Wireless Personal Area Networks (WPANs)

The idea of personal area networks (PANs) has been around for a long time, a computer's motherboard has long been considered to be a personal area network. With the advent of wireless technologies like InfraRed and Bluetooth the term wireless personal area network (WPAN) has been added to the networking nomenclature. WPAN is based on the standard IEEE 802.15. Examples of WPANs include using a wireless keyboard and/or mouse to provide input to your computer, wireless phones and cellular phones using Bluetooth headsets, device which send data to a printer with an infrared receiver, remote controls for digital cameras and camcorders, audio headsets which receive signals from tablet PCs or other wireless audio transmitters, joysticks and other peripherals used in conjunction with game boxes, mobile devices capable of exchanging data via wireless communications and a lot more. Like the term personal area network (PAN), a WPAN consist of devices which communicate with each other when positioned at a relativity short distance from each other.


Infrared Data Association logo.

The Infrared Data Association (IrDA) is an international standards body responsible for creating standards that apply to the use of infrared (Ir) light to provide wireless connectivity for devices and/or locations that typically would typically require more traditional wire-based solutions. IrDA uses Infrared (IR) light to transmit signals between devices and uses a narrow angle (30 degree cone). IrDA is limited to about 1 meter in range and offers a transmission rates ranging from 9600 bps to 4 Mbps. IrDA is considered a point-to-point transmission technology and is limited to line of sight. That is to say that it cannot travel through or around solid objects. The most commonly implemented InfraRed (IR) PANs are that of an IR equipped laptop communicating with an IR enabled printer. Many TV remote controls and newer Media Center PC's remote controls use infrared technology to communicate with their base equipment. Numerous devices such as PDAs, Cameras, Laptop computers and computer peripherals offer support for IrDA as well.


Bluetooth SIG logo.

Bluetooth has pretty much all but replaced IrDA as the technology of choice for WPANs. Originally developed by Erickson, Bluetooth is currently backed by the Bluetooth Special Interest Group (SIG), a collection of Bluetooth promoters that includes 3COM, IBM, Intel, Microsoft, and Nokia, among others, with the purpose of developing and promoting the use of the Bluetooth technology. Bluetooth operates in the 2.4 to 2.4835 GHz radio frequency (RF) range which makes it susceptible to interference by cordless telephones, microwave ovens, and IEEE 802.11b/g Wifi equipped devices. In order to reduce interference caused by devices operating in the same frequency range as Bluetooth, it uses a technique know as Frequency Hop Spread Spectrum (FHSS), which means it is constantly hopping from one frequency to the next within its frequency range. The pattern of frequency hopping must be known by the wireless receiver so that the message can be reconstructed correctly. A given wireless transceiver's signal is on a given frequency for less than a second. By constantly changing frequency, the transmission tends to be less affected by interference, an especially desirable characteristic for mobile computing applications.

Bluetooth protocol stack.
Bluetooth Protocol Stack

Bluetooth offers data speeds of up to 1 Mbps over a distance of 10 meters. Unlike IrDA, Bluetooth supports a LAN-like mode where multiple devices can interact with each other. Since Bluetooth does not require line-of-sight it is also much more flexible when compared to IrDA. The key limitations of Bluetooth are security and interference with wireless LANs (IEEE 802.11) devices as stated previously. The fact that Bluetooth doesn't require line-of-sight to communicate cuts both ways: while it makes it possible to use your PDA with your cellular phone that is stashed in your briefcase, it also makes it possible for someone else with a device hidden from view to attempt to gain illicit access to your computing devices. Bluetooth attempts to mitigate the risk through the use of strong authentication and encryption technologies. Because Bluetooth has the same frequency range as IEEE 802.11b wireless networks, simultaneous use of both technologies can greatly affects performance. Devices that use Bluetooth include: wireless keyboards and mice, hands-free cellular phone devices, PDAs, headphones and mobile gaming devices.

Bluetooth Profiles

In order to use Bluetooth technology, a device must be compatible with the subset of Bluetooth profiles (often called services) necessary to use the desired services. A Bluetooth profile is a specification regarding an aspect of Bluetooth-based wireless communication between devices. It resides on top of the Bluetooth Core Specification and (optionally) additional protocols. While the profile may use certain features of the core specification, specific versions of profiles are rarely tied to specific versions of the core specification. For example, there are Hands-Free Profile (HFP) 1.5 implementations using both Bluetooth 2.0 and Bluetooth 1.2 core specifications. The way a device uses Bluetooth technology depends on its profile capabilities. The profiles provide standards which manufacturers follow to allow devices to use Bluetooth in the intended manner. For the Bluetooth low energy stack according to Bluetooth 4.0 a special set of profiles applies. At a minimum, each profile specification contains information on the following topics:

  • Dependencies on other formats

  • Suggested user interface formats

  • Specific parts of the Bluetooth protocol stack used by the profile. To perform its task, each profile uses particular options and parameters at each layer of the stack. This may include an outline of the required service record, if appropriate.

List of Bluetooth profiles


Z-Wave is a wireless communications protocol used primarily for home automation. It is a mesh network using low-energy radio waves to communicate from appliance to appliance, allowing for wireless control of residential appliances and other devices, such as lighting control, security systems, thermostats, windows, locks, swimming pools, and garage door openers. Like other protocols and systems aimed at the home and office automation market, a Z-Wave system can be controlled via the Internet from a smart phone, tablet, or computer, and locally through a smart speaker, wireless keyfob, or wall-mounted panel with a Z-Wave gateway or central control device serving as both the hub controller and portal to the outside. Z-Wave provides the application layer interoperability between home control systems of different manufacturers that are a part of its alliance. There is a growing number of interoperable Z-Wave products; over 1,700 in 2017, and over 2,600 by 2019

The Z-Wave protocol was developed by Zensys, a Danish company based in Copenhagen, in 1999. That year, Zensys introduced a consumer light-control system, which evolved into Z-Wave as a proprietary system on a chip (SoC) home automation protocol on an unlicensed frequency band in the 900 MHz range. Its 100 series chip set was released in 2003, and its 200 series was released in May 2005, with the ZW0201 chip offering high performance at a low cost. Its 500 series chip, also known as Z-Wave Plus, was released in March 2013, with four times the memory, improved wireless range, and improved battery life. The technology began to catch on in North America around 2005, when five companies, including Danfoss, Ingersoll-Rand and Leviton Manufacturing, adopted Z-Wave. They formed the Z-Wave Alliance, whose objective is to promote the use of Z-Wave technology, with all products by companies in the alliance interoperable. In 2005, Bessemer Venture Partners led a $16 million third seed round for Zensys. In May 2006, Intel Capital announced that it was investing in Zensys, a few days after Intel joined the Z-Wave Alliance. In 2008, Zensys received investments from Panasonic, Cisco Systems, Palamon Capital Partners and Sunstone Capital. Z-Wave was acquired by Sigma Designs in December 2008.[9][13] Following the acquisition, Z-Wave's U.S. headquarters in Fremont, California were merged with Sigma's headquarters in Milpitas, California.[9][14] As part of the changes, the trademark interests in Z-Wave were retained in the United States by Sigma Designs and acquired by a subsidiary of Aeotec Group in Europe.[15][16] On January 23, 2018, Sigma announced it planned to sell the Z-Wave technology and business assets to Silicon Labs for $240 million,[17] and the sale was completed on April 18, 2018.[18] In 2005, there were six products on the market that used Z-Wave technology. By 2012, as smart home technology was becoming increasingly popular, there were approximately 600 products using Z-Wave technology available in the U.S. As of January 2019, there are over 2,600 Z-Wave certified interoperable products.

Z-Wave Alliance website

Wireless Local Area Networks (WLANs)

WiFi Alliance logo.

Wireless LANs devices communicate using the WiFi transmission technology which is defined by the IEEE in a specification known as 802.11 and is trademarked by the WiFi Alliance. There have been several generations of the 802.11 standard introduced over the last decade including: 802.11b (11 Mbps), 802.11a (54 Mbps), and 802.11g (also 54 Mbps but offering a further reach than 802.11a). 802.11g is currently the most popular, but soon will be replaced by 802.11n which is currently in the draft stage and will offer speeds up to 540 Mbps.

Linksys Wireless Access Point (WAP)

Wireless devices such as wireless network cards and wireless hubs usually support two wireless modes: AdHoc and Infrastructure. If you simply want two wireless devices to communicate with each other, then both devices should be set to AdHoc mode. If you would like to have multiple wireless devices to be able to access your home or company LAN through a wireless access point (WAP) a.k.a. Access Point (AP), then all of the wireless devices, including the device being used as the access point, should be set to Infrastructure mode. Many businesses like coffee shops, airports, even city malls offer access to their local area networks and the Internet to the public using WAPs. The term used to refer to these publicly accessible WAPs is a wireless "hot spot." In some cases users are charged a fee for access to the network, in other cases they are not, it is typically up to the business providing the service the make that decision.

Wireless Access Points (WAPs) and Service Set Identifier (SSIDs)

When in Infrastructure mode (the default mode), WAPs can be used as access points for other wireless devices to connect to wired LANs. WAPs broadcast SSIDs which are 32 octet (byte) IDs that enable other wireless devices to "see" and thereby establish a connection with the access point which has a wired connection to a LAN switch port. For security reasons some network administrators will disable the broadcasting of an SSID by their WAP devices to prevent unwanted users from being able to detect the access points and attempt to hack into them. A hacker technique known as "war games driving" is sometimes used by unscrupulous people who cruise industrial parks and residential neighborhoods looking for WAPs that they can access and use for devious purposes without detection of where the activity is truly originating from. However, turning off the broadcasting of a WAP's SSID does not prevent the hacker's ability to gain access to the WAP. Anytime a legitimate device connects to the WAP the SSID is transmitted clear text and a hacker can passively "sniff" the wireless network signal and detect the exchange of the SSID between the two devices.

WAP Security

The best way to prevent access to a WAP by unwanted users is to use authentication protocols like RADIUS. Although considered an expensive solution, authentication techniques are commonly used by WiFi hot spots. A simpler more cost effective means of protecting access to a WAP is to secure WAP transmissions. WAP transmissions can be secured by using the less stringent Wireless Encryption Protocol (WEP) which is considered to be weak for most security purposes. Newer second and third generation protocols known as WiFi Protected Access (WPA) versions 1 and 2 are considered very secure when used with strong password protection and are built-in to most of the newer WAPs.

Ad-Hoc Mode

When WAPs are configured for Ad-Hoc mode they can communicate directly with each other and other wireless devices, but cannot bridge to wired LANs. Ad-Hoc mode allows you to build an all-wireless LAN, but performance suffers as the numbers of devices increases, and large ad-hoc networks can quickly become difficult to manage.

Wireless Regional Area Networks (WRANs)

WRANs are defined by the IEEE's 802.22 standardization committee, it utilizes the unused channels within the range of television frequencies and is not currently in wide use in the United States.

Wireless Wide Area Networks (WWANs)

WWANs use the cellular networks of mobile telecommunications companies to provide access to a multitude of services. Cellular transceivers attached to a computer's PCMCIA or USB port as well as many brands of cellular phones themselves can be used for Internet access, transferring email, downloading music and even watching streamed video transmissions. Due to the vast infrastructure made available by mobile telecommunications companies, WWANs are accessible globally by properly equipped mobile users. WWANs utilize 4G transmission technologies like Long Term Evolution (LTE) and WiMAX as well as 3G cellular technologies including: the Universal Telecommunications System (UMTS) and CDMA2000. The transmission method used by your mobile device's cellular transceiver must match a transmission method used by your mobile service provider's cellular towers in order to gain access to their network. Below is a listing of the more recent transmission methods used by the major cellular service providers. Many mobile devices, like smartphones and tablets also support WiFi transmisison standards (IEEE 802.11a/b/g/n) which are wireless LAN-based transmission methods. Meaning you can use your company-based or home-based LAN to access your local network in addition to being able to access the Internet provided the LAN offers a compatible IEEE 802.11 wireless access point (WAP). Some telecommunications companies, like AT&T also offer access to their network by offering WiFi hotspots in some metropolitan areas.

Long Term Evolution (LTE)

The pre-4G technology 3GPP Long Term Evolution (LTE) is often branded "4G-LTE", but the first LTE release does not fully comply with the International Mobile Telecommunications Advanced (IMT-Advanced) requirements. LTE has a theoretical net bit rate capacity of up to 100 Mbit/s in the downlink and 50 Mbit/s in the uplink if a 20 MHz channel is used — and more if multiple-input multiple-output (MIMO), i.e. antenna arrays, are used. The physical radio interface was at an early stage named High Speed OFDM Packet Access (HSOPA), now named Evolved UMTS Terrestrial Radio Access (E-UTRA). The first LTE USB dongles do not support any other radio interface. The world's first publicly available LTE service was opened in the two Scandinavian capitals Stockholm (Ericsson and Nokia Siemens Networks systems) and Oslo (a Huawei system) on 14 December 2009, and branded 4G. The user terminals were manufactured by Samsung. Currently, the three publicly available LTE services in the United States are provided by MetroPCS (the first to offer LTE in the U.S. in 2010), Verizon Wireless, and AT&T. As of April 2012, US Cellular also offers 4G LTE. Sprint Nextel has also stated it's considering switching from WiMAX to LTE in early 2012.


LTE Advanced (Long-term-evolution Advanced) is a candidate for IMT-Advanced standard, formally submitted by the 3GPP organization to ITU-T in the fall 2009, and expected to be released in 2012. The target of 3GPP LTE Advanced is to reach and surpass the ITU requirements. LTE Advanced is essentially an enhancement to LTE. It is not a new technology but rather an improvement on the existing LTE network. This upgrade path makes it more cost effective for vendors to offer LTE and then upgrade to LTE Advanced which is similar to the upgrade from WCDMA to HSPA. LTE and LTE Advanced will also make use of additional spectrum and multiplexing to allow it to achieve higher data speeds. Coordinated Multi-point Transmission will also allow more system capacity to help handle the enhanced data speeds. Release 10 of LTE is expected to achieve the IMT Advanced speeds of 1 Gbps peak download and 500 Mbps peak upload. Release 8 currently supports up to 300 Mbit/s download speeds which is obviously still short of the IMT-Advanced standards.


WiMax Forum logo.

Worldwide Interoperability for Microwave Access (WiMAX) uses microwave technology to transmit and receive and is best suited for Metropolitan Area Network (MAN) applications. WiMAX is defined by the IEEE's 802.16 standards committee and is designed to replace DSL and cable as an option for high-speed access in the "last mile" of data and telecommunications. The last mile or "local loop" is essentially the connection made by a business or residential subscriber to the telecommunications company's central office. Although fiber optics offers the highest transfer rates in these situations, the advantage of WiMAX is, of course, mobility. WiMAX offers peak data rates of 128 Mbit/s downlink and 56 Mbit/s uplink over 20 MHz wide channels. Sprint Nextel has deployed WiMAX technology which it has labeled 4G as of October 2008. It is currently deploying to additional markets and is the first US carrier to offer a WiMAX phone. Caution: Sprint Nextel's 4G coverage area is usually limited to major metropolitan areas. Be sure to check your cell provider's coverage map before purchasing a 4G phone because you may live in an area which does not offer 4G service. In the case of Sprint Nextel, if you buy a 4G phone but live in an area that has no 4G coverage you will still be required to pay an extra $10 per month for the 4G service even though you don't have access to their 4G network.

HTC's EVO 4G phone supports the WiMAX technology.

Ultra Mobile Broadband (UMB) (formerly EV-DO Rev. C)

UMB was the brand name for a discontinued 4G project within the 3GPP2 standardization group to improve the CDMA2000 mobile phone standard for next generation applications and requirements. In November 2008, Qualcomm, UMB's lead sponsor, announced it was ending development of the technology, favoring LTE instead. The objective was to achieve data speeds over 275 Mbit/s downstream and over 75 Mbit/s upstream.

Universal Telecommunications System (UMTS)

In the U.S. the 1710 – 1755 MHz bandwidth is used for uplinks and the 2110 – 2155 MHz bandwidth is used for downlinks. It offers data transfer rates of 14 Mbps theoretical, but in actuality 2 Mbps stationary, 384 Kbps moving downstream and 100 Kbps moving upstream. In the U.S. UMTS is primarily used by AT&T and T-Mobile for their mobile network services.

Evolution Data-Optimized (EVDO) revision B

Primarily used by Sprint and Verizon in the U.S., EV-DO is a 3G digital radio technology that is based on Code Division Multiple Access (CDMA2000) technology which has an advantage over its competitors in that more cell phones can be served by fewer cell towers. The drawback to CDMA is that the technology is patented by Qualcomm which charges a usage fee for each device that uses its technology. It is defined to operate at 450 MHz, 700 MHz, 800 MHz, 900 MHz, 1700 MHz, 1800 MHz, 1900 MHz, and 2100 MHz EVDO revision A offers similar data rates to that of UMTS, but revision B offers 4.9 Mbps on the downlink.

Links of Interest