Wi-Fi Has An Important Role In Wireless Networks

Great Essays
1. Introduction Today, Wi-Fi plays an important role with connecting users to the digital world. While it remains as the most popular technology for networking, it is crucial to understand the limit of certain wireless protocols and how it works in different situations. The most recent Wi-Fi protocol that this report will focus on is, 802.11ac, also known to be the next generation for wireless networks to be equipped with new technologies that could provide faster speeds, capacity, and range. The predecessor, 802.11n, wireless protocol had lower limitation of its full potential to keep the ever growing need of today’s wireless demand. 802.11n lacked the support of the increasing number of devices on the same network, as well as, supporting each device 's high usage of bandwidth. This includes, but not limited to, gaming, higher quality video streaming, more advanced client devices, data backup, and VoIP. As 802.11n was the standard wireless protocol to supporting everyday devices and applications, the ratification of 802.11ac has progressed in technology and its impact in wireless networking. Within just three years after the ratification of 802.11ac, this technology has become the new advanced Wi-Fi standard in the wireless ecosystem. Due to it being the most advanced standard available in today’s market, there is still a lack of insight on its capabilities of its rate vs range. This report will explain and evaluate how the latest advance in Wi-Fi, 802.11ac, performs in the wireless ecosystem where rate and range directly affect each other. 2. IEEE 802.11ac In essence, IEEE 802.11ac is very similar to 802.11n except it’s latest improvements in speed compared to its range. …show more content…
As quoted in ExtremeTech, “[t]he theoretical max speed of 802.11ac is eight 160 MHz 256-QAM channels, each of which are capable of 866.7 Mbps, for a total of 6,933 Mbps” in order to provide a higher transfer rate. In today’s real world environment, the true throughput capacity is limited from the client device and not the access points. Current high end products with 80 MHz, 3x3 spatial stream, and 256QAM have max data rate of 1300 Mbps and a throughput of 910 Mbps. This suggests that clients are not receiving the advertised speed by manufactures. 2.1 Compatibility Although 802.11ac has been around for three years, there are still many routers and client devices that require the use of legacy protocols, such as the 802.11b/g/n protocols. One important feature is that 802.11ac offers backward compatibility to devices that use legacy protocols. This allows the support of devices that consumers have been using for many years. 2.2 Technology While 802.11ac had a major improvement in speed performance, the Wi-Fi range did not show a substantial increase (Forbes). One breakthrough of this standard is the implementation of “beamforming”. Beamforming is a feature that converts omnidirectional signals into smart unidirectional signals that increases signal strength specifically in the direction of the client. With this feature the performance of 802.11ac is maintained better at longer ranges than previous standards. 3. Rate versus Range To prove that there is a direct correlation between the rate and range within 802.11ac, we must further understand and evaluate the impact of throughput based on the signal strength. For this test, we used Megabits Per Second (Mbps) as the measurement of rate to demonstrate the speed at which data is transferred between devices. Using this uniformed measurement provides an easier way to visualize the performance of the signal. The RSSI, or the “Received Signal Strength Indicator”, is the common logical measurement to determine the range of the signal level from the access point. While the physical distance of the client from the access point can play a role in determining the signal strength, in reality, the RSSI provides an accurate measurement of the signal strength. 3.1 Assumptions Based on the research conducted, our logical hypothesis is that the 802.11ac RSSI signal strength will directly affect the rate performance. Another assumption is that the signal strength will maintain higher throughput rate at lower signal strength with a sudden drop near the maximum received signal; due to the implementation of “Beamforming”, this feature can change the focus of the power to the direction of the client. The chart in appendix A shows that our assumption

Related Documents

  • Improved Essays

    As such it will provide a 60 GHz installment in the successful 802.11 / Wi-Fi family. The key advantage of IEEE 802.11ad over the other standardization activities in the 60 GHz arena is that it builds on the already existing strong market presence of Wi-Fi in the 2.4/5 GHz bands. The 802.11ad task group also initially developed a functional requirements document , evaluation methodology document , and channel model document .…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 1 Assignment 1

    • 1566 Words
    • 7 Pages

    A captive portal forces a device connecting to the wireless network to display a specific web page, before allowing access to the Internet [57]. This web page should be customized to show company information, and require guests to accept a user agreement before being permitted access to the Internet through company resources. In addition, the captive portal will direct the guest to get the current Wi-Fi password from the company receptionist. The Cisco 500 Series Wireless Access Point comes with a built-in, customizable captive portal…

    • 1566 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    Nt1330 Unit 3 Assignment 1

    • 1461 Words
    • 6 Pages

    These wireless access points also come with the newest 802.11ac technology. They are also equipped with dual bank 2.4 and 5 GHz for better bandwidth…

    • 1461 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Attackers exploiting default configurations to gain access to the network and to information stored on devices in the network are major threat to home gateway devices. In order to mitigate this threat there are many common default configurations a user should change. When setting up a home network, a user should make sure to change the default passwords. They should set up a strong account password and wifi password using best practices. The user should use a strong security protocol such as WPA2 instead of the default WEP which is not secure.…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    3.2 Simulator Various methods available to measure the performance of data communication protocols involving live network tests, hardware emulation, test-beds and mathematical models. Software simulation, since, is usually a time effective and cost efficient method. Researchers around the globe are utilizing software simulation tools because it offers a controlled atmosphere within which any network model performance can be measured easily and efficiently. Nowadays, the popularity of the available network simulators and specifically that of Ad Hoc networks varies from one simulator to another.…

    • 1180 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 6 Essay

    • 565 Words
    • 3 Pages

    802.11a – This was one of the first wireless standards. It operates in the 5GHz radio band and can achieve a maximum of 54Mbps. 802.11b – This was the more preferred choice because of the lower price and higher range.…

    • 565 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    2.4GHz - 2.485GHz • Secondary network range- 433.4MHz - 473MHz Step6: Setting time for node movement to move and setting the destination Step7 : Traffic is created for 30 nodes Step8: Probability distribution algorithm is applied Step9: When traffic is considered the starting time and ending time of the traffic is considered. Step10: If the starting time of the transmission in the source is less than the…

    • 306 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    The issues and possible risks in using wireless communication. There are few security risks occurring in mobile and wireless user: A. Intrusion - networks are more open to intruder access unless protective measures (such as passwords, encryption and identifier disabling) are adopted and this may result in a greater susceptibility to theft or misuse of information contained on networks, unauthorized destruction or modification of data, and abuse of network capacity B. Leeching - bandwidth can be used by intruders at the expense of legitimate businesses and users C. Exploitation - network access can be misused to launch denial of service (DoS) attacks against third parties, transmit illicit material such as child pornography, or engage in other criminal activities. [10] 5. Conclusion: The report introduced three wireless generations which have been using for the last few decades.…

    • 1458 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    User connectivity will be controlled and authenticated through active directory. User devices will require and object to be created in active directory which will be used to authenticate the device using 802.1x. When a user device is connected to the network it will initially communicate on a VLAN will only be allowed to communicate with active directory. Then once the device has been authenticated it will place the device on the appropriate VLAN that it will operate on. Any device that has not been set up in Active Directory will be placed into a null VLAN which will not grant access to the network.…

    • 707 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 2 Case Study

    • 177 Words
    • 1 Pages

    The first challenge that comes to mind for small offices or home offices is the IT department’s responsibility of keeping the data secure. Especially when an employee is logging into the network from home. The company would have to have a firm work-from-home policy in order to protect the company’s data. Another challenge would be where to place the access points in a small building. The configuration of the AP would be an important factor in placement for a small building or home to make sure there are no dead spots.…

    • 177 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    In each scenario mentioned in previous section, we formulate network topologies as undirected graph $\mathcal{G}=(\mathcal{V},\mathcal{E})$ with $n$ nodes and $m$ edges having demand at a node $i$ in $\mathcal{V}$ given by $d_i$. Here, $\mathcal{V}$ indicates set of nodes and $\mathcal{E}$ indicates set of edges in the topology. A link would exist in the topology between node $i$ and node $j$, if they are in the communication range of each-other satisfying constraint, \begin{equation} P_i - PL_{(i,j)}\geq\delta_j; \forall (i,j)\in\mathcal{V}. \label{eqn:radio sensitivity} \end{equation} In equation~\ref{eqn:radio sensitivity}, $P_i$ is the transmit power (in dBm) at node $i$, $PL_{(i,j)}$ (in dB) is the pathloss between node $i$ and node $j$ and $\delta_j$…

    • 431 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    This project is a milestone in easing the life of the clients. This project overcomes the frustrations in waiting for one's turn in a long queue. The use of mobile phones was established and it was a whole new factor in the communications access mode. This was proved correct based on the test conducted by the researcher in the UNO-R accounting office.…

    • 598 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    This paper describes about the notion of Free Wi-Fi in New York City, which is called LinkNYC and elaborates the system in terms of its network configuration. The network diagram will be provided to illustrate the overall system. Moreover, identifying the cost associates in this project. Most important, expounding how this system could affect towards marketing for smartphone users. Introduction…

    • 1026 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Our Wi-Fi network is based on the IEEE 802.11 b/g standards, which is the most commonly used…

    • 884 Words
    • 4 Pages
    Great Essays
  • Great Essays

    Pm3110 Unit 4 Test Paper

    • 1148 Words
    • 5 Pages

    Each virtual way is dispensed an altered measure of transfer speed. Virtual ways don't powerfully change their data transfer capacities past what has been assigned. 4. What are the three layers of IEEE 802 reference models? What are their major functions?…

    • 1148 Words
    • 5 Pages
    Great Essays