pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

IEEE 802.11b

The 802.11b group within IEEE was driven largely by Lucent Technologies and Intersil Corp., and was designed to operate in the 2.4GHz ISM (Industrial, Scientific and Medical) band. The key contribution of the 802.11b addition to the wireless LAN standard was to standardise the physical layer support of two new speeds, 5.5Mbit/s and 11Mbit/s. To accomplish this, Direct Sequence Spread Spectrum (DSSS) had to be selected as the sole physical layer technique for the standard – since frequency hopping could not support the higher speeds without violating current FCC regulations – and a more efficient coding scheme known as complimentary code keying (CCK) was incorporated into the standard to attain a top-end data rate of 11 Mbit/s. The implication is that 802.11b systems will interoperate with 1Mbit/s and 2Mbit/s 802.11 DSSS systems, but will not work with 1Mbit/s and 2Mbit/s 802.11 FHSS systems.

However, early wireless adapters and access points were significantly more expensive than wired NICs and switches and wireless networks comprising components from different vendors often didn’t work well. Fortunately, both of these concerns had been largely addressed by the end of 2000. Market forces – both in terms of vastly increased volumes and competition – drove down the costs of 802.11b wireless solutions to much nearer those of their wired counterparts and interoperability problems were effectively eradicated following the setting up of the Wireless Ethernet Compatibility Alliance (WECA). Their certification programme – in which products are submitted for interoperability testing – played a hugely important role in making wireless technology more pervasive by assuring would-be adopters that they wouldn’t be stuck with proprietary, dead-end solutions. Any device that displays the Wi-Fi logo is guaranteed to have undergone WECA’s strict set of performance and compatibility tests.

As a consequence, 802.11b wireless networking enjoyed a rapid increase in deployment in enterprise settings and in educational and institutional networks and – as adapter and access point prices continued to fall – 802.11b wireless network products began to make inroads into home and SOHO applications. Initially, the demand for 802.11b in the home was driven by people who used a wireless-equipped notebook computer at work, and then took it home and wanted the same freedom from wired connection there too. However, more recently networking to share broadband Internet connections has become an increasingly important driver of 802.11b adoption in the home.

However, 802.11b isn’t perfect. One of its more significant disadvantages is its crowded frequency band. Numerous consumer devices use the same 2.4GHz radio spectrum as 802.11b and therefore represent a potential source of interference. These include microwave ovens, cordless phones, legacy wireless systems and home control devices that use the X-10 standard. The biggest threat, however, is from increasingly widely available Bluetooth devices. The problem is exacerbated by the fact that beyond its 15 to 45m range inside buildings – where it has to travel through walls and ceilings – 802.11b can also extend to up to 300m in line-of-sight outdoors.

Limited bandwidth is perhaps an even greater problem. Nominally 802.11b performs at an equivalent speed to that of 10Mbit/s wired Ethernet. However, overhead, configuration and security factors can reduce actual throughput to a typical 5Mbit/s. Whilst that is sufficient for web browsing, it’s inadequate for more demanding applications such as video streaming. Problems at the physical layer are one of a number of reasons for performance degradation. For example, the Physical Layer Convergence Protocol (PLCP) preamble included in each packet to determine transmission speed and assure synchronisation consists of 24 bytes; by contrast it is only 8 bytes for wired Ethernet. Obstacles in the path of signals can result in nodes dropping to lower speeds in an effort to maintain contact and the very nature of 802.11b’s collision avoidance methods impose significant bandwidth overheads.

Security is another important issue. Whilst Wired Equivalent Privacy (WEP) is an integral part of the wider 802.11 standard, it has been shown to have vulnerabilities making it relatively simple to decrypt the 40-bit security keys. A form of hacking known as war driving enables hackers to ride in a car with a wirelessly equipped laptop until they spot a vulnerable wireless network, park outside the building and access the network. Vendors are responding by creating defences like security keys that shift dynamically rather than remain static. However, it’s not foolproof and subject to the usual problem with proprietary fixes – they may not work with 802.11b equipment from other vendors. The industry is working on a couple of standardised fixes, including a new 128-bit encryption algorithm known as Advanced Encryption Standard (AES) that will require hardware or firmware upgrades, and a Temporal Key Integrity Protocol (TKIP) that will be compatible with WEP.

Despite its drawbacks, WEP is better than nothing. The bigger problem is the fact that many wireless networks are installed without even enabling it. In addition to taking care to ensure that WEP is enabled, there are a number of other simple measures users can take to increase their level of protection. These include changing all network names and passwords, using MAC (Media Access Control) address blocking and setting up the network as a closed system. Beyond that security can be tightened even further by implementing a Virtual Private Network (VPN) or RADIUS authentication server.

802.11b’s lack of interoperability with voice devices and absence of any Quality of Service (QoS) provisions for multimedia content are other, albeit, less serious problems.

While both the 802.11b and 802.11a specifications were approved in 1999, the former succeeded in making it to market ahead of its rival. That head start was to pay dividends when the combination of wider availability and greater affordability led to a big increase in the take up of broadband Internet connections in the early 2000s. This in turn gave a massive boost to home networking as more and more users sought to share their broadband connection across multiple home PCs. IEEE 802.11b was in the right place at the right time to reap the benefit.

So, whilst the 802.11a specification wasn’t written to directly address 802.11b’s perceived deficiencies and remained significantly behind its rival in terms of market penetration, the fact is that it does solve some of 802.11b’s more significant problems!

  • GSM Technology
  • GPRS Technology
  • 3G Technology
  • WAP Technology
  • Bluetooth technology
  • GPS Technology
  • Galileo
  • IEEE 802.11b
  • IEEE 802.11a
  • HiperLAN2
  • IEEE 802.11g
  • WiFi Access
  • WiMAX Technology
  • HSDPA
  • IEEE 802.11n

Filed Under: Mobile Communications

Latest Articles

Beginner Guide to UI Design for Websites

Understanding how to make it easy and efficient for a person to interact with a user interface (UI) can be done when you become familiar with the components of UI design. Learning how to build out a UI properly should lead to a logical organization of elements and help convey the appropriate look … [Read More...]

4 Very Useful CAD Hacks You Might Not Be Using

The market for CAD design is growing around 7% a year. It is expected to be worth $7.3 billion by 2022. CAD experts have a lot of job security, but they need to know how to get the most of the product. There are a lot of overlooked CAD features they may be missing out on. Although there are … [Read More...]

AMD Thunderbird

In mid-2000 AMD introduced an enhanced version of the Athlon processor, codenamed Thunderbird. Fabricated using AMD's 0.18-micron process technology, the new core replaced the K75 chip's 512KB of off-die Level 2 cache by 256KB of cache … [Read More...]

Best Laptops for Professional Writers in 2023

If you need a new laptop as a writer, you may find yourself bewildered by all the choices. For one thing, there are so many brands to choose from. … [Read More...]

What You Need to Know About Automation with Chrome

Automation is drastically changing the way we interact with the Internet. One survey found that 76% of businesses use automation to streamline … [Read More...]

9 Steps to Take When Building a Web Scraper in Python

Web scraping is a method for collecting, organizing and analyzing information that is spread over the Internet in a disorganized way. It can … [Read More...]

8 Steps To Streamline Your Business Operations with Virtual Data Rooms

With the increased reliance on networking and cloud computing, businesses generate and store an ever-increasing amount of sensitive information. As a … [Read More...]

Advantages and disadvantages of using Perl in web programming

Web pages are designed using programming codes and a number of technologies as tools to achieve the desired objectives. An example of the above … [Read More...]

Why Cross-Chain Trading Is the Future of Crypto Investing?

The rapid growth and evolution of the cryptocurrency market have opened up exciting opportunities for investors. Within this dynamic landscape, … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Blu-ray vs HD-DVD – the war of the blue laser optical disks

Shuji Nakamura's blue laser diode exactly fit requirements for next generation DVDs: accurate, reliable, small and affordable both for … [Read More...]

Pentium Architecture

The Pentium's CISC-based architecture represented a leap forward from that of the 486. The 120MHz and above versions have … [Read More...]

How to Remove Smart Fortress 2012

Smart Fortress 2012 Smart Fortress 2012 is a malware client. In plain terms it's a virus that attempts to trick the end user that it's a real … [Read More...]

[footer_backtotop]

Copyright © 2023 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors