Choosing a budget adapter for hacking Wi-Fi. How WiMAX works

Choosing a budget adapter for hacking Wi-Fi. How WiMAX works

07.09.2021

At the dawn of the era of the home Internet, everyone hid the arrays of wires as best he could. They were "sewn" into the plinth, fastened along the perimeter of the wall, and packed in dust bags. In computer desks, there were even special holes for pulling a network cable. But with the popularization of Wi-Fi wireless technologies, the need to "encrypt" cables has disappeared.

A relatively new technology allows you to access the network "over the air", subject to the presence of an access point - a router or other device similar in functionality. For the first time they talked about what Wi-Fi is in 1991, when the standards were just being tested, and they gained wide popularity only closer to 2010.

What is Wi-Fi?

Wi-Fi is not the Internet as such, but a modern standard for data exchange between devices equipped with special radio modules. Wi-Fi modules are installed on the lion's share of the electronics and technology produced today. So, initially only wearable computers, mobile phones and handhelds were equipped with them, but more recently, cameras, printers and even multicooker have the ability to communicate with the global network and other devices.

An access point is a mandatory attribute for accessing the network via Wi-Fi. As usual, this role is played by a router - a device that looks like a compact box with antennas and a set of standard jacks for connection wired internet... The "box" itself is connected to the Internet through a twisted pair wire, and through the antennas it "distributes" the data received from the network and transmits the data transmitted from the devices connected "over the air" to the network.

In addition to the router, you can use a laptop, mobile phone or tablet as an access point. All these devices, as well as the increasingly popular mobile routers, must be connected to the global network via a mobile connection (sim card with GPRS, 3G, 4G). The principle of receiving / transmitting data is the same as for a wired router.

What is Wi-Fi for?

The primary “household” function of wireless access is to visit sites, download files and communicate over the network without having to be tied to a specific point with wires. Every year cities are more and more "covered" with access points available to everyone, so that in the near future, if you have a device with a radio module, you can use the network in any city.

Also, radio modules can be used to organize an internal network between devices. Lenovo, for example, has already released an open access application for mobile devices that allows you to exchange any type of file between gadgets via Wi-Fi, but without the need for an Internet connection. The program creates a tunnel through which it transmits some information to the receiving side. When using the application, data exchange is ten times faster than via Bluetooth. In the same way, a smartphone can play the role of a joystick in conjunction with a game console or laptop, or take over the functions of a remote control for a Wi-Fi TV.

How do I use Wi-Fi?

To forget about the web of wires at home or in the office, you need to purchase a router. Connect the Internet access wire to the highlighted (usually yellow or white) socket and configure it according to the instructions. After that, on all devices that are equipped with a Wi-Fi module, you need to turn on the module, search for a network and connect.

Attention! The speed of Internet access through one access point is the lower, the more devices are connected to it at the same time. The speed is divided proportionally among all devices.

If your computer does not have a radio module, you can purchase one. The external radio module looks like a USB flash drive, it is also connected via a USB interface. The average cost is within $ 10.

Internet with mobile device can be "distributed" through the "Access point" option. Find an option in your phone or tablet settings and go through the network setup step by step.

Attention! When a mobile phone or tablet “distributes” the Internet, being an access point, it is better not to watch videos and listen to podcasts on it. The speed between the distributor and the connected device is divided according to the residual principle, and only if the Internet is not actively used on the "access point", the connected device can load sites at normal speed.

Wi-Fi technology allows you to enter the network without being tied to an Internet cable. Be the source wireless internet can be any device equipped with a radio module that supports the Wi-Fi data transmission standard. In this case, the signal propagation radius depends on the antenna power of the access point. Using Wi-Fi, you can not only connect to the Internet, but also transfer files and combine devices into a separate network.

Hello everyone! Let's talk again today about routers, wireless networks, technologies ...

I decided to prepare an article in which to tell about what kind of incomprehensible letters b / g / n are that can be found when setting up a Wi-Fi router, or when buying a device (Wi-Fi characteristics such as 802.11 b / g)... And what is the difference between these standards.

Now we will try to figure out what these settings are and how to change them in the router settings and, in fact, why change the operating mode of the wireless network.

Means b / g / n Is the wireless network operating mode (Mode).

There are three (main) modes of operation for Wi-Fi 802.11. This is b / g / n. What is the difference? They differ in the maximum data transfer rate (I heard that there is still a difference in the wireless coverage area, but I don't know how true this is).

Let's take a closer look:

b Is the slowest mode. Up to 11 Mbps.

g- maximum data transfer rate 54 Mbps

n- new and high-speed mode. Up to 600 Mbps

So, then we figured out the modes. But we still need to figure out why to change them and how to do it.

Why change the wireless network mode?

Everything is very simple here, let's take an example. Here we have an iPhone 3GS, it can work on the Internet via Wi-Fi only in b / g modes (if the characteristics do not lie)... That is, in a new, high-speed mode n he cannot work, he simply does not support him.

And if you have on a router, the operating mode of the wireless network will be n, without mixed, then you will not be able to connect this phone to Wi-Fi, here at least beat your head against the wall :).

But it doesn't have to be a phone, much less an iPhone. Such incompatibility with the new standard can be observed on laptops, tablets, etc.

Already several times I noticed that with a variety of problems with connecting phones or tablets to Wi-Fi, changing the Wi-Fi operating mode helps.

If you want to see what modes your device supports, then look in the specifications for it. The commonly supported modes are listed next to the “Wi-Fi 802.11” mark.

On the package (or on the internet), you can also see what modes your router can operate in.

For example, here are the supported standards that are indicated on the adapter box:

How can I change the b / g / n mode in the Wi-Fi router settings?

I will show you how to do this using the example of two routers, from ASUS and TP-Link... But if you have a different router, then look for changing the settings of the wireless network mode (Mode) on the Wi-Fi settings tab, where you set the name for the network, etc.

On a TP-Link router

We go into the settings of the router. How to enter them? I'm already tired of writing about this in almost every article :) ..

After getting into the settings, on the left go to the tab WirelessWireless Settings.

And opposite point Mode You can select the standard for the wireless network. There are many options out there. I advise you to install 11bgn mixed... This item allows you to connect devices that operate in at least one of the three modes.

But if you still have problems connecting certain devices, then try the mode 11bg mixed, or 11g only... And to achieve a good baud rate, you can set 11n only... Just see that all devices support the standard n.

Using the ASUS router as an example

Everything is the same here. Go to the settings and go to the tab "Wireless network".

Opposite point "Wireless network mode" you can choose one of the standards. Or install Mixed, or Auto (which I advise to do)... For more details on standards, see a little higher. By the way, in ASUS on the right you can see the help, where you can read useful and interesting information on these settings.

Press the button to save. "Apply".

That's all, friends. I look forward to your questions, advice and wishes in the comments. Bye everyone!

Wardriving (detecting and hacking Wi-Fi hotspots) requires special equipment. But splurging on professional devices is not at all necessary. Among the mass-produced Wi-Fi adapters, there are also suitable models. Sometimes it takes some manipulation to turn them into hacking devices. I will tell you how to choose such a device, where to buy it and what to do with it next.

External Wi-Fi adapters for wardriving


Kali Linux and 5 GHz

Wardriving at 5GHz has its own challenges. First, because of the high frequency, the signal decays faster. If an 802.11g access point, which broadcasts in 2.4 GHz mode, can be caught even a kilometer away, then five-gigahertz ones go out already in a couple of tens of meters, even when using the 802.11n standard. You will have to get closer to such a goal.

Secondly, to monitor 5 GHz access points, you will need a utility with this function. Kali Linux 2.0 has WiFite r87, which only sees 2.4GHz APs.

This problem is solved by installing WiFite 2.0.

Git clone https://github.com/derv82/wifite2.git

Cd wifite2 /

and run the script with a new command to display APs broadcasting at 5 GHz

./Wifite.py -5

If not logged in under root, then before the last command you need to add sudo.

Before scanning, it may be useful to install the updated firmware with the following command (example for Ralink chips):

# apt-get update && apt-get install firmware-ralink

For other adapters (for example, Atheros) the command is the same, only the vendor name changes.

There is a surprise in each building!

Surely you have repeatedly come across a common phrase: "A manufacturer can change the technical and consumer properties of a product without notice." In practice, this means that by purchasing the same model Wi-Fi adapter from different batches, different chips can be found inside. It's good if both of them are on the Linux compatibility list. For example, in the first series of the Tenda W322UA adapter, the RT3072 chip was installed. Now they have a newer RT5372L - the same as in Tenda W322U v3. The unification of production is obvious, but the problem is that no new designations have appeared on the device - neither version, nor revision.


The W322UA looks interesting, but the chip is in a cheaper version, and there is little use from a pair of small pin antennas. They slightly increase the data rate (by using the 2x2: 2 MIMO scheme) at the expense of signal strength. The baby consumes only 660 mW and confidently catches AP only close. The signal from routers located behind the wall will always be in the red zone with it.


For wardriving, it is better to take one more powerful antenna, but in this adapter they are not removable. I am glad that the antenna cable leads are placed separately on the board. They are far from the chip, so you won't overheat it when you solder another antenna.

Chinese watts and decibels

Signal strength is the key to successful wardriving, but sellers understand this too. Deprived of the remnants of conscience, they overestimate the characteristics of the product at times and indulge in any deception. For example, in reprints of last year's articles, it is still advised to buy a High Power SignalKing 48DBI device from the Chinese. One of my colleagues decided to check and see what this wonderful adapter has inside. The package went on for almost two months and ... it would be better if it was lost. An autopsy of the sent sample showed that the omnidirectional antennas in this adapter are a dummy, and the directional antennas are much smaller in size than you would expect, looking at the dimensions of the case. Of course, the gain of the panel antenna does not come close to the declared one. You say 48 dBi? It's not even eight. Other adapters from well-known brands show similar results - they use high quality 5–6 dBi whip antennas. And communication with them is more stable than with the self-proclaimed "King of the Signal".

Alas, this story is a rule, not an exceptional case. Most of the goods should be looked at with skepticism and not be lazy to count. For example, a USB port with a current limit of 500 mA and an operating voltage of 5 V cannot power a load that consumes more than 2.5 W. Are you offered a 9W USB adapter? Smile and look for another. With a 100,500 dBi antenna? Contact Air Defense! Someone stole the radar from them!

Buying from your local store doesn't eliminate the need to think and check. You will simply have to wait less and it will be easier to return a fake, but you will pay much more for the same thing. It is logical that ordering Chinese goods is cheaper in Chinese stores. Besides AliExpress, there are DealExtreme, FocalPrice, JD, and a host of others.

Life hack: suitable adapters are searched for in online stores by the name of the chip, as well as by the mention of Kali Linux, BackTrack, Beini and Xiaopan. It is better to filter search results not by price, but by seller rating and number of reviews. There are always hundreds of them on a popular thing, and photos and test results come across.

"Russian Post" does not give up without a fight!

Our mail likes to redirect any claims to the state of the parcels to dev / null or to customs (especially if the integrity of the package is violated). De jure, customs can inspect international parcels, but de facto they rarely exercise this right. Their flow is so large that even in a calm period at any customs office they manage to check at most every fifth shipment. If, upon receipt, you see traces of opening (for example, the package is sealed with tape), then do not believe in the history of total checks. All packages opened at customs are sealed with tape with the FCS logo, and an act is attached to the shipment. Everything else is outright theft of the delivery service employees.

Recently, Russian Post has been actively fighting this shameful phenomenon. Therefore, if you find that the package has been opened or its weight does not match the one indicated in the notification, proceed according to the following algorithm.

  1. Do not accept the package or sign the notice.
  2. Call the toll-free hotline 8-800-2005-888 and clearly state the situation. Be sure to indicate the number of the post office and the tracking number of the item.
  3. Call the postmaster or the person in charge. Yes, exactly in this sequence: a call, then the proceedings on the spot. Without a magic kick from above, it will last forever.
  4. Demand to issue a form for drawing up an act on the opening of an international item.
  5. Fill it up at a table in the field of view of a video surveillance camera (now they are in almost every department). Open the parcel there with the head of the department. If you refuse to do this, call the hotline again and tell the name of the employee who refused your legal request.
  6. If you immediately start to be rude and shout that nothing can be done, call the police squad. This is a theft, and it is usually not difficult to uncover it in hot pursuit. Why? Due to the small number of suspects and detailed documentation.

At each point of reception and transmission of parcels, their mass is checked, and all data is entered into the database. Therefore, the crime scene is obvious in the first minutes of the investigation. Usually this is the last link in the chain, that is, the very department where you came to receive your parcel. Remember that the detective who arrived at your call has much more powers (that's why he was called that, hehe) and methods of influencing the postal employees than you. It also has performance indicators. Perhaps he will even be happy that he was summoned to investigate a fresh and well-documented criminal offense (Article 158 of the Criminal Code of the Russian Federation - theft). The content of the parcel is of interest to him only in this aspect. Since in this situation you are the applicant and the injured party, you should not expect any counter-accusations. Almost all Chinese appliances can be classified as consumer electronics bought overseas for the sake of economy. Of course, if it does not shoot and does not look like an overtly spy device.

Wi-Fi is an abbreviation for a registered trademark of Wi-Fi AUiance. Wi-Fi technology was developed in 1991 by the NCR Corporation (which was then acquired by AT&T, and since 1997 has become independent again) and was originally intended for use in vending cash registers. The technology is based on the method of data transmission over a radio channel at a frequency of 2.4 GHz using signal coding with operating frequencies and special applications. Wi-Fi technology is used to organize high-speed wireless local area networks operating in the international unlicensed frequency range (ISM) 2.4 GHz and 5 GHz. The fields of application of this technology are connected with networks for accessing the Internet, wireless transmission of audio and video information, industrial telemetry, transport local wireless networks.

The following Wi-Fi standards are currently used:

  • 802.11 - 1 Mbps and 2 Mbps, 2.4 GHz;
  • 802.11a - 54 Mbps, 5 GHz;
  • 802.11b - 5.5 and 11 Mbps, 2.4 GHz;
  • 802.11g - 54 Mbps, 2.4 GHz;
  • 802.11n - 600 Mbps, 2.4-2.5 GHz, or 5 GHz.

The main advantage of Wi-Fi over other technologies (Bluetooth, ZigBee) is its high transmission speed (up to 600 Mbps). Therefore, this technology is developing so rapidly in such areas of consumer electronics as wireless Internet access, wireless television, wireless DVD-players. Wi-Fi is widely used in various wireless telemetry systems in transport. Almost all wireless video cameras and speed recorders installed on highways use Wi-Fi. Also, this technology is used to organize local networks between buildings and industrial facilities. It should be emphasized that the 5 GHz Wi-Fi range is the most preferable for the organization of industrial local area networks in the presence of high-level interference. Due to the tight connection to a specific area within which information is distributed, Wi-Fi is an ideal technology for paid Internet access in cafes, restaurants, hotels.

Wi-Fi technology was first certified twenty years ago when the International Institute of Electrical and Electronic Engineers (IEEE) formed a working group on standards for wireless LAN 802.11. Last year (09/20/2010) the 802.11 working group celebrated the 20th anniversary of the standard. In 1999, the independent international organization Wireless Ethernet Compatibility Alliance (WECA) was created, which included the world's leading manufacturers of equipment for wireless communications. Currently, WECA members are about 100 companies, including Cisco, Alcatel-Lucent, 3Com, IBM, Intel, Apple, Compaq, Dell, Fujitsu, Siemens, Sony, AMD, etc. Experts of this organization are testing various Fi-Wi- devices and guarantee their compatibility with equipment manufactured by other companies - members of the alliance.

802.11 standard - first edition

In 1997, the first Wi-Fi specification, 802.11, was adopted. The 802.11 standard regulates the operation of equipment at a central frequency of 2.4 GHz with a maximum speed of up to 2 Mbps. The base 802.11 standard uses Frequency Hopping Spread Spectrum (FHSS). Optionally, the Direct Sequence Spread Spectrum (DSSS) method can also be used.

Gaussian Frequency Shift Keying technology is used to modulate the signal. As a rule, when the FHSS method is involved, the band is divided into 79 channels of 1 MHz (although there is equipment with a different method of splitting the frequency range). The sender and receiver agree on a channel hopping scheme, and data is sent sequentially on different channels using the selected scheme.

It should be emphasized that the 802.11ххх standards regulate the architecture of the network and the devices themselves, describe the main seven levels of the model and the protocols for their interaction. The standard specifies the base frequency, as well as modulation and spectrum spreading methods on physical level... For example, the 802.11 standard specifies a center frequency of 2.4 GHz and a modulation method FHSS PHY. In addition, the original 802.11 standard described infrared data transmission. The frequency band and sub-frequencies for 802.11 devices are allocated and regulated in each specific country by an authorized government agency. Also, local legislation regulates the rules for operating the devices themselves, their power, frequency division, transmitter power and other characteristic features. In our country, such a body is the Ministry of Communications and Mass Media of the Russian Federation. The latest regulatory document of this ministry states that the operation of all variants of 802.11 (a, b, g, n) standards at all base frequencies is allowed in the Russian Federation. The main parameters of the 802.11 standard in accordance with the current regulatory documents of the Russian Federation are shown in Table 1.

Table 1. Basic parameters of the IEEE 802.11 standard (in accordance with the current standards of the Russian Federation)
Parameter name Parameter value Modulation method
Frequency range, MHz 2400-2483,5
Spectrum spreading method FHSS
Number of carrier channels (frequencies) Not less than 20, not intersecting at the level of -20 dB
1 2 GFSK
2 4 GFSK
no more than 20 (100 mW)

Various standards of the IEEE 802 family strictly regulate the two lower layers of the OSI model - physical and channel, which characterize the features of specific local networks. The upper layers are the same in structure for both wireless and wired LANs. Like all standards of this family, Fi-Wi 802.11 operates at the lower two layers of the ISO / OSI model, physical and channel (Fig. 1). Therefore, network applications and network protocols that run on Ethernet (802.3 standard), such as TCP / IP, can be used in a similar way on 802.11 Wi-Fi networks. In other words, if there is a certain Ethernet router with several inputs, then it makes no difference to the network whether a wired 802.3 device or an 802.11 wireless Wi-Fi device is connected to it: all peripheral devices will see each other and interact correctly.

Distinctive features of various local networks are reflected in the division of the Data Link Layer into two sublevels: the “Logical Link Control, LLC” and “Media Access Control, MAC”. The MAC layer ensures correct sharing common environment. After gaining access to the environment, it can be used by a higher level LLC, which implements the functions of an interface with an adjacent network layer. The MAC and LLC layer protocols are mutually independent. Therefore, each MAC layer protocol can be used with any LLC layer protocol, and vice versa.

In the 802.11 standard, the MAC is similar to the layer implemented in 802.3 for Ethernet networks. The fundamental difference is that 802.11 uses a half-duplex transceiver mode, which does not allow collision detection during a communication session. To negotiate MAC levels, the 802.11 standard uses a special protocol Carrier Sense Multiple Access with Collision Avoidance (CSMA / CA), or Distributed Coordination Function (DCF). In this case, the CSMA / CA does not allow collisions by monitoring the acknowledgment that the packet (ACK) is received intact.

In addition, the 802.11 MAC layer supports two power consumption modes - "continuous mode" and "conserving". In sleep mode, the equipment is periodically turned on at regular intervals to receive "beacon" signals that are constantly sent by the access point. These signals also include the address of the station that is to receive the data. Other features of MAC 802.11 include the function of dynamic connection and reconnection. An 802.11 client within range of one or more access points can choose the one that has the best signal. If such a point is found, the station automatically re-tunes to its frequency.

To support streaming video in the 802.11 MAC, the Point Coordination Function (PCF) is implemented. In PCF mode, only the access point controls the transmission of data on a specific channel. In this case, it polls all stations, and a fixed period of time is allocated to each of them. None of the other stations can transmit during this period. Each access point has its own unique ESS ID (WLAN Service Area ID), which is required to establish a connection.

Access control and restriction are provided at the MAC-level. Therefore, the access point can operate in the following modes:

  • establishing a connection with all wireless devices regardless of their MAC address;
  • establishing a connection with devices whose MAC addresses are included in the Access Control List (ACL);
  • refusal of connections with devices, the MAC addresses of which are included in the list of "prohibited".

In addition, you can restrict access by disabling the broadcasting of the ESS ID, that is, the access point will not transmit it to the open network, to connect to which you need to know the ESS ID. The following methods are commonly used to authenticate a Wi-Fi device:

  • Open system (OPEN SYSTEM) - the client sends a request with an identifier (MAC address), the access point checks the client's compliance with the list of MAC addresses.
  • Open system with EAP (OPEN SYSTEM AUTHENTICATION WITH EAP) - additional authentication via EAP protocols on the RADIUS server.
  • Closed system (SHARED SYSTEM AUTHENTICATION) - the client sends a connection request, and the access point sends the client a sequence that must be encrypted and sent back.

Wired Equivalent Privacy (WEP) encryption mechanisms are used to protect Wi-Fi devices from unauthorized access. Encryption methods and algorithms are defined by the 801.11i standard, in which the AES block cipher is selected as the main one. WEP is based on the RC4 stream cipher. In this case, WEP encryption can be static or dynamic. Static WEP encryption does not change the key. With a dynamic encryption method, the encryption key is changed periodically. In 2004, an amendment to the 802.11 standard was published with new security algorithms WPA and WPA2. WEP technology has been deprecated. The new security methods WPA and WPA2 (Wi-Fi Protected Access) are compatible between multiple wireless devices at both hardware and software levels.

Although the FHSS method allows for a simple transceiver circuit, it limits the maximum speed to 2 Mbps.

802.11b standard

The rate limiting in the 802.11 standard has led to the fact that devices and local networks of this type have practically ceased to be used. 802.11 was replaced in 1999 by the faster 802.11b standard (802.11 High rate), which operates on the same 2.4 GHz central frequency with a maximum speed of up to 22 Mbps. The 802.11b specification uses Direct Sequence Spread Spectrum (DSSS), which spreads the spectrum of a radio signal using a direct sequence. The main parameters of Wi-Fi 802.11b are shown in Table 2.

Table 2. Basic parameters of the IEEE 802.11b standard (in accordance with the current standards of the Russian Federation)
Parameter name Parameter value Modulation method
Frequency range, MHz 2400-2483,5
Spectrum spreading method DSSS
Frequency plan 2412 + 5 (n-1), n ​​= 1, 2 ... 13
Data transmission rate over the radio channel, Mbit / s 1 DBPSK
2 DBPSK
5,5 CCK
11 CCK
22 PBCC
Maximum radiation power of the transmitter, dBm no more than 20 (100 mW)

The main architecture, ideology, structure and characteristic features of the layers of the new 802.11b standard are similar to the initial version of Wi-Fi - 802.11, only the physical layer has changed, which characterizes higher speeds of access and data transmission. The frequency assignment of the transmission system linear path (Frequency Assignment Plan) is implemented in accordance with the formula given in Table 2.

There are different ways to modulate and support different baud rate modes. 1 Mbps is supported through the Differential Binary Phase Shift Keying (DBPSK) method. The DQPSK (Differential Quadrature Phase Shift Keying) method is used to provide a speed of 2 Mbps. The CCK (Complementary Code Keying) modulation scheme allows transmission rates of 5.5 and 11 Mbps. Using CCK codes allows you to encode 8 bits per character. A symbol rate of 1.385 mega characters per second (11/8 = 1.385) corresponds to a speed of 11 Mbps. This encodes 8 bits per character. At 5.5 bps, only 4 bits are encoded per symbol.

The protocol also provides FEC error correction. In the extended version of the 802.11b + standard, the data transfer rate can be up to 22 Mbps. Since the FHSS frequency hopping method used in 802.11 cannot support high speeds, it is dropped from 802.11b. Therefore, 802.11b hardware is compatible with 802.11 DSSS systems, but will not work with 802.11 FHSS systems.

The 802.11b standard provides for a mode of operation in conditions of strong interference and weak signal. To this end, a dynamic rate shift is used to automatically change the baud rate based on signal strength and interference. So, for example, in the event that the level of interference increases, the data transfer rate is automatically reduced to 5.5, 2 or 1 Mbps. When the interference decreases, the device returns to normal operation at high speeds.

In the 802.11b standard, access control is implemented both at the MAC level and using data encryption via WEP. When WEP is enabled, it only protects the data packet but does not protect the physical layer headers so that other stations on the network can view the data needed to manage the network. It should be emphasized that numerous flaws have been found in the RC4 cipher in recent years. Therefore, modernized encryption protocols are increasingly used. For example, the Temporal Key Integrity Protocol (TKIP) uses the same RC4 cipher as WEP, but with a 48-bit initialization vector. The MIC (Message Integrity Check) protocol has been added to check the integrity of messages. When it is used, the station is blocked if more than two unverified requests are sent within a minute. In the AES-CCMP protocol, key distribution and integrity checking is performed in one CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) component. AES cipher is used for encryption.

With the development of LAN technologies around the world, the number of various wireless devices has increased dramatically, and the problem of interference and congestion in the 2.4 GHz band has arisen. This is because devices such as microwave ovens cordless phones, walkie-talkies, Bluetooth-equipment and other similar devices noticeably influence each other. In particular, this affects the quality of the Wi-Fi equipment.

As noted above, in the 802.11 standard, the maximum transmission rate is defined as the sum of the channels. Therefore, the theoretical speed does not match the actual data transfer speed unambiguously. In cases where different 802.11 devices are using the same channels or operating in an area with strong radio interference, significant speed drops can occur. For example, a wireless station that has established a connection at 11 Mbps will actually operate at no more than 1 Mbps if it is in the range of a powerful microwave oven.

802.11a standard

In order to somehow unload the 2.4 GHz band, the 802.11a standard was developed for 5 GHz frequencies. There are not as many sources of interference in this range as in the 2.4 GHz range, and the average aggregate noise level is much lower. 802.11a uses two basic center frequencies in the 5 GHz region and has a maximum data rate of up to 54 Mbps. This standard adopts multi-carrier sensing and collision avoidance as the medium access method. Orthogonal Frequency Division Multiplexing (OFDM) is adopted as the main method of spectrum spreading - multiplexing with orthogonal frequency division of signals. Two frequency bands are allocated for the 802.11a standard in Russia (Table 3).

Table 3. Basic parameters of the IEEE 802.11a standard (in accordance with the current standards of the Russian Federation)
Parameter name Parameter value Modulation method
Frequency range, MHz 5150-5350; 5650-6425
Environment access method
Spectrum spreading method OFDM
20
52
Data transmission rate over the radio channel, Mbit / s 6; 9 BPSK
12; 18 QPSK
24; 36 16QAM
48; 54; 108 64QAM
Maximum radiation power of the transmitter in the frequency band: 5150-5250; 5250-5350 MHz Not more than 20 dBm (100 mW)
Maximum radiation power of the transmitter in the frequency band: 5650-5725; 5725-5825; 5825 - 6425 MHz Not more than 30 dBm (1,000 mW)

In accordance with the document on the territory of the Russian Federation for the 802.11a standard, the frequency bands are divided into five working sub-bands. The 5.150-5.250 and 5.250-5.350 GHz bands are designed to operate equipment with a transmitter power of up to 100 mW (20 dBm). Ranges 5,650-5,725; 5.725-5.825 and 5.825-6.425 GHz are reserved for equipment with transmitter power up to 1000 mW (30 dBm).

The 802.11a standard uses a method developed by Intersil and called Orthogonal Frequency Division Multiplexing (OFDM) - orthogonal frequency division multiplexing. The principle of modulation of the OFDM signal is shown in Fig. 2-4.

The entire frequency range is divided into sub-carriers, which, although partially overlap, are in an orthogonal position relative to each other. The orthogonality of the carrier signals is ensured when, during the duration of one symbol, the carrier signal will perform an integer number of oscillations. To implement the method, transmitters use the inverse fast Fourier transform (IFFT), which converts the signal, pre-multiplexed on one of the channels, from a time representation to a frequency one. Thus, where one subcarrier has a maximum amplitude, the adjacent subcarrier has a value of zero. Information in this method is transmitted in the form of so-called OFDM symbols (Fig. 3).

A prefix is ​​permanently written in front of the symbol. To protect against the occurrence of intersymbol collisions, the OFDM technology introduces the concept of a Guard Interval (GI), during which OFDM cyclical repetition will take place. The prefix is ​​added to the transmitted symbol at the transmitter and removed when the symbol is received at the receiver. The guard interval reduces the data transfer rate.

In the 802.11a standard, the range is split with a channel spacing of 20 MHz (Figure 4). Moreover, each of the channels has 52 sub-carrier frequencies. Of these, 48 are used for data transmission, and the remaining four are used for error correction codes. The sub-carrier spacing is 312.5 kHz. The signal bandwidth is 16.66 MHz. Convolutional coding rates: 1/2, 9/16, 2/3, 3/4. In the IEEE 802.11a protocol, the maximum convolutional coding rate is 3/4 when one more bit is added to every three input bits. Different modulation schemes are used at different levels. The lowest one uses Binary Phase Shift Keying (BPSK). It provides a sub-channel throughput of 125 kbps. Therefore, for the main channel, the throughput is 6 Mbps (48 times 125). The next layer uses Quadrature Phase Shift Keying (QPSK) to double the bandwidth to 12 Mbps.

In the case when the physical layer uses 16-level quadrature amplitude modulation (16QAM), encoding 4 bits per one Hertz of the carrier frequency, the channel bandwidth will be 24 Mbps. When using 64-level Quadrature Amplitude Modulation (64QAM), which encodes 8 or 10 bits per Hertz of the carrier frequency, the maximum speed for this standard is 54 Mbps.

Thus, in the 802.11a standard, data rates are supported: 6, 12, 24, 36, 48 and 54 Mbps. However, the standard itself allows for higher speeds as well. For example, the Atheros company produces 802.11a equipment with the simultaneous use of two carrier frequencies, due to which the maximum throughput can reach 108 Mbps.

It should be noted that the 5 GHz band is adjacent to frequencies that are partially used by ground stations for tracking communication satellites. To ensure that unlicensed Wi-Fi equipment does not interfere with the operation of other departmental systems, the European Telecommunications Standards Institute (ETSI) has developed two additional protocols: DFS (Dynamic Frequency Selection) and TPC (Transmit Power Control). With their help, Wi-Fi wireless devices can automatically change frequency channels or reduce the radiated power in cases of collisions at carrier frequencies.

802.11g standard

The next step towards development Wi-Fi devices was the 802.11g standard, adopted in 2003. In practice, 802.11g is an enhanced version of 802.11b. It is designed for devices operating at 2.4 GHz with a maximum speed of 54 Mbps. This standard was conceived as universal. Therefore, it allows spread spectrum techniques used in previous versions, namely DSSS, OFDM, PBCC. The main parameters of Wi-Fi-802.11g approved for the RF are shown in Table 4.

Table 4. Basic parameters of the IEEE 802.11g standard (in accordance with the current standards of the Russian Federation)
Parameter name Parameter value Modulation method
Frequency range, MHz 2400-2483,5
Frequency plan (channel center frequencies, MHz) 2412 + 5 (n-1), n ​​= 1, 13
Modes of operation DSSS, OFDM, PBCC, DSSS-OFDM
Data transmission rates over the radio channel and modulation, Mbit / s 1 DBPSK
2 DQPSK
5,5; 11 SSK, RVSS
6; 9 BPSK
12; 18 QPSK
24; 36 16QAM
48; 54; 108 64QAM
22; 33 PBCC
Maximum radiation power of the transmitter No more than 24 dBm (250 mW)

The frequency band allocated for 802.11g in the Russian Federation is 2400-2483.5 MHz. The Frequency Assignment Plan is calculated using the formula in Table 4. The 802.11g standard is fully compatible with 802.11b. The main difference is in the allowed media access and modulation methods. The 802.11g standard uses the DSSS and PBCC technologies discussed above, which are taken from 802.11b. OFDM is adopted from the 802.11a standard. Modulation methods DBPSK, DBPSK, CCK, CCK, PBCC are also taken from 802.11a, b.

Without going into too much detail, we can say that the 802.11g standard is similar to the 802.11b standard at 2.4 GHz and is similar to the 802.11a standard at a maximum transfer rate of 54 Mbps.

802.11n standard

The last adopted for Wi-Fi technology was the 802.11n standard, in which the developers made an attempt to combine the best that was implemented in previous versions. The 802.11n standard is designed for equipment operating at the 2.4 and 5 GHz center frequencies with a maximum possible speed of up to 600 Mbps. This standard was approved by the IEEE in September 2009, and in Russia it was approved and allowed for use in all bands only at the end of 2010. The standard is based on OFDM-MIMO technology. In IEEE 802.11n, the maximum data transfer rate is several times higher than in the previous ones. This is achieved by doubling the channel width from 20 MHz to 40 MHz, and by implementing MIMO technology with multiple antennas.

Ideally, doubling the bandwidth means a directly proportional increase in the physical layer data rate (PHY). In practice, everything turns out to be much more complicated. The MIMO technology (Multiple Input Multiple Output) is based on the idea of ​​using several transmitting and receiving antennas separately. The transmitted data stream is split into independent bit sequences that are sent simultaneously using different antennas. In this case, the antennas transmit data independently of each other and in the same frequency range. In other words, the MIMO technology implements several spatially separated subchannels over which data is transmitted simultaneously in the same frequency range. In the simplest example, it looks like a transmitter with two antennas and a receiver with two antennas, in which data streams are simultaneously and independently transmitted and received on each channel.

MIMO technology does not affect the data coding method and can be used with different modulation methods. The 802.11n standard uses Orthogonal Frequency Division Multiplexing (OFDM) as a spread spectrum technique, which is well established in the 802.11a standard. MIMO technologies include sophisticated vector and matrix processing algorithms in multi-antenna systems.

The OFDM coding method in its structure is currently optimal for supporting MIMO technology. MIMO uses a technique called Precoding with beamforming, which is a kind of vectorial extension of a standard flat beamforming pattern. Spatial beamforming uses multiple antennas to transmit signals. This approach can significantly improve the coverage and capacity of the system, as well as reduce the likelihood of communication disruption. MIMO uses Space-Time Codes (STCs) to provide spatial diversity and optimal fade margins.

The MIMO technique includes so-called "Spatial Multiplexing" (SM), which increases transmission rates and increases throughput compared to a single single antenna. In spatial multiplexing, multiple streams are transmitted over multiple antennas. For example, if the receiver and transmitter have two antennas and it is possible to select the necessary waves from the whole variety of electromagnetic radiation, then the peak data rate can be doubled.

The data transfer process is independent. This means that in the uplink (UL) direction, each user has only one transmit antenna. Two independent users can simultaneously transmit in the same slot, similar to the case when two streams are spatially multiplexed from two antennas of the same user. This process is called "uplink spatial multiplexing". When a message is sent from a base station to a mobile, it is said to be "down".

In the process of transmission, the sequence of symbols arriving at the encoder is converted into a spatial form by a symbolic converter in accordance with the program embedded in the adaptive converter (for example, the reflection of information of subchannels into a spatial code according to a given matrix).

In the MIMO method, it is necessary to constantly request information on the identification of the channel, its state and specific parameters. Signals are transmitted on different subchannels depending on the current state of the channel. Special signals are used to transform the parameters of the subchannels themselves, such as the radiation pattern of the adaptive antenna elements, error correction, transmission rate, etc. For error correction, the packet error rate (PER) is used. When the channel is in bad condition, the value of this coefficient increases and, as a result, the coverage area is automatically limited to a value where the calculated PER value can be maintained. Note that SM and STC provide large coverage regardless of link conditions, but do not increase peak data rates.

When decoding in the receiving device, the received signals are processed according to a certain law in accordance with a given matrix, for example, using the inverse Fourier transform algorithm. Thus, at the receiver, the spatially distributed signals are combined and the transmitted data is recovered.

The main 802.11n parameters allowed for use in Russia are shown in Table 5.

Table 5. Basic parameters of the IEEE 802.11n standard (in accordance with the current standards of the Russian Federation)
Parameter name Parameter value
Frequency range, MHz 2400-2483.5 and / or 5150-5350, 5650-6425
Environment access method Multiple Access with Carrier Sense and Collision Avoidance
The number of MIMO streams, not less Base station - 2
Subscriber station - 1
The number of MIMO streams, no more 4
Spectrum spreading method OFDM
Frequency spacing of channels, MHz 20 and / or 40
Number of subcarriers per channel 56 (at 20 MHz channel width)
Maximum power of the transmitter operating in the range, MHz 2400-2483,5 No more than 24 dBm (250 mW)
5150-5250 Not more than 20 dBm (100 mW)
5150-5250 Not more than 20 dBm (100 mW)
5250-5350 Not more than 20 dBm (100 mW)
5650-5725 No more than 30 dBm (1000 mW)
5725-5825 No more than 30 dBm (1000 mW)

For the 802.11n standard in the Russian Federation, one band with a central frequency of 2.4 GHz and two bands in the 5 GHz region are allocated:

  • 2400-2483.5 MHz;
  • 5150-5350 MHz;
  • 5650-6425 MHz.

The number of subcarriers in the channel is determined to be 56 at a channel width of 20 MHz and 114 at a channel width of 40 MHz. Frequency spacing is allowed for both 20 and 40 MHz. In the 802.11n standard, in accordance with RF regulations, the use of up to four data transmission channels is allowed. It is understood that a Wi-Fi access point can have at least two channels and a wireless subscriber station must have at least one channel. Wi-Fi equipment in the 802.11n standard can operate in three modes:

  • Legacy mode, which provides support for all previous versions of the 802.11a, b, g standard (no support for 802.11n);
  • mixed mode (Mixed), which provides support for all previous versions of the 802.11a, b, g standard and partial support for 802.11n;
  • High Throughput (HT) mode, which only provides full 802.11n support and does not fully support all previous versions.

It should be emphasized that only in High Throughput mode can you take full advantage of the increased speed and extended data transmission range achieved in the 802.11n standard. In the High Throughput mode with a channel width of 20 MHz, 56 frequency subchannels are used, of which 52 are used for data transmission, and four are service ones. When using a 40-MHz channel and a high-bandwidth mode, 114 frequency subchannels are used, of which 108 are information channels, and six are control ones.

Another parameter that affects the transmission rate is the length of the GI guard interval, introduced in the 802.11a standard. In the 802.11 standard, the duration of the guard interval can take two values: 800 and 400 ns. Data rates are determined by a combination of the parameters discussed above. There can be 76 such combinations in the 802.11n standard. Table 6 shows the values ​​of the transmission rates in the 802.11n standard, calculated for four spatial streams, when using a different multiplexing scheme in each stream and at a 40 MHz channel spacing.

Table 6. Parameters for four spatial streams when using a different multiplexing scheme (UEQM) in each stream and with a channel frequency spacing of 40 MHz (in accordance with the current RF regulations)
MCS circuit number Modulation Coding rate Data transfer rate, Mbps
Stream 1 Stream 2 Stream 3 Stream 4 Guard interval 800 ns 400 ns guard interval (optional)
53 16-QAM QPSK QPSK QPSK ½ 135,00 150,00
54 16-QAM 16-QAM QPSK QPSK ½ 162,00 180,00
55 16-QAM 16-QAM 16-QAM QPSK ½ 189,00 210,00
56 64-QAM QPSK QPSK QPSK ½ 162,00 180,00
57 64-QAM 16-QAM QPSK QPSK ½ 189,00 210,00
58 64-QAM 16-QAM 16-QAM QPSK ½ 216,00 240,00
59 64-QAM 16-QAM 16-QAM 16-QAM ½ 243,00 270,00
60 64-QAM 64-QAM QPSK QPSK ½ 216,00 240,00
61 64-QAM 64-QAM 16-QAM QPSK ½ 243,00 270,00
62 64-QAM 64-QAM 16-QAM 16-QAM ½ 270,00 300,00
63 64-QAM 64-QAM 64-QAM QPSK ½ 270,00 300,00
64 64-QAM 64-QAM 64-QAM 16-QAM ½ 297,00 330,00
65 16-QAM QPSK QPSK QPSK ¾ 202,50 225,00
66 16-QAM 16-QAM QPSK QPSK ¾ 243,00 270,00
67 16-QAM 16-QAM 16-QAM QPSK ¾ 283,50 315,00
68 64-QAM QPSK QPSK QPSK ¾ 243,00 270,00
69 64-QAM 16-QAM QPSK QPSK ¾ 283,50 315,00
70 64-QAM 16-QAM 16-QAM QPSK ¾ 324,00 360,00
71 64-QAM 16-QAM 16-QAM 16-QAM ¾ 364,50 405,00
72 64-QAM 64-QAM QPSK QPSK ¾ 324,00 360,00
73 64-QAM 64-QAM 16-QAM QPSK ¾ 364,50 405,00
74 64-QAM 64-QAM 16-QAM 16-QAM ¾ 405,00 450,00
75 64-QAM 64-QAM 64-QAM QPSK ¾ 405,00 450,00
76 64-QAM 64-QAM 64-QAM 16-QAM ¾ 445,50 495,00

The maximum theoretical speed of 600 Mbps can be achieved for four streams, 64-QAM modulation, 5/6 coding rate, 400 ns guard interval. With other combinations of parameters, there will be different baud rates.

Additional IEEE 802.11 standards

In addition to the basic 802.11a, b, g, n standards discussed above, there are a number of auxiliary ones that describe the service functions of various Wi-Fi products:

  • 802.11d. Designed to adapt various Wi-Fi devices to specific country conditions. As mentioned above, specific frequency bands for each individual state are determined within the country itself and may differ depending on the geographic location. The IEEE 802.11d standard allows frequency band regulation in devices from different manufacturers using special options introduced into the media access control protocols.
  • 802.11e. Describes the QoS quality classes for audio and video applications. Changes introduced at the 802.11e MAC layer regulate the quality of simultaneous audio and video transmission for wireless audio and video systems.
  • 802.11f. Unifies the parameters of Wi-Fi access points different manufacturers... The standard allows the user to work with different networks when moving between the coverage areas of separate networks.
  • 802.11h. As noted above, in most European countries, ground stations for tracking meteorological and communication satellites, as well as military radars, operate in bands close to 5 MHz. To prevent conflict situations, the 802.11h standard introduces a mandatory for use in Europe mechanism for automatically resetting power at 5 GHz frequencies for household Wi-Fi devices when they fall within the coverage area of ​​802.11 special and military products. This standard is a necessary ETSI requirement for equipment approved for use in the territory of the European Union. For example, all Wi-Fi equipment manufactured by the French company ACKSYS undergoes mandatory European certification for compliance with the 802.11h standard.
  • 802.11i. The earliest versions of the 802.11 standards used the WEP algorithm to secure Wi-Fi networks. It was assumed that this method can ensure the confidentiality and protection of the transmitted data of authorized users of the wireless network from eavesdropping. However, as it turned out, this protection can be breached in just a few minutes. Therefore, in the 802.11i standard, new methods of protecting Wi-Fi networks have been developed, implemented both at the physical and software levels. Currently, it is recommended to use Wi-Fi Protected Access (WPA) algorithms to organize security in 802.11 networks. They also provide interoperability between wireless devices of various standards and modifications. WPA protocols use the enhanced RC4 encryption scheme and a mandatory authentication method using EAP. The stability and security of modern Wi-Fi networks is determined by privacy verification protocols and data encryption (RSNA, TKIP, CCMP, AES).
  • 802.11k. This standard was developed to improve the distribution of traffic among subscribers within the network. In a wireless LAN, the subscriber unit usually connects to the access point that provides the strongest signal. This can lead to network congestion if many subscribers try to connect to one access point at once. To control such situations, the 802.11k standard proposes a mechanism that limits the number of subscribers connected to one access point and connects new subscribers to another point, despite a weaker signal from it. In this case, the overall network bandwidth is increased due to the more efficient use of resources.
  • 802.11m. Within IEEE 802.11, there is a TASK GROUP working to fix bugs and respond to inquiries and comments that anyone can submit to the IEEE. These amendments and fixes are summarized in a separate document collectively called 802.11m. The first release of 802.11m was in 2007. The next release of fixes, additions, and amendments to all 802.11 editions is planned for 2011.
  • 802.11p. Regulates the interaction of Wi-Fi equipment moving at a speed of up to 200 km / h past fixed access points that are located at a distance of up to 1 km. It is part of the Wireless Access in Vehicular Environ (WAVE) standard and is a kind of interface for communication with IEEE 1609. The WAVE standards define an architecture and an additional set of service functions and interfaces that provide a secure radio communication mechanism between vehicles in motion. These standards are developed for applications such as, for example, traffic management, traffic safety control, automated payment collection, vehicle navigation and routing, etc.
  • 802.11r. Regulates fast automatic roaming of Wi-Fi devices when moving from the coverage area of ​​one access point to the coverage area of ​​another. This standard is focused mainly on Internet telephony and Wi-Fi-enabled mobile phones. Before the appearance of this standard, when moving, the subscriber often lost contact with one access point, was forced to look for another and re-perform the connection procedure. 802.11r-enabled devices can pre-register with neighboring APs and perform the reconnection process automatically. Thus, the dead time when the subscriber is not available in Wi-Fi networks is significantly reduced.
  • 802.11s. Designed for Wireless Mesh Network topology, where any device can serve as both a router and an access point. If the nearest access point is congested, data is redirected to the nearest unloaded node. In this case, the data packet is transferred from one node to another until it reaches its final destination. This standard introduces new protocols at the MAC and PHY layers that support broadcast, multicast, and unicast delivery over a self-configuring Wi-Fi access point system. For this purpose, the standard introduces a four-address frame format. The project received the internal name SEE-MESH and is currently under development (mainly the German company Riedel Communications is working on this project).
  • 802.11t. This document is a set of techniques recommended by the IEEE for testing 802.11 networks: how to measure and process results, requirements for test equipment.
  • 802.11u. Designed to regulate the interaction of Wi-Fi networks with external networks. The standard should define access protocols, priority protocols and prohibitions on working with external networks. The standard is currently in the evaluation and approval stages of the project.
  • 802.11v. The standard is to be amended to improve the IEEE 802.11 network management systems. Modernization at the MAC and PHY levels should allow centralizing and streamlining the configuration of client devices connected to the network. Under construction.
  • 802.11y. An additional communication standard for the 3.65-3.70 GHz frequency range. Designed for the latest generation devices operating with external antennas at speeds up to 54 Mbit / s at a distance of up to 5 km in open space. The standard is not fully completed.
  • 802.11w. Designed to improve the protection and security of the Media Access Control (MAC) layer. The protocols of the standard structure a system for controlling the integrity of data, the authenticity of their source, the prohibition of unauthorized reproduction and copying, data confidentiality and other means of protection. The standard introduces protection of the control frame, and additional security measures allow neutralizing external attacks, such as, for example, DoS. In addition, these measures will provide security for the most sensitive network information that will be transmitted over networks with support for IEEE 802.11r, k, y. The standard is not yet finalized.

In conclusion, it should be noted that Wi-Fi technology is one of the most rapidly developing areas of wireless communication. Currently, many companies produce Wi-Fi equipment. The Wi-Fi Alliance alone has about 320 companies, including Intersil, Texas Instruments, Samsung, Broadcom, 3Com, Atheros, Cisco, Alcatel-Lucent, Nokia, Intel, Samsung, Microsoft, Sony, Apple, MSI, Motorola, The Boeing, Electrobit (EB), Huawei, Hitachi, Ford Motor Company, ST-Ericsson, Murata, NXP, HP, OKI, Garmin, LG, Epson, Sharp, Sierra Wireless, Philips, Canon, Ricon, Microchip, Panasonic, Toshiba, NETGEAR, NEC, Logitech, Mitsumi, Lexmark, Alcatel, ROHM, Trimble Navigation, Kodak, Symbol Technologies, Airgo Networks, etc.

These firms are in a very tough competition with each other and try to convince buyers that it is their product that is the best. At the same time, the leading companies - manufacturers of Wi-Fi chipsets often go beyond the accepted IEEE standards and release on the market their own developments that are not approved by the Wi-Fi Alliance. An example is Atheros' Super G technology to increase effective throughput. The technology is based on the so-called “channel bonding” method: two radio channels are linked in such a way that they appear to be one channel for both the transmitter and the receiver. In theory, this allows you to double the data transfer rate in the 802.11g standard and bring it up to 108 Mbps.

In addition, the range of the network should theoretically increase. However, according to other data, the channel binding effect strongly depends on the distance and decreases with its increase. Currently, although Super G is not standardized by the IEEE, it is used by firms such as Airlink101, Clipsal, D-Link, Intelbras, NETGEAR, Nortel Networks, Planex, SMC, Sony, TRENDnet, SparkLAN, Toshiba, and ZyXEL ... On the world market, you can also find equipment that supports Super G technology under other brands, for example 108G Technology, 108Mbit / s 802.11g, Xtreme G.

Other examples of "unauthorized" going beyond IEEE standards include Broadcom's 25 High Speed ​​Mode technologies, "MIMO Extension" developed by Airgo Networks, and Nitro, offered by Conexant. Even a reputable firm like Texas Instruments has gone beyond IEEE standards with 802.11b + technology.

Many Wi-Fi alliance members argue that Super G and other non-compliant equipment is interfering with normal 2.4GHz operation. However, as rightly noted in, there are many products, such as power amplifiers and active antennas, that can interfere with neighboring wireless networks and do not have any regulatory mechanisms in the coverage area of ​​other Wi-Fi equipment.

With the introduction in 2009 of the 802.11n standard, which incorporates the best of previous versions of 802.11, the heated debate over which standard is the best should have weakened. By far the 802.11n standard is by far the fastest. But since equipment supporting 802.11a, b, g and Super G standards is being produced in the world and will still be produced for some time, the question “what to choose from 802.11” remains open. To find the answer to it, you need to clearly understand for what purposes a specific Wi-Fi network is intended.

For example, for transferring large amounts of information over short distances, speed is the determining factor. In fig. Figure 5 shows the comparative data for the 802.11b, g, n standards, and you can see the time it takes for the corresponding Wi-Fi equipment to transfer a 30-minute video file from a computer to a portable player. However, the struggle for transmission speed is not always justified. For example, for standard-definition television, 5 Mbps is enough, and for HDTV resolution, an average of about 20 Mbps is required. For voice transmission, speeds of more than 1 Mbps are not needed. In fact, the task should be formulated as maintaining the optimal speed at the required distance. We must not forget about the congestion of a particular volume with wireless equipment. It is known that Wi-Fi devices start to conflict when they work in close proximity to each other. Indoors, there is also the problem of reflections from walls and massive equipment. It is also worth considering the choice of frequency. The range is longer in the 2.4 GHz frequency range. However, the congestion of this range and the presence of interference is much greater than in the 5 MHz range. The best option may be to select two private ranges and alternate operation in one of them, depending on the state of the transmission medium.

Literature

  1. http://www.acksys.fr/us/index. / link lost /
  2. http://standards.ieee.org/getieee802/download / link lost /
  3. IEEE Standard for Information technology - Telecommunications and information exchange between systems. Local and metropolitan area networks. Specific requirements. Part 11: Wireless LAN Medium Access Control and Physical Layer (PHY) Specifications.
  4. Order of the Ministry of Communications and Mass Media of the Russian Federation of September 14, 2010 No. 124 “On approval of the Rules for the use of radio access equipment. Part I. Rules for the use of radio access equipment for wireless data transmission in the range from 30 MHz to 66 GHz "(registered in the Ministry of Justice of the Russian Federation on 12.10.2010 No. 18695).
  5. 802.11® Wireless Networks: The Definitive Guide, By Matthew Gast. http://book.dlf.ge/ Desktop_books / books / link lost /
  6. http://www.iec.org/online/tutorials/ofdm/topic04.html?Next.x=40&Next.y=18 / link lost /
  7. Heiskala J., Terry J. OFDM Wireless LANs: A Theorethical and Practical Guide. 2002.
  8. http://www.54g.org/docs/802.11g-WP104-RDS1.pdf / link lost /
  9. http: //www.sss-macom/pdf/802_11g_whitepaper.pdf / link lost /
  10. IEEE Std 802.11n-2009, IEEE Standard for Information technology - Telecommunications and information exchange between systems. Local and metropolitan networks. Specific Requirements. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Amendment 5: Enhancements for Higher Throughput.
  11. www.electronics-tech.com / link lost /
  12. http://www.wi-fi.org/our_members.php / link lost /
  13. http://www.thg.ru/network/20040127/11g_enhanced-01.html / link lost /
  14. 802.11n: Next-Generation Wireless LAN, Technology. Broadcom. 2006.

Most of the urban population uses Internet access, and many say we have wifi at home, we go through it to sites and we do not need an Internet connection. From this we can conclude that such people, unfortunately, do not understand what they are talking about.

In this article I will tell you in detail what wi-fi is and will eliminate the "gap" in the knowledge of such people.

What is Wi-fi?

I am glad to welcome you, dear reader, in this article we will deal with the modern concept - "Internet connection via wi-fi". A huge number of users use such a connection, but they do not always understand what it is all about, and even more so how wi-fi works.

Wi-fi is the ability to transfer data wirelessly and that's it ... Never confuse the Internet and Wi-Fi - these are completely different processes and different equipment. You can easily distinguish them if you carefully read the article to the end.

Under the concept of the Internet can be represented as a connection, the ability to exit, access to any sites. And if this Internet connection is passed through special equipment, you can get the so-called wifi network, which will transmit all the same Internet, but without wires and with the ability to connect several devices to it at once, for example, will simultaneously "deliver" your Internet access to your mobile and laptop.

That is, Wi-Fi is a network that distributes access to the Internet without wires, via radio channels. Who cares, it works on the basis of IEEE 802.11 standards, but the network itself does not provide access to the Internet. Let's figure out how to make it work?

Moving on to the interesting and very important, understanding how Wi-Fi networks work, you can correctly formulate your thoughts about Internet connections. So, in order for you to have a Wi-fi network at home, you must first connect the Internet to your home.

After that, the Internet cable must be connected to special equipment - a router.

A router is a device that receives signals from the Internet, converts them into a so-called wi-fi network and transmits them to specific devices (phone, computer, TV).

How to connect Wi-fi at home?

As I said earlier, the first thing to do is to bring the Internet to your home, apartment, office, the process is not complicated, you need to find out which providers work with your home, call them or visit an office where they will accept an application for laying an Internet cable in your apartment.

As a rule, you will be given several dates to choose from, choose the most convenient for yourself, when you can be at home, the master will arrive at the appointed time and lead the Internet cable to the place you need.

By the way, they don’t take money for laying the cable, the company you have chosen does it at its own expense, you pay only for the selected Internet connection tariff, usually from 300 to 1000 rubles per month.

The monthly fee (tariff) will depend on the connection speed you choose.
For comfortable access, choose a speed of 30 Mb / s, about 400-500 rubles / month.

After the cable has been laid, you can already connect it to the computer and use the Internet, but our goal is to create a Wi-Fi network, so let's move on. You need to purchase a router (some companies provide their routers), it is to it that you then connect the Internet cable, after which the router will create an active wi-fi network, and already you can connect to it without any wires, even from a laptop, even from a phone, and here it is comfortable Internet access from anywhere in the apartment or house.

Tip 1: When discussing the conditions for connecting an Internet cable, ask which router is better for you, because the choice in stores nowadays is quite large. Getting the right advice on getting the right router will save you money and time.

Tip 2: When connecting, the router will need to be configured (once), if you do not have the slightest idea how this is done, then I recommend asking the wizard who will come to lay the Internet cable. Let him set everything up for you right away (they may require a separate setup fee, about 500 rubles)

Tip 3: Take care of a secure connection in advance, install an antivirus on all computers from which you will access the Internet.

An alternative option, if your house or apartment for some reason is not serviced by one of the provider companies, usually residents of settlements, villages, country parks face this, well, there is no way to lay the cable there yet.

It is necessary to find out which of the telecom operators (mts, beeline, megaphone) normally catches on this territory. After that, visit the office of one of these companies and buy a modem that will provide Internet access, and for the modems, separate routers are sold that can convert the signal from the modem to a wi-fi network.

By the way, modems with an already built-in Wi-Fi module are now actively developing, perhaps you can find one for yourself - this will simplify the connection conditions several times.

© 2021 hecc.ru - Computer technology news