Wireless Local Area Network (WLAN) is A network connecting two or more gadgets via wireless distribution methods and also provides accessibility to the Internet. The majority of WLANs are built upon Institute of Electrical and Electronic Engineers (IEEE) 802.11 standards or Wi-Fi.
IEEE 802.11 Architecture
The elements that comprise an IEEE 802.11 architecture are as follows:
1) Stations (STA) include all equipment and devices that connect to the wireless network. Stations can be classified into two kinds:
- Wireless Access Points (WAP) WAP – WAPs, also known as access points (AP) are typically wireless routers which form the base stations or access points.
- Client. Clients are workstations. laptops, printers, computers phones, and other devices.
Each station is equipped with an interface controller for wireless networks.
2) Basic Service Set (BSS) A BSS is the simplest of service sets. It is set of stations that communicate at the an physical layer. BSS can fall into two kinds based on the how they operate:
- Infrastructure BSS The devices are able to communicate with other devices using access points.
- Independent BSS The devices are able to communicate using an ad-hoc method.
3) Extended Service Set (ESS) The ESS is a set of all connected BSS. It’s a set comprising all linked BSS.
4) Distribution System (DS) This connects all access points to ESS.
The types of wireless types of LANs
IEEE 802.11 IEEE 802.11 has two basic modes of operation: infrastructure and Ad hoc mode. In ad-hoc mode, mobile units can communicate directly peer-to peer. In the infrastructure mode, mobile devices communicate via an wireless access point (WAP) that acts as a bridge to other networks like the the local area network as well as the Internet.
Because wireless communications are an open channel for communication, compared to wired LANs, 802.11 developers also added encryption methods: Wired Equivalent Privacy (WEP) not anymore considered to be as secure Wireless protected access (WPA, WPA2, WPA3) for secure the wireless networks of computers.
A lot of access points provide Wi-Fi Secured Setup an easy but not considered secure, method for connecting the new device to a secure network.
Infrastructure
The majority of Wi-Fi networks are set up within the infrastructure mode. With infrastructure, devices like smartphones and laptops connect to the WAP in order to be part of the network. The WAP typically is connected to a network via wire and could also have permanent connectivity to wireless networks of other WAPs.
WAPs are typically fixed and offer service to clients nodes that are within their the range. Certain networks may include several WAPs with identical SSID as well as security configuration. If that is the scenario joining any of the WAPs in the network will connect clients to networks.
In addition, the client’s software will try to select the one that provides the most efficient service, for instance, that WAP that has the most powerful signal.
Peer-to-Peer or Ad-hoc wireless network
An Ad-hoc network is a network in which stations only communicate through peer-to-peer (P2P). There is no base , and no one grants permission to communicate. This is done by using IBSS, which stands for independent Basic Service Set (IBSS).
The Wireless Direct network is a unique kind of wireless network that lets stations exchange information peer-to-peer. In a peer to peer network, wireless devices that are within range of each other can find each other and talk directly without needing central access points.
Roaming
Roaming within Wireless Local Area Networks
Two definitions are available of wireless roaming on LANs:
Internal Roaming
A mobile device (MS) is moved to an access point (AP) to another AP within the home network when the signal strength is weak. An authentication server is responsible for the re-authentication process for MS by using 802.1x (e.g. using PEAP).
The charge for QoS is done through the network at home. An MS moving between access points another will often disrupt the flow of information between the MS and the application that is that is connected to the network.
The MS is one example. It regularly monitors the availability of other access points (ones which will offer a more reliable connection). In the end based on proprietary mechanism that the MS has developed, it is possible that the MS decides to associate with an AP that has a better wireless signal.
The MS could, however, be unable to connect to an AP prior to re-associating with another access point. To guarantee reliable connections with applications such as Microsoft Office, the MS should generally have software that supports persistent sessions. [5]
External Roaming
This MS (client) is able to connect to a wireless network of a different wireless Internet service provider (WISP) and uses their services. The user is able to use the foreign network in addition to his home network as long as the foreign network permits visitors to use their network.
There should be a separate security and billing methods to use mobile services on the foreign network. [clarification needed][citation needed]
Applications
The latest implementations of Wireless Local Area Networks (WLANs) range from small, in-home networks to huge, campus-sized ones to fully mobile networks that are found on planes and trains. Users can connect to the Internet through Wireless Local Area Network (WLAN) hotspots in restaurant hotels, and also using portable devices that are connected to 4G or 3G networks.
Current Wireless LAN infrastructures can also be used to function as Indoor positioning devices without any modification to the hardware.
Wireless Components of LAN
- User devices. Wireless LANs are used by users of many different devices, including laptops, PCs and PDAs.
- Radio NICs: The major component of a wireless network is the radio NIC, which operates inside the computer and also provides wireless connectivity.
- Access Points.
- Routers.
- Repeaters.
- Antennae.
The advantages from wireless local area networks (WLAN) :
- It’s a trusted type of communication.
- Because WLAN cuts down on physical wires, it’s an effective method of communicating.
- WLAN reduces the cost of ownership.
- It’s much easier to feature or eliminate workstations.
- It offers high-quality coverage due to the small-area coverage.
- It is also possible to move the workstation and maintain connectivity.
- For propagation, the sunlight of the eye isn’t necessary.
- The directions of connectivity are typically anyplace i.e. you can connect devices from any direction as long as they are within the reach of your access points.
- Installation is simple and you’d prefer not to have cables to install.
- It’s cost-effective because of the small area access.
- The power required is greater since it relies on transmitters so that the life of laptop batteries is affected.
The disadvantages from wireless local area networks (WLAN) :
- Wireless Local Area Network (WLAN) requires license.
- There’s only a small area in which to conceal in.
- The Government agencies can regulate signal flow on WLAN and also restrict it when needed. This will impact the transfer of data from devices connected to the internet.
- If the number of connected devices grows, then the speed of data transfer decreases.
- WLAN utilizes frequency, which could interfere with other devices that utilize frequency.
- If it’s raining or thundering, it could cause communication to be interrupted.
- Because of the low security, attackers have access to data that is transmitted.
- Signals may also be suffering from environmental factors when compared to fiber optics.
- The radiations from WLAN can be damaging to the environment.
- WLAN costs more than hubs and wires since it is able to connect to points.
- Signals can reach the nearby signals through access points.
- It’s necessary to alter your access and network cards as standardization changes.
- The LAN cable is still required and serves as the backbone of the WLAN.
- The data transfer speed is lower as compared to wired connections due to the fact that WLAN utilizes frequency.
- Communication isn’t secured and could be accessed by unauthorized users.
Read More : Artificial Intelligence | Explained & Deep lookup