Table of Contents - Article Hierarchy
Being able to connect seamlessly to the internet has become an integral part of our lives. Technology has advanced hence we have moved from an age that involves a lot of tangled cables to wireless connectivity particularly WiFi. This is where radio waves have proved to be useful. From telephone networks, television broadcasting to Bluetooth. These applications in radio waves have influenced the development of WiFi technology in one way or another.
Almost every gadget today has the ability to connect to the internet via a WiFi connection. Including smartphones, computers, miniature drones, smart TVs, automobiles and even printers. Not only is it cheap, but also a convenient mode of connecting to the internet. Today, a WiFi hotspot can be found in about any public place. From learning institutions, lobbies, hotels, airports, etc. You can as well have a private WiFi network at home or one that is portable. Smartphones and computers can also create a hotspot.
You may be intrigued by how WiFi works or how data is able to travel through a wireless medium. We have taken a comprehensive look at what WiFi is and how it works.
What is WiFi?
WiFi is a wireless technology that harnesses radio waves to transmit data wirelessly between two or more connected devices. Instead of transmitting signals via a cable, it is sent through the air. WiFi is an acronym that stands for Wireless Fidelity which means the degree of accuracy of the signal. Well, this term is not widely known or used hence in a way it has been replaced by its abbreviated name.
Every WiFi connection has a two-way route for data communication. One way is dedicated to outgoing messages while the other way is dedicated to incoming messages. Basically, when two devices are connected, data can be sent back and forth. To prove this concept, you will always see two arrows next to the WiFi signal icon. One arrow pointing down while the other pointing up. Arrow pointing up represents data being sent from the respective device, while the arrow pointing down represents data being received by the device.
History of WiFi
Different WiFi protocols come with different WiFi standards. These standards come in the IEEE 802.11 family of standards. The introduction of wireless connectivity using WiFi dates back from as early as 1971 with the Great Hawaiian Islands being the first to make this step. The initial version of the 802.11 standards was released in 1997.
The different WiFi standards mean a difference in Radio technology used in each standard. Consequently, a difference in speed, range, and bandwidth. Usually, WiFi signals operate between a 2.4GHz (Gigahertz) to 5GHz bandwidth depending with the standard. To minimize interference, these bandwidths are usually broken down into channels using TDMA (Timed-Division Multiple Access) and OFDM (Orthogonal Frequency-Division Multiplexing) technologies. This allows multiple users to access the same frequency and transmit at the same time.
The various standards are known as IEEE 802.11 with a letter at the end representing the specific standard.
Here are the main 802.11 WiFi standards as set by IEEE (Institute of Electrical and Electronics Engineers):
- 802.11a: This standard can transmit data at a rate of up to 54Mbps (Megabits per second). Although at normal circumstances and constraint factors being present, it usually transmits at a rate between 6 and 24Mbps. Radio signals are transmitted at a frequency of 5GHz. 802.11a has incorporated orthogonal frequency-division multiplexing technique to reduce interference. Although this standard has a higher rate of data transmission, it has been noted that it is more prone to obscuration and absorption by concrete walls and other materials due to its small wavelength. This greatly limits its range in premises with a lot of walls. Hence it is more effective for direct line-of-sight connections.
- 802.11b: This standard is a bit slower. Rate of data transmission is up to 11Mbps. Radio signals are transmitted at a frequency of 2.4GHz. This may seem low, but the overall range of this standard is higher than that of 802.11a. The main cause of interference to this standard are devices operating at the same 2.4GHz frequency including cordless telephones, Bluetooth, microwaves, etc.
- 802.11g: This standard operates at a 2.4GHz frequency as 802.11b. The difference is it implements orthogonal frequency-division multiplexing. As a result, it is able to transmit data at a rate of 54Mbps. Which is an average of 24Mbps during normal circumstances. Just like 802.11b, this standard is affected by equipment transmitting radio waves at the same frequency
- 802.11n: This is a more advanced standard to its previous counterparts. 802.11n adds a technique called MIMO (Multiple-Input Multiple-Output). This technology expands its capacity by use of multiple transmitters and receivers. This enables sending and receiving multiple radio signals all at once. It is able to operate at both 2GHz and 5GHz frequencies. Its theoretical rate of data transmission ranges between 54 and 600Mbps.
- 802.11ac: also known as WiFi 5, this standard sends signals at a frequency of 5GHz compatible with more modern devices.
Various protocols and technologies have been combined to come up with other standards.
How does WiFi work?
Just like in telecommunications, a WiFi network uses radio waves to transmit data between connected devices. Each device has the ability to send and receive response across a WiFi connection. This is made possible by the network adapter or network card.
The network card deciphers radios waves received by the antennae and vice versa. The network adapter is responsible for relaying and receiving radio waves. Most WiFi networks have a centralized access point (router) where other devices connect to. The router is tasked with transmitting data received from client devices and into the internet. The router also receives data from the internet and broadcasts to respective devices.
Radio waves used in WiFi technology is different from traditional radio waves used in other communications in that, WiFi uses higher radio frequencies to increase the rate of data transmission.
To get a better understanding of how WiFi works, we have broken down this topic into a series of subtopics.
- Requirements for a WiFi Connection
A typical WiFi connection consists of hotpot (or an Access Point) and a WiFi enabled device known as a client. A hotspot is an area where WiFi can be accessed. A router is the most common device for setting up a hotspot. In order for the network to have an internet connection, the router has to be connected to an ISP (Internet Service Provider) using a modem. You can also connect an internet cable to your wireless router. Router to router connection can be done as well, with one router being able to connect to the internet and sharing to the other router.
For your device to connect to a WiFi network, it needs to have a network adapter or a network interface card. The network adapter supports both wireless WiFi connection and wired Ethernet connection. Today, network adapters have been enhanced to be able to decode USB tethering.
It is important to note a WiFi connection can be established even without the network having an internet connection. For example, having two mobile devices connected via direct WiFi then sharing files or a connection between your desktop and printer. Data exchange will happen between these devices without internet. This is known as an Ad-hoc network.
- WiFi hotspots
A WiFi is an area with an accessible WiFi signal. Your device simply has to be in range to detect and get connected. WiFi hotspots are common in public places such as open offices and airports but you can easily set up one at home yourself.
A majority of computational devices such as smartphones and laptops come with a feature that enables you to set up a hotspot in just a few steps. This comes in handy as you can create miniature WiFi networks and share internet between your devices, anywhere you go.
A router (also called Access point) is a network device that receives and forwards data packets. The most common types are small office and home routers. Routers are usually the primary devices in a WLAN (Wireless Local Area Network). Most routers provide a signal coverage of about 30 meters.
Devices can connect to the router wirelessly when in range of its WiFi signals or using an Ethernet cable. There are advanced routers that can transmit using fiber optic cable. The router is connected to the internet by means of an internet service provider. This is achieved by plugging a modem. Modern routers have an internal modem instead.
Routers may also connect two or more groups of computers. These devices come in different shapes and size hence varying applications. The more powerful and high-performance routers are used by ISPs.
- How does a network adapter work?
The network adapter is also known as NIC (Network Interface Controller), network interface card or a LAN adapter. These terms basically mean the same so don’t be confused when you see them used interchangeably in different write-ups.
To understand how a network adapter works, we must dissect its components. The network adapter consists of the transmitter, receiver and necessary circuitry and software for encoding and decoding data. Having looked at its components, we can establish its functionality as follows:
- Encodes data into radio waves which are sent using the transmitter.
- Decodes radio waves that are received via the receiver into a form that is understood by the device.
- The network adapter also handles buffer storage.
All this is conducted with the help of the seven network layer protocols depending on the standard used.
The transmitter and receiver are what creates the two-way route. The link can be established with the means of a wired connection (e.g. USB tethering or Ethernet) or wireless connection (i.e. WiFi). Most computer motherboards come with an expandable slot for the network interface card. Conversely, if your computer does not have the required slot, an external USB WiFi adapter can be used for wireless connectivity.
- How is data sent using WiFi?
You might have heard of the term network packet (data packet or simply a datagram). This is a small chunk of data that is usually sent over a network whether wired or wireless. Before data such as a message, email or a large file is sent over a WiFi connection, it is first split into smaller fragments called packets.
These chunks are then collected and merged on the receiving end to come up with the original data chunk. This explains the importance of buffer storage. These packets not only carry pieces of the original data but also contain other essential information as well. Every data packet is sent along with the necessary information that will enable it to reach its intended destination.
When a data packet is created, it is marked with the physical address (otherwise known as Mac address) of the receiving device. The packet is then relayed through the air by use of radio waves. It is not sent to any particular device, therefore, any WiFi enabled gadget within range will be able to receive this packet. Only the device with the matching Mac address as specified along with the packet will be able to process and retrieve the data.
Once the chunk is received, a message is sent by the receiver to acknowledge the successful reception of the packet. Then the next packet is sent. The process continues until all the data goes through.
- DNS service
For communication to go beyond the router and into the internet, a service called DNS (Domain Name Service) is required. This service is responsible for mapping all existing domain names into their corresponding IP addresses. For example, when you search for ‘google.com’ on your computer, for you to receive a response the DNS is required to give the corresponding IP address.
The reason for this is because networked devices can only establish communication by use of IP address and not domain names. Domain names are used to enhance readability and remembrance to humans. Imagine having to remember and type in the IP address of a website every time you want to visit.
Take a look at it this way, the internet is made up of millions of computers and servers each with its own unique IP address that corresponds to its domain name. Therefore, it is necessary to convert the domain name to an IP address before a connection to the remote server is established.
DNS service is run by your internet service provider on a DNS server which keeps a huge record of existing domain names and their corresponding IP address. When you type the domain name or simply the URL (Uniform Resource Locator) on your browser address bar, your device sends a request known as DNS query to your ISP DNS server to resolve the domain name to its IP address. This process is very rapid and takes place in the background. It often goes unnoticed. The response with the IP address is received by your device in a split second.
Guide to Building a Wireless Network
Setting up your own wireless network is easy. Whether it’s a home, office or portable network. To build your own wireless network, you would need the following:
- A router (if you need to use it for gaming, check our post on the best gaming WiFi routers.)
- An internet cable or modem
- Wireless devices
You can optimally connect your router to the internet using an Ethernet cable that is already connected to the internet or by plugging the modem to your router. Once a newly bought router starts working, it usually uses the name of the manufacturer as the SSID as well as other default settings which may put your network at risk. First of all, you have to visit the designated website for your particular router and configure your preferred settings such as security options, channel and SSID name. Once the network is set up, you can use range extenders or repeaters to the range of your wireless network.
Wireless network security
The wireless network is likely to have more security risk compared to a wired network; therefore, security is key. There are basic security precautions you can employ that are quite effective. Some modern routers come with firewall pre-installed for additional security.
One of the main techniques used in securing a wireless network is by use of Access Control which has been achieved in a number of ways over the years:
WEP (Wired Equivalent Privacy): This is the first encryption technique to be developed. This standard is weak and easy to hack. It uses RC4 stream cipher and 64 or 128-bit keys. This kind of encryption is not recommended today.
WPA (Wi-Fi Protected Access): This was an interim standard intended to address major drawbacks of WEP. This standard retained the use of RC4 but adds longer IVs (Initialization vector) and 256-bit keys. Each client gets new keys with TKIP. This standard is only recommended when WPA2 is not available.
WPA2: This is the current and newer standard. This technique has replaced RC4 and TKIP with CCMP and AES algorithms for stronger authentication and encryption. It is the most recommended technique of maintaining access control in a wireless network.
MAC address filtering: This is a technique that allows you to manage specific devices that are allowed to access your network based on their physical address. You can have a list of MAC addresses for devices only allowed to gain access to the network. Encryption standards such as WPA2 can be used together with this technique to make your network more secure.
Latest Trends in WiFi technology
WiFi technology has come a long way. With its advancement over the years, a variety of trends have emerged today. Ambitious plans and active development are still underway to improve this technology and its application in a wide range of areas. What has been achieved so far is quite breathtaking.
This is a WiFi trend that is rising very fast. The ‘thing’ in the internet of things may be an automobile with sensors to alert the driver of a suitable route, a piece of autonomous farm equipment guided by GPS or even an animal tagged with a tracking device. A simple example is a remote printer connected to your desktop at your workplace. Other wireless technologies apart from WiFi have been used to achieve IoT. Imagine having a house whereby all your devices and equipment are interconnected and centrally controlled with your computer or mobile phone. This means that household equipment such as fridge, TV, sound system, microwaves, and even your vehicle can exchange data. You can switch on or tune your sound system even without having to interact with it. Internet of things has been used in a huge scope of industrial applications. With the advancement in IoT, it has been necessary to introduce new protocols.
Various software designated for IoT devices has been developed including Riot OS and Thingsquare mist. Riot is an operating system belonging to IoT devices. Thingsquare is an open source firmware that has been applied in a number of mesh networks and other IoT networks. It brings internet connectivity in IoT. There are also cloud service providers for complex IoT setups including ThingWorx and Everything.
IoT has even adopted machine learning to bring about autonomous interconnected devices. Popular software that has been used is the Gork engine.
As the name suggests, mesh networks are formed by links established between multiple nodes. Each node acts as a router being able to communicate with its intermediate nodes as well as client devices connected to the network. This forms a mesh topology.
This trend has proved effective when dealing with WiFi dead zones as well as increasing range without losing significant signal strength. With mesh networks, high performance and broadband networks can be set up at a low cost.
A Mesh network may operate in one of the following three protocols:
- Proactive protocol: nodes constantly communicate with each other and inform each other in case of path changes such as removal of one node. This enables it to recover from failure. In the case of a dynamic environment where nodes are moving too fast, more resources are used for path reordering which may result in low bandwidth and increased collision. It is more applicable in static environments.
- Reactive protocol: With this protocol, connections are established on demand. This results in the best and shortest paths possible.
- Hybrid: Has the features of both proactive and reactive.
Recently, reports show Mesh WiFi networks have experienced an increase in market share compared to traditional stand-alone access points. These networks cannot be added to your existing router therefor it is meant to replace it. Large scale mesh networks are able to span an enormous area such as a whole city.
Cool and portable mesh nets designed for indoor use have hit the market. From the Google WiFi, Tenda Nova to the NetGear Orbi. There are also many other pocket-friendly mesh nets out there.
This is the next generation WiFi standard (WiFi 6 in layman) that is said to be four times faster than 802.11ac. Although this standard has not yet been adopted fully. This standard has been developed with the aim of enhancing efficiency. Talk of battery life and a reduction in latency. 802.11ax is set to operate at all bandwidths between 1 and 7GHz which is a huge step from the 2.4-5GHz range.
To improve efficiency in terms of power consumed and an increase in throughput, this version utilizes OFDMA (Orthogonal Frequency-Division Multiple Access) which is a multi-user version of the OFDM. So far only a few devices have incorporated this standard including the Samsung Galaxy S10.
The consistent increase in speed and range
We have come far from a time when we struggled to download a single image file to now streaming video files in high definition. People can now video chat in real time without losing connections. High-speed connectivity has also played a key role in gaming and virtual reality.
Right now, developments are underway to come up with the next generation 5G speed. Imagine the possibilities that can come with this kind of connection. Communication latency could be a thing of the past.
WiFi technology has been enhanced over the years to be compatible with more devices. Multi-band enabled devices have the capability of transmitting WiFi signals at more than one bandwidth. Multiband WiFi technologies that are present are Dual-band and Tri-band.
Dual-band routers and devices are able to broadcast WiFi signals at both 2.4 and 5GHz spectrum hence able to support client devices that are confined to the older 2.4GHz as well as devices operating at the modern 5GHz spectrum.
Tri-band routers and devices can broadcast three different bandwidth frequencies. One of the frequencies is at 2.4GHz while the rest of the two are at 5GHz. This means it supports more devices that can be able to connect to the router. This will not increase speeds on individual devices although it will maintain the speed even when more devices are connected since there are more signals to connect to.
Drawbacks of using WiFi
While WiFi technology has its advantages, it has its fair share of problems as follows:
- Security: Wireless networks are more susceptible to malicious attackers compared to wired networks yet many businesses neglect this security issue. All that is requires to carry out an attack is to join that network. Public WiFi networks are rated with the highest risk. Even private networks with weak passwords can be exploited. Expert hackers are able to intercept sensitive data belonging to other users.
- Range limitation: A WiFi signal gets weaker with an increase in distance. The decrease in signal strength may be as a result of interference by other radio waves transmitted at the same frequency. Loss of signal can also be due to absorption by blocking materials such as concrete walls. Even without these factors, radio signals always lose strength naturally with distance.
- Speed: Compared to a wired Ethernet connection, WiFi connection is relatively slower.
- Reliability: May not be reliable when many devices are connected. WiFi is prone to slow connections especially when there is high interference or when there is a large number of client devices connected. This means there is a limited maximum number of users able to connect at one time. Slow connections may as well be experienced due to ISP throttling. This is whereby the internet service provider limits the maximum data rate to prevent server overload.
- Cost: In some instances, it may be costly to set up a wireless network compared to a wired network. Getting a decent reception from an internet service provider is costly as well. Cheaper alternatives are available but are less reliable especially when in an overcrowded network.
Terms associated with WiFi
Throughput: This denotes the number of units of data that can be transmitted for a given unit of time. For example, 50Mbps denotes transfer of 50 megabits per second.
Latency: It is a networking term that describes the time delay or the total time interval between sending a message and the message being received.
IEEE: This is the institute that is tasked with ensuring WiFi standards met and maintained.
Bandwidth: A range within a band of wavelengths. This range has a maximum capacity of data that can be transmitted from one point to another.
Protocol: A protocol is a number of rules that govern how devices communicate with one another. For example, internet protocol (IP).
Encode: To encrypt or convert into another form for the purpose of transmission.
Decode: To translate or convert to a form that is understood.
Broadcast: To relay signals.
USB tethering: Sharing your phone’s internet via a USB cable.
AES: Abbreviation for Advanced Encryption Standard. An encryption protocol adopted in WPA2.
AP: An abbreviation for Access Point, may mean a router.
RF: abbreviation for Radio Frequency.
Channel: It is one of many paths for transmitting data.
SSID: Abbreviation for Service Set Identifier which is basically the name given to a network.
Repeater: A device that amplifies WiFi signals to increase its range.
WiFi has brought convenient and seamless connectivity which has, in turn, made a big impact on information sharing. It is evident that advancement in WiFi technology is not going to stop anytime soon. It is therefore prudent to note that being able to connect on the go bring negative impacts such as cyber crimes and exposure to sensitive information.