WiFi hotspot
   HOME

TheInfoList



OR:

A hotspot is a physical location where people can obtain
Internet access Internet access is the ability of individuals and organizations to connect to the Internet using computer terminals, computers, and other devices; and to access services such as email and the World Wide Web. Internet access is sold by Interne ...
, typically using
Wi-Fi Wi-Fi () is a family of wireless network protocols, based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access, allowing nearby digital devices to exchange data by radio waves ...
technology, via a wireless local-area network (WLAN) using a router connected to an
Internet service provider An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise priva ...
. Public hotspots may be created by a business for use by customers, such as coffee shops or hotels. Public hotspots are typically created from
wireless access point In computer networking, a wireless access point (WAP), or more generally just access point (AP), is a networking hardware device that allows other Wi-Fi devices to connect to a wired network. As a standalone device, the AP may have a wired ...
s configured to provide Internet access, controlled to some degree by the venue. In its simplest form, venues that have
broadband Internet access Internet access is the ability of individuals and organizations to connect to the Internet using computer terminals, computers, and other devices; and to access services such as email and the World Wide Web. Internet access is sold by Inte ...
can create public wireless access by configuring an access point (AP), in conjunction with a router to connect the AP to the Internet. A single wireless router combining these functions may suffice. A private hotspot, often called tethering, may be configured on a smartphone or tablet that has a
network Network, networking and networked may refer to: Science and technology * Network theory, the study of graphs as a representation of relations between discrete objects * Network science, an academic field that studies complex networks Mathematic ...
data plan, to allow Internet access to other devices via Bluetooth pairing, or through the
RNDIS The Remote Network Driver Interface Specification (RNDIS) is a Microsoft proprietary protocol used mostly on top of USB. It provides a virtual Ethernet link to most versions of the Windows, Linux, and FreeBSD operating systems. Multiple revisions of ...
protocol over USB, or even when both the hotspot device and the device accessing it are connected to the same Wi-Fi network but one which does not provide Internet access. Similarly, a Bluetooth or
USB OTG USB On-The-Go (USB OTG or just OTG) is a specification first used in late 2001 that allows USB devices, such as tablets or smartphones, to act as a host, allowing other USB devices, such as USB flash drives, digital cameras, mouse or keyboard ...
can be used by a mobile device to provide Internet access via Wi-Fi instead of a mobile network, to a device that itself has neither Wi-Fi nor mobile network capability.


Uses

The public can use a
laptop A laptop, laptop computer, or notebook computer is a small, portable personal computer (PC) with a screen and alphanumeric keyboard. Laptops typically have a clam shell form factor with the screen mounted on the inside of the upper li ...
or other suitable portable device to access the wireless connection (usually
Wi-Fi Wi-Fi () is a family of wireless network protocols, based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access, allowing nearby digital devices to exchange data by radio waves ...
) provided. Of the estimated 150 million laptops, 14 million
PDA PDA may refer to: Science and technology * Patron-driven acquisition, a mechanism for libraries to purchase books *Personal digital assistant, a mobile device * Photodiode array, a type of detector * Polydiacetylenes, a family of conducting po ...
s, and other emerging Wi-Fi devices sold per year for the last few years, most include the Wi-Fi feature. The iPass 2014 interactive map, that shows data provided by the analysts Maravedis Rethink, shows that in December 2014 there are 46,000,000 hotspots worldwide and more than 22,000,000 roamable hotspots. More than 10,900 hotspots are on trains, planes and airports (Wi-Fi in motion) and more than 8,500,000 are "branded" hotspots (retail, cafés, hotels). The region with the largest number of public hotspots is Europe, followed by North America and Asia. Libraries throughout the United States are implementing hotspot lending programs to extend access to online library services to users at home who cannot afford in-home Internet access or do not have access to Internet infrastructure. The
New York Public Library The New York Public Library (NYPL) is a public library system in New York City. With nearly 53 million items and 92 locations, the New York Public Library is the second largest public library in the United States (behind the Library of Congress) ...
was the largest program, lending out 10,000 devices to library patrons. Similar programs have existed in Kansas, Maine, and Oklahoma; and many individual libraries are implementing these programs. Wi-Fi positioning is a method for
geolocation Geopositioning, also known as geotracking, geolocalization, geolocating, geolocation, or geoposition fixing, is the process of determining or estimating the geographic position of an object. Geopositioning yields a set of geographic coordinates ...
based on the positions of nearby hotspots.


Security issues

Security is a serious concern in connection with public and private hotspots. There are three possible attack scenarios. First, there is the wireless connection between the client and the access point, which needs to be
encrypted In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can deci ...
, so that the connection cannot be eavesdropped or attacked by a
man-in-the-middle attack In cryptography and computer security, a man-in-the-middle, monster-in-the-middle, machine-in-the-middle, monkey-in-the-middle, meddler-in-the-middle, manipulator-in-the-middle (MITM), person-in-the-middle (PITM) or adversary-in-the-middle (AiTM) ...
. Second, there is the hotspot itself. The WLAN encryption ends at the interface, then travels its network stack unencrypted and then, third, travels over the wired connection up to the
BRAS A broadband remote access server (BRAS, B-RAS or BBRAS) routes traffic to and from broadband remote access devices such as digital subscriber line access multiplexers (DSLAM) on an Internet service provider's (ISP) network. BRAS can also be refe ...
of the ISP. Depending upon the setup of a public hotspot, the provider of the hotspot has access to the metadata and content accessed by users of the hotspot. The safest method when accessing the Internet over a hotspot, with unknown security measures, is
end-to-end encryption End-to-end encryption (E2EE) is a system of communication where only the communicating users can read the messages. In principle, it prevents potential eavesdroppers – including telecommunications service providers, telecom providers, Internet ...
. Examples of strong end-to-end encryption are
HTTPS Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It is used for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is enc ...
and SSH. Some hotspots
authenticate Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicatin ...
users; however, this does not prevent users from viewing network traffic using
packet sniffer A packet analyzer, also known as packet sniffer, protocol analyzer, or network analyzer, is a computer program or computer hardware such as a packet capture appliance, that can intercept and log traffic that passes over a computer network or ...
s. Some vendors provide a download option that deploys WPA support. This conflicts with enterprise configurations that have solutions specific to their internal
WLAN A wireless LAN (WLAN) is a wireless computer network that links two or more devices using wireless communication to form a local area network (LAN) within a limited area such as a home, school, computer laboratory, campus, or office buildin ...
. The Opportunistic Wireless Encryption (OWE) standard provides encrypted communication in open Wi-Fi networks, alongside the WPA3 standard, but is not yet widely implemented.


Unintended consequences

New York City introduced a Wi-Fi hotspot kiosk called
LinkNYC LinkNYC is the New York City branch of an international infrastructure project to create a network covering several cities with free Wi-Fi service. The office of New York City Mayor Bill de Blasio announced the plan on November 17, 2014, and ...
with the intentions of providing modern technology for the masses as a replacement to a payphone. Businesses complained they were a homeless magnet and CBS news observed transients with wires connected to the kiosk lingering for an extended period. It was shut down following complaints about transient activity around the station and encampments forming around it.
Transients Transience or transient may refer to: Music * ''Transient'' (album), a 2004 album by Gaelle * ''Transience'' (Steven Wilson album), 2015 * Transience (Wreckless Eric album) Science and engineering * Transient state, when a process variable or ...
/ panhandlers were the most frequent users of the kiosk since its installation in early 2016 spurring complaints about public viewing of pornography and masturbation.


Locations

Public hotspots are often found at
airport An airport is an aerodrome with extended facilities, mostly for commercial air transport. Airports usually consists of a landing area, which comprises an aerially accessible open space including at least one operationally active surfa ...
s,
bookstore Bookselling is the commercial trading of books which is the retail and distribution end of the publishing process. People who engage in bookselling are called booksellers, bookdealers, bookpeople, bookmen, or bookwomen. The founding of librar ...
s, coffee shops,
department store A department store is a retail establishment offering a wide range of consumer goods in different areas of the store, each area ("department") specializing in a product category. In modern major cities, the department store made a dramatic appe ...
s,
fuel station A filling station, also known as a gas station () or petrol station (), is a facility that sells fuel and engine lubricants for motor vehicles. The most common fuels sold in the 2010s were gasoline (or petrol) and diesel fuel. Ga ...
s,
hotel A hotel is an establishment that provides paid lodging on a short-term basis. Facilities provided inside a hotel room may range from a modest-quality mattress in a small room to large suites with bigger, higher-quality beds, a dresser, a re ...
s,
hospital A hospital is a health care institution providing patient treatment with specialized health science and auxiliary healthcare staff and medical equipment. The best-known type of hospital is the general hospital, which typically has an emergen ...
s,
libraries A library is a collection of Document, materials, books or media that are accessible for use and not just for display purposes. A library provides physical (hard copies) or electronic media, digital access (soft copies) materials, and may be a ...
, public
pay phone A payphone (alternative spelling: pay phone) is typically a coin-operated public telephone, often located in a telephone booth or in high-traffic outdoor areas, with prepayment by inserting money (usually coins) or by billing a credit or debi ...
s,
restaurant A restaurant is a business that prepares and serves food and drinks to customers. Meals are generally served and eaten on the premises, but many restaurants also offer take-out and food delivery services. Restaurants vary greatly in appearan ...
s, RV parks and campgrounds,
supermarket A supermarket is a self-service shop offering a wide variety of food, beverages and household products, organized into sections. This kind of store is larger and has a wider selection than earlier grocery stores, but is smaller and more limit ...
s,
train station A train station, railway station, railroad station or depot is a railway facility where trains stop to load or unload passengers, freight or both. It generally consists of at least one platform, one track and a station building providing ...
s, and other public places. Additionally, many
school A school is an educational institution designed to provide learning spaces and learning environments for the teaching of students under the direction of teachers. Most countries have systems of formal education, which is sometimes co ...
s and
universities A university () is an institution of higher (or tertiary) education and research which awards academic degrees in several academic disciplines. Universities typically offer both undergraduate and postgraduate programs. In the United State ...
have
wireless network A wireless network is a computer network that uses wireless data connections between network nodes. Wireless networking is a method by which homes, telecommunications networks and business installations avoid the costly process of introducing ...
s on their campuses.


Types


Free hotspots

According to statista.com, in the year 2022, there are approximately 550 million free Wi-Fi hotspots around the world. The U.S. NSA warns against connecting to free public Wi-Fi. Free hotspots operate in two ways: * Using an open public network is the easiest way to create a free hotspot. All that is needed is a Wi-Fi router. Similarly, when users of private wireless routers turn off their authentication requirements, opening their connection, intentionally or not, they permit piggybacking (sharing) by anyone in range. * Closed public networks use a HotSpot Management System to control access to hotspots. This software runs on the router itself or an external computer allowing operators to authorize only specific users to access the Internet. Providers of such hotspots often associate the free access with a menu, membership, or purchase limit. Operators may also limit each user's available
bandwidth Bandwidth commonly refers to: * Bandwidth (signal processing) or ''analog bandwidth'', ''frequency bandwidth'', or ''radio bandwidth'', a measure of the width of a frequency range * Bandwidth (computing), the rate of data transfer, bit rate or thr ...
(upload and download speed) to ensure that everyone gets a good quality service. Often this is done through
service-level agreement A service-level agreement (SLA) is a commitment between a service provider and a customer. Particular aspects of the service – quality, availability, responsibilities – are agreed between the service provider and the service user. T ...
s.


Commercial hotspots

A commercial hotspot may feature: * A
captive portal A captive portal is a web page accessed with a web browser that is displayed to newly connected users of a Wi-Fi or wired network before they are granted broader access to network resources. Captive portals are commonly used to present a landin ...
/ login screen / splash page that users are redirected to for
authentication Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicatin ...
and/or
payment A payment is the voluntary tender of money or its equivalent or of things of value by one party (such as a person or company) to another in exchange for goods, or services provided by them, or to fulfill a legal obligation. The party making the ...
. The captive portal / splash page sometimes includes the
social login Social login is a form of single sign-on using existing information from a social networking service such as Facebook, Twitter or Google, to sign into a third party website instead of creating a new login account specifically for that website. ...
buttons. * A payment option using a
credit card A credit card is a payment card issued to users (cardholders) to enable the cardholder to pay a merchant for goods and services based on the cardholder's accrued debt (i.e., promise to the card issuer to pay them for the amounts plus the ...
, iPass,
PayPal PayPal Holdings, Inc. is an American multinational financial technology company operating an online payments system in the majority of countries that support online money transfers, and serves as an electronic alternative to traditional paper ...
, or another payment service (voucher-based Wi-Fi) * A
walled garden A walled garden is a garden enclosed by high walls, especially when this is done for horticultural rather than security purposes, although originally all gardens may have been enclosed for protection from animal or human intruders. In temperate ...
feature that allows free access to certain sites *
Service-oriented provisioning Service-oriented provisioning (SOP) is a technology concept developed during the early 2000s to curb the hyper competition developing in the Wireless Internet service provider (WISP) and ISP space. It refers to the capability of defining and workin ...
to allow for improved revenue * Data analytics and data capture tools, to analyze and export data from Wi-Fi clients Many services provide payment services to hotspot providers, for a monthly fee or commission from the end-user income. For example, Amazingports can be used to set up hotspots that intend to offer both fee-based and free internet access, and ZoneCD is a
Linux distribution A Linux distribution (often abbreviated as distro) is an operating system made from a software collection that includes the Linux kernel and, often, a package management system. Linux users usually obtain their operating system by downloading one ...
that provides payment services for hotspot providers who wish to deploy their own service.
Roaming Roaming is a wireless telecommunication term typically used with mobile devices, such as mobile phones. It refers to a mobile phone being used outside the range of its native network and connecting to another available cell network. Technical ...
services are expanding among major hotspot service providers. With roaming service the users of a commercial provider can have access to other providers' hotspots, either free of charge or for extra fees, which users will usually be charged on an access-per-minute basis.


Software hotspots

Many Wi-Fi adapters built into or easily added to consumer computers and mobile devices include the functionality to operate as private or mobile hotspots, sometimes referred to as "mi-fi". The use of a private hotspot to enable other personal devices to access the WAN (usually but not always the
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, p ...
) is a form of bridging, and known as tethering. Manufacturers and
firmware In computing, firmware is a specific class of computer software that provides the low-level control for a device's specific hardware. Firmware, such as the BIOS of a personal computer, may contain basic functions of a device, and may provide h ...
creators can enable this functionality in Wi-Fi devices on many Wi-Fi devices, depending upon the capabilities of the hardware, and most modern consumer operating systems, including Android, Apple OS X 10.6 and later,
Windows Windows is a group of several proprietary graphical operating system families developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry. For example, Windows NT for consumers, Windows Server for se ...
, and
Linux Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, whi ...
include features to support this. Additionally wireless chipset manufacturers such as
Atheros Qualcomm Atheros is a developer of semiconductor Integrated circuit, chips for Computer network, network communications, particularly wireless chipsets. Founded under the name T-Span Systems in 1998 by experts in signal processing and VLSI desig ...
,
Broadcom Broadcom Inc. is an American designer, developer, manufacturer and global supplier of a wide range of semiconductor and infrastructure software products. Broadcom's product offerings serve the data center, networking, software, broadband, wirel ...
,
Intel Intel Corporation is an American multinational corporation and technology company headquartered in Santa Clara, California. It is the world's largest semiconductor chip manufacturer by revenue, and is one of the developers of the x86 ser ...
and others, may add the capability for certain Wi-Fi NICs, usually used in a client role, to also be used for hotspot purposes. However, some service providers, such as AT&T, Sprint, and T-Mobile charge users for this service or prohibit and disconnect user connections if tethering is detected. Third-party software vendors offer applications to allow users to operate their own hotspot, whether to access the Internet when on the go, share an existing connection, or extend the range of another hotspot.


Hotspot 2.0

Hotspot 2.0, also known as HS2 and Wi-Fi Certified Passpoint, is an approach to public access Wi-Fi by the
Wi-Fi Alliance The Wi-Fi Alliance is a non-profit organization that owns the Wi-Fi trademark. Manufacturers may use the trademark to brand products certified for Wi-Fi interoperability. History Early 802.11 products suffered from interoperability problems be ...
. The idea is for mobile devices to automatically join a Wi-Fi subscriber service whenever the user enters a Hotspot 2.0 area, in order to provide better bandwidth and services-on-demand to end-users and relieve carrier infrastructure of some traffic. Hotspot 2.0 is based on the
IEEE 802.11u IEEE 802.11u-2011 is an amendment to the IEEE 802.11-2007 standard to add features that improve interworking with external networks. 802.11 is a family of IEEE technical standards for mobile communication devices such as laptop computers or mult ...
standard, which is a set of protocols published in 2011 to enable cellular-like roaming. If the device supports 802.11u and is subscribed to a Hotspot 2.0 service it will automatically connect and roam.


Supported devices

* Apple mobile devices running
iOS 7 iOS 7 is the seventh major release of the iOS mobile operating system developed by Apple Inc., being the successor to iOS 6. It was announced at the company's Worldwide Developers Conference on June 10, 2013, and was released on September 1 ...
and up * Some
Samsung Galaxy Samsung Galaxy (, stylised as SΛMSUNG Galaxy since 2015 (except Japan where it omits the Samsung branding), previously stylised as Samsung GALAXY; abbreviated as SG) is a series of computing and mobile computing devices that are designed, m ...
smartphones *
Windows 10 Windows 10 is a major release of Microsoft's Windows NT operating system. It is the direct successor to Windows 8.1, which was released nearly two years earlier. It was released to manufacturing on July 15, 2015, and later to retail on ...
devices have full support for network discovery and connection. * Windows 8 and Windows 8.1 lack network discovery, but support connecting to a network when the credentials are known.


Billing

The "user-fairness model" is a dynamic billing model, which allows volume-based billing, charged only by the amount of payload (data, video, audio). Moreover, the tariff is classified by net traffic and user needs. If the net traffic increases, then the user has to pay the next higher tariff class. The user can be prompted to confirm that they want to continue the session in the higher traffic class. A higher class fare can also be charged for delay sensitive applications such as video and audio, versus non time-critical applications such as reading Web pages and sending e-mail. The "User-fairness model" can be implemented with the help of EDCF (IEEE 802.11e). An EDCF user priority list shares the traffic in 3 access categories (data, video, audio) and user priorities (UP). * Data 2* Video 4* Audio 6 See
Service-oriented provisioning Service-oriented provisioning (SOP) is a technology concept developed during the early 2000s to curb the hyper competition developing in the Wireless Internet service provider (WISP) and ISP space. It refers to the capability of defining and workin ...
for viable implementations.


Legal issues

Depending upon the set up of a public hotspot, the provider of the hotspot has access to the metadata and content accessed by users of the hotspot, and may have legal obligations related to privacy requirements and liability for use of the hotspot for unlawful purposes. In countries where the internet is regulated or
freedom of speech Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The right to freedom of expression has been recogni ...
more restricted, there may be requirements such as licensing, logging, or recording of user information. Concerns may also relate to
child safety Child protection is the safeguarding of children from violence, exploitation, abuse, and neglect. Article 19 of the UN Convention on the Rights of the Child provides for the protection of children in and out of the home. One of the ways to e ...
, and
social issue A social issue is a problem that affects many people within a society. It is a group of common problems in present-day society and ones that many people strive to solve. It is often the consequence of factors extending beyond an individual's cont ...
s such as exposure to objectionable content, protection against
cyberbullying Cyberbullying or cyberharassment is a form of bullying or harassment using electronic means. Cyberbullying and cyberharassment are also known as online bullying. It has become increasingly common, especially among teenagers, as the digital ...
and illegal behaviours, and prevention of perpetration of such behaviors by hotspot users themselves.


European Union

The
Data Retention Directive The Data Retention Directive (Directive 2006/24/EC), a directive, later declared invalid by the European Court of Justice, was at first passed on 15 March 2006 and regulated data retention, where data has been generated or processed in connec ...
which required hotspot owners to retain key user statistics for 12 months was annulled by the Court of Justice of the European Union in 2014. The
Directive on Privacy and Electronic Communications Privacy and Electronic Communications Directive 2002/58/EC on Privacy and Electronic Communications, otherwise known as ePrivacy Directive (ePD), is an EU directive on data protection and privacy in the digital age. It presents a continuation o ...
was replaced in 2018 by the
General Data Protection Regulation The General Data Protection Regulation (GDPR) is a European Union regulation on data protection and privacy in the EU and the European Economic Area (EEA). The GDPR is an important component of EU privacy law and of human rights law, in par ...
, which imposes restrictions on data collection by hotspot operators.


United Kingdom

*
Data Protection Act 1998 The Data Protection Act 1998 (DPA, c. 29) was an Act of Parliament of the United Kingdom designed to protect personal data stored on computers or in an organised paper filing system. It enacted provisions from the European Union (EU) Data Prote ...
: The hotspot owner must retain individual's information within the confines of the law. *
Digital Economy Act 2010 The Digital Economy Act 2010 (c. 24) is an Act of the Parliament of the United Kingdom. The act addresses media policy issues related to digital media, including copyright infringement, Internet domain names, Channel 4 media content, local ra ...
: Deals with, among other things,
copyright infringement Copyright infringement (at times referred to as piracy) is the use of works protected by copyright without permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to the copyright holder, ...
, and imposes fines of up to £250,000 for contravention.


History

Public access wireless
local area network A local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building. By contrast, a wide area network (WAN) not only covers a large ...
s (LANs) were first proposed by Henrik Sjoden at the NetWorld+Interop conference in The
Moscone Center The George R. Moscone Convention Center (pronounced ), popularly known as the Moscone Center, is the largest convention and exhibition complex in San Francisco, California. The complex consists of three main halls spread out across three block ...
in San Francisco in August 1993. Sjoden did not use the term "hotspot" but referred to publicly accessible wireless LANs. The first commercial venture to attempt to create a public local area access network was a firm founded in Richardson, Texas known as PLANCOM (Public Local Area Network Communications). The founders of the venture, Mark Goode, Greg Jackson, and Brett Stewart dissolved the firm in 1998, while Goode and Jackson created MobileStar Networks. The firm was one of the first to sign such public access locations as Starbucks, American Airlines, and Hilton Hotels. The company was sold to Deutsche Telecom in 2001, who then converted the name of the firm into "T-Mobile Hotspot". It was then that the term "hotspot" entered the popular vernacular as a reference to a location where a publicly accessible wireless LAN is available.
ABI Research Abi or ABI may refer to: Organizations United States * American Bankruptcy Institute * American Beverage Institute * American Biographical Institute * Applied Biosystems Inc. Elsewhere * Agencia Boliviana de Información, a Bolivian press age ...
reported there was a total of 4.9 million global Wi-Fi hotspots in 2012. In 2016 the Wireless Broadband Alliance predicted a steady annual increase from 5.2m public hotspots in 2012 to 10.5m in 2018.


See also

*
Bluetooth Bluetooth is a short-range wireless technology standard that is used for exchanging data between fixed and mobile devices over short distances and building personal area networks (PANs). In the most widely used mode, transmission power is limi ...
*
Evil twin (wireless networks) An evil twin is a fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on wireless communications. The evil twin is the wireless LAN equivalent of the phishing scam. This type of attack may be used to steal the ...
* Hotspot gateway * IEEE 802.11 *
Legality of piggybacking Laws regarding "unauthorized access of a computer network" exist in many legal codes, though the wording and meaning differs from one to the next. However, the interpretation of terms like "access" and "authorization" is not clear, and there is n ...
*
LinkNYC LinkNYC is the New York City branch of an international infrastructure project to create a network covering several cities with free Wi-Fi service. The office of New York City Mayor Bill de Blasio announced the plan on November 17, 2014, and ...
* MobileStar * Securing Adolescents From Exploitation-Online Act * Visitor Based Network *
Wireless Access Point In computer networking, a wireless access point (WAP), or more generally just access point (AP), is a networking hardware device that allows other Wi-Fi devices to connect to a wired network. As a standalone device, the AP may have a wired ...
*
Wireless LAN A wireless LAN (WLAN) is a wireless computer network that links two or more devices using wireless communication to form a local area network (LAN) within a limited area such as a home, school, computer laboratory, campus, or office buildi ...
*
Wireless security Wireless security is the prevention of unauthorized access or damage to computers or data using wireless networks, which include Wi-Fi networks. The term may also refer to the protection of the wireless network itself from adversaries seeking to ...
*
Wi-Fi Wi-Fi () is a family of wireless network protocols, based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access, allowing nearby digital devices to exchange data by radio waves ...
*
Wi-Fi Direct Wi-Fi Direct (formerly Wi-Fi Peer-to-Peer) is a Wi-Fi standard for peer-to-peer wireless connections that allows two devices to establish a direct Wi-Fi connection without an intermediary wireless access point, router, or Internet connection. W ...


References


External links

* {{Telecommunications Wi-Fi Wireless access points