|This article needs additional citations for verification. (January 2012)|
|Part of a series on|
A hotspot is a site that offers Internet access over a wireless local area network (WLAN) through the use of a router connected to a link to an Internet service provider. Hotspots typically use Wi-Fi technology.
Hotspots may be found in coffee shops and various other public establishments in many developed urban areas throughout the world.
Public access wireless local area networks (LANs) were first proposed by Henrik Sjödin at the NetWorld+Interop conference in The Moscone Center in San Francisco in August 1993. Sjödin did not use the term hotspot but referred to publicly accessible wireless LANs.
The first commercial venture to attempt to create a public local area access network was a firm founded in Richardson, Texas known as PLANCOM (Public Local Area Network Communications). The founders of that venture, Mark Goode, Greg Jackson, and Brett Stewart dissolved the firm in 1998, while Goode and Jackson created MobileStar Networks. The firm was one of the first to sign such public access locations as Starbucks, American Airlines, and Hilton Hotels. The company was sold to Deutsche Telecom in 2001, who then converted the name of the firm into "T-Mobile Hotspot." It was then that the term "hotspot" entered the popular vernacular as a reference to a location where a publicly accessible wireless LAN is available.
The public can use a laptop or other suitable portable device to access the wireless connection (usually Wi-Fi) provided. Of the estimated 150 million laptops, 14 million PDAs, and other emerging Wi-Fi devices sold per year for the last few years, most include the Wi-Fi feature.
For venues that have broadband Internet access, offering wireless access is as simple as configuring one access point (AP), in conjunction with a router and connecting the AP to the Internet connection. A single wireless router combining these functions may suffice.
Security is a serious concern in connection with Hotspots. There are three possible attack vectors. First, there is the wireless connection between the client and the access point. This needs to be encrypted, so that the connection cannot be eavesdropped or attacked by a man-in-the-middle-attack. Second, there is the Hotspot itself. The WLAN encryption ends at the interface, then travels its network stack unencrypted and then travels over the wired connection up to the BRAS of the ISP. Third, there is the connection from the Access Point to the BRAS of the ISP. ...
Hotspots are often found at airports, bookstores, coffee shops, department stores, fuel stations, hotels, hospitals, libraries, public pay phones, restaurants, RV parks and campgrounds, supermarkets, train stations, and other public places. Additionally, many schools and universities have wireless networks in their campuses.
|This section does not cite any references or sources. (January 2012)|
Free hotspots operate in two ways:
- Using an open public network is the easiest way to create a free hotspot. All that is needed is a Wi-Fi router. Similarly, when users of private wireless routers turn off their authentication requirements, opening their connection, intentionally or not, they permit piggybacking (sharing) by anyone in range.
- Closed public networks use a HotSpot Management System to control access to hotspots. This software runs on the router itself or an external computer allowing operators to authorize only specific users to access the Internet. Providers of such hotspots often associate the free access with a menu, membership, or purchase limit. Operators may also limit each user's available bandwidth (upload and download speed) to ensure that everyone gets a good quality service. Often this is done through service-level agreements.
A commercial hotspot may feature:
- A captive portal / login screen that users are redirected to for authentication and payment
- A payment option using a credit card, iPass, PayPal, or another payment service
- A walled garden feature that allows free access to certain sites
- Service-oriented provisioning to allow for improved revenue
Many services provide payment services to hotspot providers, for a monthly fee or commission from the end-user income. For example, Amazingports can be used to set up hotspots that intend to offer both fee-based and free internet access, and ZoneCD is a Linux distribution that provides payment services for hotspot providers who wish to deploy their own service.
Major airports and business hotels are more likely to charge for service, though most hotels provide free service to guests; and increasingly, small airports and airline lounges offer free service.
Roaming services are expanding among major hotspot service providers. With roaming service the users of a commercial provider can have access to other providers' hotspots, either free of charge or for extra fees, which users will usually be charged on an access-per-minute basis.
Many Wi-Fi adapters built into or easily added to consumer computers and mobile devices include the functionality to operate as private or mobile hotspots, sometimes referred to as "mi-fi". Manufacturers can enable this functionality through driver-level support. Modern consumer operating systems, including Apple OS X 10.6 and later, added features to support this. However, some service providers, such as AT&T, Sprint, and T-Mobile charge users for this service.
Third-party software vendors offer applications to allow users to operate their own hotspot, whether to access the Internet whie on the go, share an existing connection, or extend the range of another hotspot. Third party implementations of software hotspots include:
- Antamedia HotSpot software
- Connectify Hotspot
- Jaze Hotspot Gateway by Jaze Networks
- Hot Spot Network Manager (HSNM)
- Virtual Router
Hotspot 2.0, also known as HS2 and Wi-Fi Certified Passpoint, is an approach to public access Wi-Fi by the Wi-Fi Alliance. The idea is for mobile devices to automatically join a Wi-Fi subscriber service whenever the user enters a Hotspot 2.0 area, in order to provide better bandwidth and services-on-demand to end-users, while also alleviating mobile carrier infrastructure of traffic overheads.
Hotspot 2.0 is based on the IEEE 802.11u standard, which is a set of protocols published in 2011 to enable cellular-like roaming. If the device supports 802.11u and is subscribed to a Hotspot 2.0 service it will automatically connect and roam.
- Some Chinese tablet computers
- iOS 7 devices
- Some Samsung Galaxy smartphones
The so-called "User-Fairness-Model " is a dynamic billing model, which allows a volume-based billing, charged only by the amount of payload (data, video, audio). Moreover, the tariff is classified by net traffic and user needs (Pommer, p. 116ff).
If the net traffic increases, then the user has to pay the next higher tariff class. By the way the user is asked for if he still wishes the session also by a higher traffic class. Moreover, in time-critical applications (video, audio) a higher class fare is charged, than for non time-critical applications (such as reading Web pages, e-mail).
|not time-critical||low priced||standard|
The "User-fairness model" can be implemented with the help of EDCF (IEEE 802.11e). A EDCF user priority list shares the traffic in 3 access categories (data, video, audio) and user priorities (UP) (Pommer, p. 117):
- Data [UP 0|2]
- Video [UP 5|4]
- Audio [UP 7|6]
If the net traffic increases, then the frames of the particular access category (AC) are assigned a low priority value (e.g. video UP 5 to UP 4). This is also, if the data transfer is not time-critical.
See Service-oriented provisioning for viable implementations
In order to provide robust security to hotspot users, the Wi-Fi Alliance is developing a new hotspot program that aims to encrypt hotspot traffic with WPA2 security. The program was scheduled to launch in the first half of 2012.[dated info]
Providers of public hotspot access may incur legal obligations, including privacy requirements and liability for use for unlawful purposes, depending on the jurisdiction.
- Data Retention Directive Hotspot owners must retain key user statistics for 12 months.
- Directive on Privacy and Electronic Communications
- Data Protection Act 1998 The hotspot owner must retain individual's information within the confines of the law.
- Digital Economy Act 2010 Deals with, among other things, Copyright infringement, and imposes fines of up to £250,000 for contravention.
|Wikimedia Commons has media related to Hotspots (Wi-Fi).|
- Evil twin (wireless networks)
- IEEE 802.11
- Legality of piggybacking
- Securing Adolescents From Exploitation-Online Act
- Wireless Access Point
- Wireless LAN
- Wireless security
- Wi-Fi Timeline- Wifi Net News
- Marsan, Carolyn Duffy (25 June 2001). "Starbucks wireless network a sweet deal for MobileStar". Retrieved 13 April 2013.
- "American Airlines and MobileStar Network to Deliver Wireless Internet Connectivity to American's Passengers". PR Newswire. 11 May 2000. Retrieved 13 April 2013.
- "MobileStar Network to Supply U.S. Hilton Hotels With Wireless High-Speed Internet Access". 28 October 1998. Retrieved 13 April 2013.
- Ngo, Dong (30 October 2012). "Networking buying guide". Retrieved 13 April 2013.
- Growing "Demand for Mobility will Boost Global Wi-Fi Hotspots to Reach 6.3 Million in 2013". ABI Research.
- "Mi-Fi". Sprint PCS.
- "Mobile Hotspots". AT&T Shop.
- "New Mobile Hotspot Plans and Usage Notification Options". Sprint Community: Plans. May 16, 2012.
- "Smartphone Mobile Hotspot". Tethering FAQ.
- "Hotspot". Antamedia.
- "Connectify Hotspot". Connectify.me.
- "Jaze Hotspot Gateway". Jaze Networks.
- "Hot Spot Network manager". HSNM.
- "Virtual Router". Codeplex.
- vonNagy, Andrew (20 May 2012). "Wi-Fi Alliance Rebrands Hotspot 2.0 as Wi-Fi Certified Passpoint". Retrieved 13 April 2012.
- Simkins, Rob (10 January 2012). "Hotspot 2.0". Retrieved 13 April 2013.
- Burton, Marcus (10 January 2012). "Hotspot 2.0 and the Next Generation Hotspot". Retrieved 13 April 2013.
- Fitchard, Kevin (March 7, 2014). "Hotspot 2.0 inches its way into public Wi-Fi networks". Gigaom.
- Brownlee, John (2013-06-12). "iOS 7 Will Make It Possible To Roam Between Open Wi-Fi Networks Without Your Data Ever Dropping". Cult of Mac. Retrieved 2013-09-16.
- Branscombe, Mary (3 October 2012). "Wi-Fi roaming: Hotspot 2.0 and Next Generation Hotspot". ZDNet. Retrieved 13 April 2013.
- Pommer, Hermann: Roaming zwischen Wireless Local Area Networks. VDM Verlag, Saarbrücken 2008, ISBN 978-3-8364-8708-5.
- "Internet Security Podcast episode 10: Free WiFi And The Security issues it poses". 18 February 2013. Retrieved 13 April 2013.
- WiFi Foundation Legal Advice