Wi-Fi hotspot

Last updated
A diagram showing a Wi-Fi network WI-FI Range Diagram.svg
A diagram showing a Wi-Fi network

A hotspot is a physical location where people can obtain Internet access, typically using Wi-Fi technology, via a wireless local-area network (WLAN) using a router connected to an Internet service provider.

Contents

Public hotspots may be created by a business for use by customers, such as coffee shops or hotels. Public hotspots are typically created from wireless access points configured to provide Internet access, controlled to some degree by the venue. In its simplest form, venues that have broadband Internet access can create public wireless access by configuring an access point (AP), in conjunction with a router to connect the AP to the Internet. A single wireless router combining these functions may suffice. [1]

A private hotspot, often called tethering, may be configured on a smartphone or tablet that has a network data plan, to allow Internet access to other devices via password, Bluetooth pairing, or through the moeex protocol over USB, or even when both the hotspot device and the device[s] accessing it are connected to the same Wi-Fi network but one which does not provide Internet access. Similarly, a Bluetooth or USB OTG can be used by a mobile device to provide Internet access via Wi-Fi instead of a mobile network, to a device that itself has neither Wi-Fi nor mobile network capability passwords.

Uses

The public can use a laptop or other suitable portable device to access the wireless connection (usually Wi-Fi) provided. Of the e The iPass 2014 interactive map, that shows data provided by the analysts Maravedis Rethink, shows that in December 2014 there are 46,000,000 hotspots worldwide and more than 22,000,000 roamable hotspots. More than 10,900 hotspots are on trains, planes and airports (Wi-Fi in motion) and more than 8,500,000 are "branded" hotspots (retail, cafés, hotels). The region with the largest number of public hotspots is Europe, followed by North America and Asia. [2]

Libraries throughout the United States are implementing hotspot lending programs to extend access to online library services to users at home who cannot afford in-home Internet access or do not have access to Internet infrastructure. The New York Public Library was the largest program, lending out 10,000 devices to library patrons. [3] Similar programs have existed in Kansas, [4] Maine, [5] and Oklahoma; [6] and many individual libraries are implementing these programs. [7]

Wi-Fi positioning is a method for geolocation based on the positions of nearby hotspots. [8]

Security issues

Security is a serious concern in connection with public and private hotspots. There are three possible attack scenarios. First, there is the wireless connection between the client and the access point, which needs to be encrypted, so that the connection cannot be eavesdropped or attacked by a man-in-the-middle attack. Second, there is the hotspot itself. The WLAN encryption ends at the interface, then travels its network stack unencrypted and then, third, travels over the wired connection up to the BRAS of the ISP.

Depending upon the setup of a public hotspot, the provider of the hotspot has access to the metadata and content accessed by users of the hotspot. The safest method when accessing the Internet over a hotspot, with unknown security measures, is end-to-end encryption. Examples of strong end-to-end encryption are HTTPS and SSH.

Some hotspots authenticate users; however, this does not prevent users from viewing network traffic using packet sniffers. [9]

Some vendors provide a download option that deploys WPA support. This conflicts with enterprise configurations that have solutions specific to their internal WLAN.

The Opportunistic Wireless Encryption (OWE) standard provides encrypted communication in open Wi-Fi networks, alongside the WPA3 standard, [10] but is not yet widely implemented.

Unintended consequences

New York City introduced a Wi-Fi hotspot kiosk called LinkNYC with the intentions of providing modern technology for the masses as a replacement to a payphone. [11] Businesses complained they were a homeless magnet and CBS news observed transients with wires connected to the kiosk lingering for an extended period. [12] It was shut down following complaints about transient activity around the station and encampments forming around it. [11] Transients/panhandlers were the most frequent users of the kiosk since its installation in early 2016 spurring complaints about public viewing of pornography and masturbation. [13]

Locations

Public hotspots are often found at airports, bookstores, coffee shops, department stores, fuel stations, hotels, hospitals, libraries, public pay phones, restaurants, RV parks and campgrounds, supermarkets, train stations, and other public places. Additionally, many schools and universities have wireless networks on their campuses.

Types

Free hotspots

Public Wi-Fi hotspot in Zurich CHE -- ZH -- Zurich (public WiFi Hotspot) Mattes 2022-07-29.jpg
Public Wi-Fi hotspot in Zürich

According to statista.com, in the year 2022, there are approximately 550 million free Wi-Fi hotspots around the world. [14] The U.S. NSA warns against connecting to free public Wi-Fi. [15]

Free hotspots operate in two ways:

Commercial hotspots

A commercial hotspot may feature:

Many services provide payment services to hotspot providers, for a monthly fee or commission from the end-user income. For example, Amazingports can be used to set up hotspots that intend to offer both fee-based and free internet access, and ZoneCD is a Linux distribution that provides payment services for hotspot providers who wish to deploy their own service.[ citation needed ]

Roaming services are expanding among major hotspot service providers. With roaming service the users of a commercial provider can have access to other providers' hotspots, either free of charge or for extra fees, which users will usually be charged on an access-per-minute basis.[ citation needed ]

Software hotspots

Many Wi-Fi adapters built into or easily added to consumer computers and mobile devices include the functionality to operate as private or mobile hotspots, sometimes referred to as "mi-fi". [18] The use of a private hotspot to enable other personal devices to access the WAN (usually but not always the Internet) is a form of bridging, and known as tethering. Manufacturers and firmware creators can enable this functionality in Wi-Fi devices on many Wi-Fi devices, depending upon the capabilities of the hardware, and most modern consumer operating systems, including Android, Apple OS X 10.6 and later, [19] Windows, [20] and Linux [ citation needed ] include features to support this. Additionally wireless chipset manufacturers such as Atheros, Broadcom, Intel and others, may add the capability for certain Wi-Fi NICs, usually used in a client role, to also be used for hotspot purposes. However, some service providers, such as AT&T, [21] Sprint, [22] and T-Mobile [23] charge users for this service or prohibit and disconnect user connections if tethering is detected.[ citation needed ]

Third-party software vendors offer applications to allow users to operate their own hotspot, whether to access the Internet when on the go, share an existing connection, or extend the range of another hotspot.

Hotspot 2.0

Hotspot 2.0, also known as HS2 and Wi-Fi Certified Passpoint, [24] is an approach to public access Wi-Fi by the Wi-Fi Alliance. The idea is for mobile devices to automatically join a Wi-Fi subscriber service whenever the user enters a Hotspot 2.0 area, in order to provide better bandwidth and services-on-demand to end-users and relieve carrier infrastructure of some traffic.

Hotspot 2.0 is based on the IEEE 802.11u standard, which is a set of protocols published in 2011 to enable cellular-like roaming. If the device supports 802.11u and is subscribed to a Hotspot 2.0 service it will automatically connect and roam. [25] [26] [27]

Supported devices

  • Apple mobile devices running iOS 7 and up [28]
  • Some Samsung Galaxy smartphones [29]
  • Windows 10 devices have full support for network discovery and connection. [30]
  • Windows 8 and Windows 8.1 lack network discovery, but support connecting to a network when the credentials are known. [30]

Billing

EDCF user-priority list
 Net traffic
lowhigh
AudioVideoDataAudioVideoData
User needstime-critical750640
not time-critical--2--2

The "user-fairness model" is a dynamic billing model, which allows volume-based billing, charged only by the amount of payload (data, video, audio). Moreover, the tariff is classified by net traffic and user needs. [31] [ citation needed ]

If the net traffic increases, then the user has to pay the next higher tariff class. The user can be prompted to confirm that they want to continue the session in the higher traffic class.[ dubious discuss ] A higher class fare can also be charged for delay sensitive applications such as video and audio, versus non time-critical applications such as reading Web pages and sending e-mail.

Tariff classes of the user-fairness model
 Net traffic
lowhigh
User needstime-criticalstandardexclusive
not time-criticallow pricedstandard

The "User-fairness model" can be implemented with the help of EDCF (IEEE 802.11e). An EDCF user priority list shares the traffic in 3 access categories (data, video, audio) and user priorities (UP). [31]

See Service-oriented provisioning for viable implementations.

Depending upon the set up of a public hotspot, the provider of the hotspot has access to the metadata and content accessed by users of the hotspot, and may have legal obligations related to privacy requirements and liability for use of the hotspot for unlawful purposes. [32] In countries where the internet is regulated or freedom of speech more restricted, there may be requirements such as licensing, logging, or recording of user information.[ citation needed ] Concerns may also relate to child safety, and social issues such as exposure to objectionable content, protection against cyberbullying and illegal behaviours, and prevention of perpetration of such behaviors by hotspot users themselves.

European Union

The Data Retention Directive which required hotspot owners to retain key user statistics for 12 months was annulled by the Court of Justice of the European Union in 2014. The Directive on Privacy and Electronic Communications was replaced in 2018 by the General Data Protection Regulation, which imposes restrictions on data collection by hotspot operators.

United Kingdom

History

Public park in Brooklyn, New York has free Wi-Fi from a local corporation. CDSC wifi Classon jeh.jpg
Public park in Brooklyn, New York has free Wi-Fi from a local corporation.

Public access wireless local area networks (LANs) were first proposed by Henrik Sjoden at the NetWorld+Interop conference in The Moscone Center in San Francisco in August 1993. [33] Sjoden did not use the term "hotspot" but referred to publicly accessible wireless LANs.

The first commercial venture to attempt to create a public local area access network was a firm founded in Richardson, Texas known as PLANCOM (Public Local Area Network Communications). The founders of the venture, Mark Goode, Greg Jackson, and Brett Stewart dissolved the firm in 1998, while Goode and Jackson created MobileStar Networks. The firm was one of the first to sign such public access locations as Starbucks, [34] American Airlines, [35] and Hilton Hotels. [36] The company was sold to Deutsche Telecom in 2001, who then converted the name of the firm into "T-Mobile Hotspot". It was then that the term "hotspot" entered the popular vernacular as a reference to a location where a publicly accessible wireless LAN is available.

ABI Research reported there was a total of 4.9 million global Wi-Fi hotspots in 2012. [37] In 2016 the Wireless Broadband Alliance predicted a steady annual increase from 5.2m public hotspots in 2012 to 10.5m in 2018. [38]

See also

Related Research Articles

<span class="mw-page-title-main">Wireless LAN</span> Computer network that links devices using wireless communication within a limited area

A wireless LAN (WLAN) is a wireless computer network that links two or more devices using wireless communication to form a local area network (LAN) within a limited area such as a home, school, computer laboratory, campus, or office building. This gives users the ability to move around within the area and remain connected to the network. Through a gateway, a WLAN can also provide a connection to the wider Internet.

<span class="mw-page-title-main">Wireless network</span> Computer network not fully connected by cables

A wireless network is a computer network that uses wireless data connections between network nodes. Wireless networking allows homes, telecommunications networks, and business installations to avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. Admin telecommunications networks are generally implemented and administered using radio communication. This implementation takes place at the physical level (layer) of the OSI model network structure.

<span class="mw-page-title-main">Wireless community network</span>

Wireless community networks or wireless community projects or simply community networks, are non-centralized, self-managed and collaborative networks organized in a grassroots fashion by communities, non-governmental organizations and cooperatives in order to provide a viable alternative to municipal wireless networks for consumers.

<span class="mw-page-title-main">Wi-Fi</span> Wireless local area network

Wi-Fi is a family of wireless network protocols based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access, allowing nearby digital devices to exchange data by radio waves. These are the most widely used computer networks, used globally in home and small office networks to link devices and to provide Internet access with wireless routers and wireless access points in public places such as coffee shops, hotels, libraries, and airports.

<span class="mw-page-title-main">Wireless access point</span> Device that allows wireless devices to connect to a wired network

In computer networking, a wireless access point (WAP) is a networking hardware device that allows other Wi-Fi devices to connect to a wired network or wireless network. As a standalone device, the AP may have a wired or wireless connection to a switch or router, but in a wireless router it can also be an integral component of the networking device itself. A WAP and AP is differentiated from a hotspot, which can be a physical location or digital location where Wi-Fi or WAP access is available.

<span class="mw-page-title-main">Voice over WLAN</span> Use of a wireless network for the purpose of voice communication

Voice over wireless LAN (VoWLAN), also voice over Wi‑Fi (VoWiFi), is the use of a wireless broadband network according to the IEEE 802.11 standards for the purpose of vocal conversation. In essence, it is voice over IP (VoIP) over a Wi-Fi network. In most cases, the Wi-Fi network and voice components supporting the voice system are privately owned.

Wireless wide area network (WWAN), is a form of wireless network. The larger size of a wide area network compared to a local area network requires differences in technology. Wireless networks of different sizes deliver data in the form of telephone calls, web pages, and video streaming.

<span class="mw-page-title-main">Fon Wireless</span> UK Wi-Fi service company

Fon Wireless Ltd. is a for-profit company incorporated and registered in the United Kingdom that provides wireless services. Fon was founded in Madrid, Spain, in 2006, by Martín Varsavsky. Today, the company is headquartered in Bilbao.

<span class="mw-page-title-main">Wireless security</span> Aspect of wireless networks

Wireless security is the prevention of unauthorized access or damage to computers or data using wireless networks, which include Wi-Fi networks. The term may also refer to the protection of the wireless network itself from adversaries seeking to damage the confidentiality, integrity, or availability of the network. The most common type is Wi-Fi security, which includes Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is an old IEEE 802.11 standard from 1997. It is a notoriously weak security standard: the password it uses can often be cracked in a few minutes with a basic laptop computer and widely available software tools. WEP was superseded in 2003 by WPA, a quick alternative at the time to improve security over WEP. The current standard is WPA2; some hardware cannot support WPA2 without firmware upgrade or replacement. WPA2 uses an encryption device that encrypts the network with a 256-bit key; the longer key length improves security over WEP. Enterprises often enforce security using a certificate-based system to authenticate the connecting device, following the standard 802.11X.

IEEE 802.11u-2011 is an amendment to the IEEE 802.11-2007 standard to add features that improve interworking with external networks.

<span class="mw-page-title-main">Tethering</span> Means of sharing Internet connections

Tethering or phone-as-modem (PAM) is the sharing of a mobile device's Internet connection with other connected computers. Connection of a mobile device with other devices can be done over wireless LAN (Wi-Fi), over Bluetooth or by physical connection using a cable, for example through USB.

<span class="mw-page-title-main">Wi-Fi calling</span> Protocol that extends mobile voice, data and multimedia applications over IP networks

Wi-Fi calling, also called VoWiFi, refers to mobile phone voice calls and data that are made over IP networks using Wi-Fi, instead of the cell towers provided by cellular networks. Using this feature, compatible handsets are able to route regular cellular calls through a wireless LAN (Wi-Fi) network with broadband Internet, while seamlessly change connections between the two where necessary. This feature makes use of the Generic Access Network (GAN) protocol, also known as Unlicensed Mobile Access (UMA).

WISPr or Wireless Internet Service Provider roaming is a draft protocol submitted to the Wi-Fi Alliance that allows users to roam between wireless internet service providers in a fashion similar to that which allows cellphone users to roam between carriers. A RADIUS server is used to authenticate the subscriber's credentials.

Piggybacking on Internet access is the practice of establishing a wireless Internet connection by using another subscriber's wireless Internet access service without the subscriber's explicit permission or knowledge. It is a legally and ethically controversial practice, with laws that vary by jurisdiction around the world. While completely outlawed or regulated in some places, it is permitted in others.

<span class="mw-page-title-main">Wireless@SG</span> Wireless broadband programme

Wireless@SG is a wireless broadband programme developed by the Infocomm Development Authority (IDA) of Singapore as part of its Next Generation National Infocomm Infrastructure initiative, being part of the nation's 10-year masterplan called Intelligent Nation 2015 (iN2015).

<span class="mw-page-title-main">MiFi</span> Brand name for a wireless router that acts as mobile Wi-Fi hotspot

MiFi is a brand of wireless router that acts as a mobile Wi-Fi hotspot device.

<span class="mw-page-title-main">Mobile broadband modem</span> Modem providing Internet access via a wireless connection

A mobile broadband modem, also known as wireless modem or cellular modem, is a type of modem that allows a personal computer or a router to receive wireless Internet access via a mobile broadband connection instead of using telephone or cable television lines. A mobile Internet user can connect using a wireless modem to a wireless Internet Service Provider (ISP) to get Internet access.

Connectify is an American software company that develops networking software for consumers, professionals and companies. Connectify Hotspot is a virtual router software for Microsoft Windows, and Speedify is a mobile VPN service and app with channel bonding capabilities, available for individuals, families and enterprise.

The Cloud is a provider of public access Wi-Fi hotspots in the United Kingdom and is a member of the Wireless Broadband Alliance. It has over 22,000 Wi-Fi hotspots network access points in the UK.

<span class="mw-page-title-main">Goodspeed (internet provider)</span> Wi-Fi hotpost

Goodspeed is a mobile Wi-Fi hotspot developed and produced by Uros Ltd and manufactured in Finland by Sanmina Corporation. This mobile hotspot-router is used to connect up to 5 Wi-Fi enabled clients to a private WLAN.

References

  1. Ngo, Dong (30 October 2012). "Networking buying guide" . Retrieved 13 April 2013.
  2. "IPass Wi-Fi Growth Map". ipass.com. Retrieved 31 October 2015.
  3. "Library HotSpot". The New York Public Library.
  4. "MiFi Pilot 2 (Borrow the Internet @ your library)". Kansas State Library, KS.
  5. "Check-out the Internet Project, Washington County". Maine State Library.
  6. "OSU, public libraries working together to bridge 'digital divide' in rural Oklahoma". Oklahoma State University. 6 June 2018.
  7. Schrubbe, Alexis (11 January 2017). "'Borrowing' the Internet: Library Program Lets Patrons Take Access Home". Daily Yonder. Retrieved 2018-06-13.
  8. Kotaru, Manikanta; Joshi, Kiran; Bharadia, Dinesh; Katti, Sachin (2015-01-01). "SpotFi". Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication. SIGCOMM '15. New York, NY, USA: ACM. pp. 269–282. doi:10.1145/2785956.2787487. ISBN   978-1-4503-3542-3. S2CID   8728165.
  9. "Internet Security Podcast episode 10: Free WiFi And The Security issues it poses". 18 February 2013. Archived from the original on 31 August 2014. Retrieved 13 April 2013.
  10. "WPA3: How and why the Wi-Fi standard matters". HPE. August 8, 2018.
  11. 1 2 McGeehan, Patrick (2016-09-14). "Free Wi-Fi Kiosks Were to Aid New Yorkers. An Unsavory Side Has Spurred a Retreat. (Published 2016)". The New York Times. ISSN   0362-4331 . Retrieved 2020-12-24.
  12. "New Yorkers Express Concern About Homeless At LinkNYC Kiosks". 2018-10-10. Retrieved 2020-12-24.
  13. York, Associated Press in New (2016-09-14). "New York's Wi-Fi kiosks disabled after complaints of people watching porn". the Guardian. Retrieved 2020-12-24.
  14. "Global public Wi-Fi hotspots 2016-2022". Statista. Retrieved 2022-04-21.
  15. "NSA Issues Guidance on Securing Wireless Devices in Public Settings". National Security Agency/Central Security Service. Retrieved 2022-04-21.
  16. Tips for Using Public Wi-Fi Networks. (2014). Retrieved from https://www.consumer.ftc.gov/articles/0014-tips-using-public-wi-fi-networks
  17. "What is Open vs Closed Network". igi-global.com. Retrieved 2019-04-03.
  18. "Mi-Fi". Sprint PCS.
  19. Langer, Maria (2010). Mac OS X 10.6 Snow Leopard: Visual QuickStart Guide. Peachpit Press. ISBN   9780321658999 . Retrieved 29 June 2016.
  20. "How to set up a mobile hotspot with Windows 10". Greg Shultz . February 1, 2018. Retrieved 29 June 2019.
  21. "Mobile Hotspots". AT&T Shop.
  22. "New Mobile Hotspot Plans and Usage Notification Options". Sprint Community: Plans. May 16, 2012. Archived from the original on November 29, 2014.
  23. "Smartphone Mobile Hotspot". Tethering FAQ. Archived from the original on 2014-11-29.
  24. vonNagy, Andrew (20 May 2012). "Wi-Fi Alliance Rebrands Hotspot 2.0 as Wi-Fi Certified Passpoint" . Retrieved 13 April 2012.
  25. Simkins, Rob (10 January 2012). "Hotspot 2.0" . Retrieved 13 April 2013.
  26. Burton, Marcus (10 January 2012). "Hotspot 2.0 and the Next Generation Hotspot" . Retrieved 13 April 2013.
  27. Fitchard, Kevin (March 7, 2014). "Hotspot 2.0 inches its way into public Wi-Fi networks". Gigaom.
  28. Brownlee, John (2013-06-12). "iOS 7 Will Make It Possible To Roam Between Open Wi-Fi Networks Without Your Data Ever Dropping". Cult of Mac. Retrieved 2013-09-16.
  29. Branscombe, Mary (3 October 2012). "Wi-Fi roaming: Hotspot 2.0 and Next Generation Hotspot". ZDNet . Retrieved 13 April 2013.
  30. 1 2 "Hotspot 2.0 - Windows Hardware Dev" . Retrieved 24 April 2016.
  31. 1 2 Pommer, hermann (2008-03-25). Roaming zwischen Wireless Local Area Networks. Saarbrücken: VDM Verlag. ISBN   978-3-8364-8708-5.
  32. "HTL Support Ts and Cs - HTL".
  33. Wi-Fi Timeline. Wifi Net News. August 8, 2002.
  34. Marsan, Carolyn Duffy (25 June 2001). "Starbucks wireless network a sweet deal for MobileStar". Archived from the original on 15 October 2013. Retrieved 13 April 2013.
  35. "American Airlines and MobileStar Network to Deliver Wireless Internet Connectivity to American's Passengers". PR Newswire . 11 May 2000. Retrieved 13 April 2013.
  36. "MobileStar Network to Supply U.S. Hilton Hotels With Wireless High-Speed Internet Access". 28 October 1998. Retrieved 13 April 2013.
  37. "Demand for Mobility will Boost Global Wi-Fi Hotspots to Reach 6.3 Million in 2013". ABI Research.
  38. Jinia, Irashe. "Don't Buy AT&T Internet Plans Until You Read This!". internet.realitytvcalendar.com. Retrieved 28 December 2016.

[1]

  1. Ward, Phillip (Monday, 01 July, 2013). "Digital Economy Act 2010: Copyright". UK Commons Library . Archived from the original on May 22nd, 2024. Retrieved Monday, November 18th 2024.{{cite web}}: Check date values in: |access-date=, |date=, and |archive-date= (help)