Raising the Bar(s) in Wireless

Blog Date:  7/17/2013
Author:  Ray Coulombe

One of the consistent trends we’ve seen in networking is the continuous increase in network speeds. In wired networks, more devices are appearing with 10 Gbps capability, while 40 Gbps and 100 Gbps equipment is on the horizon.
Wireless, too, has seen a migration in its transmission capabilities. In cellular data, most current devices are either 3G or 4G, with 5G imminent. (The “G” refers to the current generation of wireless technology employed.) Different vendors have various implementation solutions. It’s interesting to note that Samsung, in May, 2013, announced a key technical breakthrough in the use of millimeter-wave technology at 28 GHZ supporting their 5G approach, promising speeds in excess of 1 Gbps.
IEEE defines a family of wireless standards in the 802.11 family. We should all be familiar with 802.11 a, b, and g (most home routers support these) and possibly 802.11n. 802.11n upped the maximum bandwidth ante over 802.11g from 54 Mbps to 600 Mbps. It did so by providing for the use of multiple antennas using MIMO (multiple input, multiple output) technology. 802.11n operates at either 2.4 GHz or 5 GHz and provides approximate ranges of 230 ft. (indoors) and 820 ft. (Outdoors).The first generation of 802.11n devices that came to market a few years ago supported a maximum data rate of 300 Mbps by running two spatial streams. Each stream could carry 75 Mbps of data per 20 MHz of spectrum, over a double-wide 40-MHz channel. Newer devices, supporting 3 spatial streams, offer 450 Mbps capability. Common notation is a x b : c , where “a” is the maximum number of transmit antennas or TX RF chains that can be used by the radio; “b” is the radio’s maximum number of receive antennas or RX RF chains; and “c” is the maximum number of spatial streams. The maximum 600 Mbps can only be achieved with 4 spatial streams.
Fifth generation Wi-Fi, 802.11ac, can be thought of as an enhanced 802.11n, but operates only at 5 GHz. It increases the number of parallel spatial streams to 8, with the effect of significantly improved wireless network speeds. It is expected to help accommodate the need in an enterprise for increased bandwidth to deal with increasing numbers of smart devices (BYOD) and the growing use of video streaming. 802.11ac devices are expected to be dual-band, meaning that they can operate on both the 2.4GHz and 5GHz frequency bands. If such a device can’t connect at 5GHz using the 802.11ac protocol, it will attempt to drop back to 2.4GHz using 802.11n. Dual-band routers are capable of operating networks on both frequencies simultaneously, providing the ability to use different bands for different applications, e.g., 5 GHz band for media streaming and other high-performance applications. The Wi-Fi Alliance has initiated a certification program for routers, adapters, and other wireless networking gear based on the IEEE 802.11ac draft standard, where final ratification isn’t expected until February 2014. Industry analysts expect initial products to offer 433 - 1300 Mbps capability, followed by second generation products with configurations operating at up to 3.47 Gbps. Indoor distance capability will approach 300 feet.
Link to Complete Article as it appeared in Security Technology Executive Magazine


Resource Blogs

Most Recent Blog List for Blog Author: Ray Coulombe

Security Specifier Blog List Image for  Stay Safe! While Traveling This Summer

Stay Safe! While Traveling This Summer

It’s summer vacation time! The last thing you need to worry about it is getting your identity stolen while you’re sitting on a beach somewhere exotic. In 2016, more than 15 million Americans were victims of identity theft, up 16 percent from the previous year, according to Experian. Plus, about 33 percent of that fraud took place when people were traveling. Here’s a few tips to staying safe all summer while traveling...
read more -->

Security Specifier Blog List Image for Rethinking Cabling

Rethinking Cabling

Cat 5e became an ANSI/TIA/EIA standard in 2001, Cat 6 in 2002, and Cat 6a in 2008. However, it may be extremely useful to consider taking advantage of other existing cabling infrastructure in lieu of running new. Read more to learn how to approach cabling.
read more -->

Security Specifier Blog List Image for Off the Beaten Path at ISC West

Off the Beaten Path at ISC West

This year at ISC (the International Security Conference and Exposition), I was determined to try to see the latest iStechnologies hiding in the nooks and crannies—literally! I visited booths in the back, the basement, small kiosks hidden inside larger vendor books, and throughout the Emerging Technology Zone.

In case you missed the show, I’ll round up some of the best new technologies and companies to keep an eye on. Read more.
read more -->

Security Specifier Blog List Image for Cyber Crime Taking Down Cities

Cyber Crime Taking Down Cities

Earlier this year, in March, the City of Atlanta’s nearly 8,000 employees heard words they never thought they would hear: “It’s okay to turn your computers on.” Their computers were powered off for five days. In those five days Atlanta residents could not pay traffic tickets, water bills, or report city issues. Read how ransomware impacted this metropolitan area.
read more -->

Security Specifier Blog List Image for A Few Thoughts on K-12 School Security

A Few Thoughts on K-12 School Security

There is no one size fits all when it comes to K-12 school security. Schools vary in so many ways: size, age, local environment, affluence, culture, governance, and more. Read some helpful tips and resources that might just help your school be better prepared.
read more -->

Copyright Ⓒ 2010 SecuritySpecifiers™