environmentinwhichtodeployawirelessnetworkasthe highceilings, and tall shelvingis constantlychangingdue tovariable stocklevelswhichcanpotentiallyinhibitthe line of site andpropagationof the access point. Charlie Clemmeradvisesthatif the stockisto be controlledusingaRFIDmethod,coverage reliabilityiskeytoprovide accurate recordsandthe stock itself couldcause the problemasgoodswithahigherRF absorptionrate couldpotentiallyremain uncheckedif the transponderisoutof range of the access point.Asa large amountof data isbeing transferred;bandwidthrequirementswill be minimal.However,warehouseworkersrelyonspeed to getthe jobdone whichmustalsobe consideredwhenplanninganetwork.(WirelessLAN Design for Warehouses,2014)
  • 12. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess in the real world – David Horne 11 4.0 Carrier Grade Services Carriergrade wifi bringsbettercontrol andservice experience forusersof wirelessnetworksby employingamore professional approachtonetwork deployment.The besteffortapproachto wirelessnetworksissettobecome athingof the pastas highgrowthareassuch as the Internetof Things(IoT), andsmart citieswill relyonaqualitywirelessconnection.Wifi isbecomingpartof a strategicplatformforvendorsinthe contextof a portfolioof wirelessofferings.(Fiercewireless.com, 2015) 4.1 Wireless BroadbandAccess Wirelessaccessisanattractive optioninareasthat do not have suitable wiredaccessinfrastructure for consumerandbusinessmarketsaslinkscanbe deployedquicklyandata reducedcostwhen comparedwithtraditional wiredinfrastructure. Operatingunderthe 802.16 standard, the Worldwide InteroperabilityforMicrowave Access(WiMax) standard isdesignedtoservice MetropolitanAreaNetworks(MAN) where largerdistanceshave tobe coveredandutilizes 2.5GHz, 3.5 GHz and 5.8 GHz frequencybands inEurope.IanPoole explainsthatthere are twoflavorsof WiMax available,eachwithaspecificationthatsuitsadifferentapplication:  802.16d: Aimedat fixedwirelessapplicationsforlastmile deliveryasareplacementfor cable or DSL. Providesdataratesup to 75Mbps witha cell coverage radiusof around75km.  802.16e: Aimedatthe mobile marketasan alternative tomore expensive cellularservices. Providesdataratesup to 15 Mbps witha cell coverage radiusof 2-4 km. To provide high-speeddatathroughput,WiMax utilizesbothOFDMand MIMO technologytoavoid the effectsof multi-pathfade whenhigherbandwidthsare used.Asaresult,WiMax isa goodchoice for non-lineof sightapplicationsdue tothe longersymbol periodsof the narrowerbandwidth subcarriers.Toallowgreaterspectral efficiency, atime divisional duplex(TDD) mode isthe most typical arrangementalongwithavarietyof modulationschemesrangingfromthe more resilient BPSKand QPSKin the firstdata bursts,changingto16 QAMand 64QAM forlaterbursts enabling higherdatathroughput.(Radio-electronics.com, 2015) 4.2 Cellular Offload Mobile operatorsare increasinglyturningtowifi networksasa cost-effectivesolutiontoincreasethe capacityof theirnetworks.Subscribersnow expecta seamlessuserexperience nomatterthe locationandwifi networkscanhelpbyoffloadingdatatraffic awayfromthe radio accessnetwork whichwill,inturn,reduce costsandchurn. To ensure the quality of service throughout,carrier-grade wifi mustbe implementedtoenable operator’s full flexibilityindeployingaheterogeneousnetwork that allowsautomaticnetworkselectionandauthentication,aswell as,interactionwiththe mobile core networkforpolicyandbillingoperations.(Aptilo:Mobile DataOffloading,2014)
  • 13. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess in the real world – David Horne 12 4.3 ManagedServices Managed wirelessnetworksenable aremote managementandprovisioningsolutionfor organizations withoutthe needforqualified techniciansonsite. Wirelesssolutionscanbe quickly deployedutilizingself-optimizingaccesspointsthatscanthe area for RF interference anddetectany rogue access pointsthatmay be attemptingtoinfiltrate the network.Userinformationcanalsobe gatheredusinghotspotandguestpasseswhichcanbe translatedintorevenue eitherdirectly throughchargeable access,orindirectlythroughtargetedadvertising. ArubaNetworksadvisethe advantagestothistype of deployment are multipliedwhenmultiple sitesare involvedas managementof multi-site,multi-vendornetworkscanall be managedviaa single,central administrator,savingonbothmanagementandinstallationcosts.(ArubaNetworks:ManagedWifi & MobilityServices,2012) 4.4 Stadiums & Arenas Wirelessnetworksforsportseventsandarenasrequire ahigh-density multi-purposesolution that can supporttrafficfroma multitude of users,eachwithdifferentnetworkdemands.Pointof sale, ticketingandbusinessmanagementsystemsall have specificaccessandsecurityrequirements whichmustbe cateredforwhile guestsandfans expectaflawlessuserexperience asif theywere browsingathome. Extreme Networksadvise variousstrategiescanbe usedbyvenue owners to monetize the network:  Encourage fansto report onsocial mediato increase brandreach  Promote loyaltyprograms, sell VIPpackagesandseatupgradestofansinside the venue  Generate advertisingrevenue viamobile appanddigital signage  Navigate fanstomerchandise andfoodstallstoincrease spendingperperson Data in transitinspectioncan provide real-time insightintousersbrowsinghabits,movementsand bandwidthconsumptionrelatingtoappswhichcan be translatedforfuture monetizationprojects. Administrative usersrequire amore bespoke solutionasindividual requirementsare more specificandpotentiallymore demandingdue tomissioncritical applications.Itisessential that mediaandpressservicesreceiveahigh-qualitycoverage andconnectivity solutiontoallow themto functionwithoutissuethroughoutthe eventwhetheritisvoice,dataor videotraffic.Itisimportant that the wirelessnetworkisconfiguredcorrectlytoallow stable,secure trafficprioritizationunder heavynetworkload.(ExtremeNetworks:HighDensityWifi Offering,2014) 4.5 Smart Cities andthe Internet of Things Developmentsintechnologyhave broughtaboutaninflux of smartdevicesthatrequire constant connectivitytothe internet.Buildings,lights,meters,andstreetscanall now be monitoredand controlledremotelyfromacentral positioneitherbyothercomputersora networkadministrator. Wifi isthe defaultmediumforthisconnectivityasitcan enable connectivityirrespective of location or device;however,the problemsofarhas beencreatingaubiquitousstandardthatallowsthe interoperabilityof these devices,sothere have beenanumberof developmentstotryandwork aroundthisissue.
  • 14. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess in the real world – David Horne 13 Wifi Direct Thiscertificationsupportsatechnologythatallowsdevicestocommunicate directlywitheachother irrespectiveof vendor.Thisgivesthe ability toshare informationquicklyandeasilywithoutthe need for an internetconnection.Userscanview otherdevicesto requestalinkor be invitedbyother devicesviaaWifi ProtectedSetupGroup. Wifi Aware Locationand proximityservicesprovide discoveryservicesforusersanddevicesinthe local area evenwithoutacellular,GPSorwifi connection.Thisfunctionalitycanprovide valuableinformation for retailersastheypushtoprovide customizedmarketingtodrive revenue andvalue.Social media can alsotake advantage of thisfunctionenablingusersinthe local areato connect to eachother directlyinsteadof viathe internet. Wifi HaLow Offeringlowpower,longrange connectivity,HaLow hasbeendesignedforavarietyof power efficientdevicessuchassmart homes,connectedcars,andsmart cityenvironments.Utilizinga lower900 MHz band,HaLow’srange isvastlyincreasedasitcan easilypenetrate wallsandother barriers. WiGig Operatinginthe 60 GHz band, WiGighas beendesignedasasolutiontodelivermulti-gigabitspeeds, lowlatencyandsecure connectivitytoallow displayextensions,wirelessdockingandultra-high definitionstreaming.(Wifi Alliance:DiscoverWifi,2016) LiFi A lightbasedcommunicationstechnologywhichcanbe usedtoprovide greatercapacitytoexisting wirelessnetworks. Modulatingthe intensityof the lightishow dataistransmittedand when receivedbyaphoto-sensitive detector,isdemodulated backintoelectronicform.(Pure LiFi:Whatis LiFi?2014)
  • 15. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess in the real world – David Horne 14 Conclusion Whendeployingawirelessinternetsolution,anumberof factorshave to be consideredif the result isto be a success.Whetherthe problemislongrange connectivity,additional capacityorcomplete coverage;the scope of the problem mustbe establishedbydiscussingrequirementswith stakeholderstosecure clarification onthe performance requiredfromthe network. Todothis,both a predictive andmanual site surveymustbe conducted toassessanyphysical limitationsthatmay affectthe method of deployment.Additionally, 802.11 standardsmustalsobe chosenbasedon stakeholderrequirementsasthiswill alsoaffect bothphysical deploymentandconfiguration aspects of the network.Thisdoes nothave tobe a single choice;multiplestandardscanbe deployedon differentfrequencybandsusingthe later802.11 standards whichcan provide higherdataratesand increasedcapacityon5 GHz, alongside reliability,range andinteroperability of the 2.4GHz band. The use of unlicensedfrequenciesenhances the riskof interference due tomultiple radios broadcastinginthe same band; 2.4 GHz carriesa greaterriskof thisas it has beenutilizedforlonger. However,itwill eventuallybegintohappeninthe 5 GHz band as well asthe numberof capable devicesincreases. If highqualityandhighreliabilityare compulsoryrequirements,licensed frequenciescouldbe abetterchoice dependingonbudget. Organizationsthatdeployawirelesssolutioncouldsee acompleteoverhaulinthe waythey operate as usersnolongerneedawiredconnectiontoaccessonline content.BYODschemescould revolutionizeeducation andtrainingasuserscan have constant access to an enormousamountof resourcesoutside the confinesof the classroomandworkinghours.Devicesthatcan now be made handheldcanalsochange the way retailersoperate inbothwarehousingandonthe shopflooras RFiDtechnologyallowsformore accurate stockcontrol and expresscheckoutsystemsfor customers.Customerswillalsobegintosee amore personalized approachasretailersand hospitality suppliersembrace bigdataanalyticstounderstandtheirmarketsbycreatinguserprofiles basedon who and whatthey are buying. Withthese large amountsof databeingcollected,security has become ahuge concern,as eventhe highestlevel of standardencryptioncanbe brokenina few hoursusinga computer. As the level of smartdeviceshasescalatedtothe pointof smartcities;new wireless standardsare emergingtoenable awhole hostof devices toconnectviavariousprotocols.The latestdevelopmentshave beencreated withaparticularapplicationinmindwhichisashiftfrom previousstandardswhichconcentratedonimprovingwirelesscommunicationof devicesacrossthe board.This increase inwirelesstechnologieshasseenamove awayfromtraditional infrastructureto cloud-basedsolutionsandself-optimizingmeshnetworkswhichhave dramaticallyreducedthe cost of deploymentbothregarding laborandequipment.Thisreductionincostandincrease in functionalityiswhymanyorganizationsare seeingawirelessnetworkasavaluable assettotheir business.
  • 16. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess in the real world – David Horne 15 References Anne Morris. (2015). More than half of operators plan to deploy carrier-grade Wi-Fi. Available: http://www.fiercewireless.com/europe/story/report-more-half-operators-plan-deploy-carrier-grade-wi-fi/2015-10-12. Last accessed 25/04/16 Aptilonetworks. (2014). Mobile Data Offloading. Available: http://www.aptilo.com/mobile-data-offloading/wifi-offload- 3g-4g. Last accessed 26/04/16 Arqiva. (2016). Retail Perspective. WirelessNation. 1 (1), 1-14 Aruba Networks. (2012). Managed Wifi and Mobility Services. Available: http://www.arubanetworks.com/pdf/solutions/SB_MSP.pdf. Last accessed26/04/16 Center for Digital Education. (2013). Wireless ConnectivityinEducation. Center for Digital Education White Paper. 1 (1), 1-8 Charlie Clemmer. (2014). Hostile Environments WirelessLAN Designfor Warehouses. WirelessLan Professionals Summit 2014. 1 (1), 1-32 Cisco. (2014). 20 Myths of Wi-Fi Interference. Available: http://www.cisco.com/c/en/us/products/collateral/wireless/spectrum-expert-wi- fi/prod_white_paper0900aecd807395a9.html. Last accessed19/04/16 Cisco. (2014). A Comprehensive Review of 802.11 Wireless LAN Security and the Cisco Wireless Security Suite. Available: http://www.cisco.com/c/en/us/products/collateral/wireless/aironet-1200-access- point/prod_white_paper09186a00800b469f.html. Last accessed 16/04/16 ETHW. (2015). Wireless Lan 802.11 Wi-Fi. Available: http://ethw.org/Wireless_LAN_802.11_Wi-Fi. Last accessed16/04/16 Extreme Networks. (2014). Extreme Networks HighDensityWi-Fi Offering. Venue Grade Wifi Solution Data Sheet. 1 (1), 1-2 IainVipas. (2015). Beginners guide to coverage vs capacity for WLAN designs. Available: http://www.digitalairwireless.com/wireless-blog/recent/beginners-guide-to-coverage-vs-capacity-for-wlan-designs.html. Last accessed 19/04/16 Ian Poole. (2009). WiMAX IEEE 802.16 technology tutorial. Available: http://www.radio- electronics.com/info/wireless/wimax/wimax.php. Last accessed 25/04/16 Ian Poole. (2012). IEEE 802.11 Wi-Fi Standards. Available: http://www.radio-electronics.com/info/wireless/wi-fi/ieee-802- 11-standards-tutorial.php. Last accessed12/04/16 Ian Poole. (2012). Wi-Fi / WLAN Channels, Frequencies, Bands & Bandwidths. Available: http://www.radio- electronics.com/info/wireless/wi-fi/80211-channels-number-frequencies-bandwidth.php. Last accessed13/04/16 IndySogi. (2015). Traditional Wireless Vs. Cloud Wireless Solutions.Available: https://www.nettitude.co.uk/tradition- wireless-vs-cloud-wireless-solutions/. Last accessed25/04/16 Intel. (2016). Different Wifi Protocols & Data Rates. Available: http://www.intel.com/content/www/us/en/support/network-and-i-o/wireless-networking/000005725.html. Last accessed 14/04/16 Jerome Henry. (2012). Wireless Networks and Topologies. In:Cisco Press CCNA Wireless. eBook:CiscoPress. 118 Kim Reddy. (2016). How Wifi transformed the hospitality industry. Available: http://www.purdi.com/general/how-wi-fi- transformed-the-hospitality-industry/. Last accessed 20/04/16 Margaret Rouse. (2002). Direct Sequence Spread Spectrum (DSSS).Available: http://searchmobilecomputing.techtarget.com/answer/Direct-Sequence-Spread-Spectrum-DSSS. Last accessed13/04/16 Margaret Rouse. (2007). FrequencyHopping Spread Spectrum. Available: http://searchnetworking.techtarget.com/definition/frequency-hopping-spread-spectrum. Last accessed13/04/16 Metageek. (2012). wirelesssecuritybasics. Available: http://blogs.metageek.net/blog/2012/12/wireless-security-basics/. Last accessed 16/04/16 NationalInstruments. (2014). OFDM& Multi-Channel CommunicationSystems. National Instruments Measurement Fundamentals. 1 (1), 1-8 Netgear Knowledge Base. (2016).What is the difference between 2.4 GHz and 5GHz? Available: http://kb.netgear.com/app/answers/detail/a_id/29396/~/what-is-the-difference-between-2.4-ghz-and-5ghz%3F. Last accessed 13/04/16 Ofcom. (2015). The UK is now a Smartphone Society. Available:http://media.ofcom.org.uk/news/2015/cmr-uk-2015/. Last accessed 28/04/16 pureLiFi. (2014). What is Li-Fi?. Available: http://purelifi.com/what_is_li-fi/. Last accessed 28/04/16 Ruckus. (2012). Rate mywifi. Ruckus Wireless White Paper. 1 (1), 1-4 Tomas Krag andSebastian Büettrich. (2004). WirelessMeshNetworking. O'ReillyWireless Devcenter. 1 (1), 1 Wifi Alliance. (2016). Discover Wifi - Healthcare. Available: http://www.wi-fi.org/discover-wi-fi/healthcare. Last accessed 21/04/16 Wifi Alliance. (2016). Discover Wifi. Available: http://www.wi-fi.org/discover-wi-fi. Last accessed26/04/16 Wireless. (2015). Ruckus unveils enhancedlocation-based Wi-Fi services solution. Available: http://www.wireless- mag.com/News/34107/ruckus-unveils-enhanced-location-based-wi-fi-services-solution-.aspx. Last accessed 24/04/16
  • 17. 7CS004: An investigationintowirelessinternetwithcritical analysisof its implementationprocess in the real world – David Horne 16 Zen Internet. (1999). Broadband:Understanding Wireless Channels. Available: https://support.zen.co.uk/kb/Knowledgebase/Broadband-Understanding-Wireless-Channels. Last accessed 13/04/16