Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
34 views20 pages

MWC Chapter 5

hjgg

Uploaded by

surajmore2368
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
34 views20 pages

MWC Chapter 5

hjgg

Uploaded by

surajmore2368
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 20
51 5.2 53 54 35 WIRELESS NETWORK TECHNOLOGIES Welghtage of Marks = 12, Teaching Hours = 12) Bluetooth Technology : Features Architecture, Frequency bond, IEEE 02.15.1 ond ether wireless: Protocol Applications, Personal Area Network (PAN) RFID : Concept, Frequency band, Classification of RFID Togs, Applications. WLAN Technology : IEEE 802.11, WLAN ‘system architecture, Radio spectrum WMAN/Wi-Max/ : IEEE 802.16 WMAN and IEEE 802.160 Wi-Max Mobile Ad-hoc Networks (MANETs) : MANET Topologies, Applications. 5c. Explain the ‘procedure to develop personal area network for the given number of devices using ‘+The demand for ubiquitous personal communication is driving the development of new networking technique that accommodate mobile voice and data users who throughout buildings, cities or countries. The cellular telephone system is responsible for providing coverage throughout a particular tertitory Bluetooth. called a coverage region or market. The interconnection of many such systems defines a wireless network capable of providing service to mobile users throughout a country or continent. ‘* To provide wireless communications within a particular geographic region(a city, for example), an integrated network of base stations must be deployed to provide sufficient radio coverage in all users. ‘The base station, in turn, must be connected to a central hub called the mobile switching center (MSC). © | The MSC provides connectivity between the Public Switched Telephone Network (PSTN) and the ‘numerous base stations, and ultimately between all of the wireless subscribers in a system. +” The PSTN forms the global telecommunications grid which connects conventionat (landline) telephone ‘switching centres, called central offices with MSCs throughout the world. (say Sill Scanned with CamScanner Transter of information in PSTN takes place over landing trunked line called. trunks cormonae o optigs €ables, microwave links and satelite inks. he network ‘configuration in PSTN are virtually static. since the network commections may 2 ‘hanged when a subsctber changes residence and requies reprogremiTing #8 St sentra! {CO} of the subscriber. Wireless networks. on the other hand, are highly dynamic with the network confiquestice te: rearranged every time a subscriber moves into the coverage region of 9 cifferent base saben cx = market. While fixed networks are difficult to-change. wireless networks must reconfigure 2 themselves & within small intervals of time. of the order of seconds, to provide roaring and impercepicie Parc between cells as a moves about. + The available channel bandwidth for fixed networks can be increased by instaling high capacty The bluetooth technology is a wireless technology standard, which is used to transfer the data between two different electronic devices over short distance. 9 The bluetooth technology is a high-speed, low-powered wireless technology link that is designed to connect phones or other portable equipments together. «The bluetooth technology is a short-range wireless communications technology to replace the cables connecting electronic devices, allowing a person to fiave a phone conversation via a headset. tse a wireless mouse and synchronized information from a mobile phone to a personal computer. It has capability of sharing all its features with other bluetooth devices in the surrounding area. It can share information with a bluetooth enabled computer or printer. , It can share alt the features to internet. It can communicate at ranges upto 10 meters. It does not need to be in direct sight of each other, P Less complication 7. Less power consumption Available at cheaper rates % Wireless Network Technologies fh century Danish king, who used 1s on a microchip. It was initially to let laptop computers make make Bluetooth the low-power short- data from one device to the other fived mobile device and building oth special interest group and its physical it is used in the industry like IEEE standardized Bluetooth es SAW awh ga ee . _ Scanned with CamScanner Mobile and Wireless Communication (Clectrones Engg. Gr) _5.5 Witness Netware Technologies 9, Robustness » 10. Hands free headset TL. Uniform structure 12. Global acceptance 13. Interactive conference “1, Bluetooth headsets 2. Stereo headset 3. In-car bluetooth headset 4. Bluetooth equipped printer 5. Bluetooth enable webcom 6 Bluetooth keyboard 7._ Bluetooth GPS device [5.2.6 Basic Principle] Bluetooth Is a connective convenience, It is a high-speed, low-power microns wiv technology, designed to connect phones, laptops, PADS and other portable equisments together =... with little or no work by the user. Unlike infra-red, Bluetooth does not require line-of-sight positioning of connected units The technology uses modifications of existing wireless LAN technique, but is most notable for ts “small Size and low cost. {tis envisioned that Bluetooth will be included within equipment rather than being an opticra! exe ‘When one Bluetooth product comes within range of another, and capability details. They can then establish 1 M bits link security and erro correction, to use as required, ‘+ The protocols will! * This technology electronic device they automatically excha ress (upto 2 Mbps in the 2G technology; wth ‘both voice and data, with a very flexible network topography. goal by embedding tiny, inexpensive, short-range transceivers into the. Ia PC, bluetooth can be built in as @ PC card ‘OF extremely attached via the USB port. The functional édiagram of a bluetooth is as shown in Fig: Fig. 5.2 : Functional block diagram of bluetooth 5.2.8 Principle of Operation| . Each device has a unique 45-bit address from the IEEE 802 standard, 4 Connections can be point-to-point or multipoint. The maximum range extended to 100 meters by increasing the power. “ Bluetooth devices are protected from radio interference by changing their frequencies arian i upto a maximum of 1600 times a second, @ technique known as frequency hopping, They also use three different but complementary error connection schemes. i Built-in encryption and verification is provided. Moreover, battery life. Of 10 meters can be bluetooth devices won't drain ‘precious Scanned with CamScanner me trom a hold mode consuming The bluetooth specification targets power consumption of the device 30 HA to the active transmitting range of 8 to 30 mA or ess than OW: The radio chip consumes only 0.3 mA in standby mode which is less that standard mobile phone, ae also have excellent power saving features as they will a ‘mode as soon as traffic volume lessens or stops. ceciaerient Designed to operate in a noisy RF pear ee piyetooth radio uses a fast acknowledg ~ frequency hopping scheme to make the link robust. * Bluetooth radio modules avoid interference from other signals by transmitting or receiving a packet g * The encoding is optimized for an uncoordinated environment. bitlevel : +The bluetooth will not interfere or cause harm to public or private telecommunications pron * The bluetooth baseband protocol is a combination of circuit and packet switching. Slots can be reserved for synchronous packets. Each packet is transmitted in a different hop frequency. : * Bluetooth can support an asynchronous data channel upto three simultaneous synchronous voice channels or a channel, which simultaneously support asynchronous data and synchronous voice. | : +> Itis thus possible to transfer the data asynchronously, while at the same time talkifig synchronously ‘Mobile and Wireless Communication (Electronics ogg. Gr) _ 5 1 3% of the power used bya aromatically shift £0 low-power hopping to a new frequency afer Bluetooth guarantees security at the at the same time, + Each voice channel supports 64 kbps synchronous (voice) link, The synchronous channel can support z an asymmetric link of maximally 721 kbps in either direction while permitting 57.6 kbps in the return direction or a 432.6 kbps symmetric link. ® 1. Itis economical to implement by companies ee 2. Ithas wireless synchronization. No need to carry connection cable while travelling. 3. Itis universally accepted technology. : 4: It's connectivity is automatic and hence does not need professionals, 5, It is upgradable and has backward compability with older versions. 6. It connects devices to each other irrespective of their models, as it has standard protocols. 7. It has instant Personal Area Network (PAN) consisting of upto seven bluetooth devices within 3 range of upto 30 feet. . It has faster data and voice communications sharing. 1. It simplifies the audio and communication issues arsing while driving, talking and listing music on your cell phone. 10, It reduces the battery power consumption or electrical power. 11. It avoids interference from other wireless devices with the usage of technique of frequing hopping. 12, It is best alternative to data transfer. 0 Disadvanta: L._ The better use can be severely increased if bluetooth is enabled on celi phone while you play music 2. Ifyou are pushing so much data access, itis going to be slow and not to the same standard Wi-Fi 3. As it is omni-directional, it can have problem, when itis trying to discover a recipient device The headsets, speakers, phonesetc. —- eg ss = 2 Scanned with CamScanner_ __ Wireless Network Technologies 4, Abluetooth only offers 1 rps, infared i yet dispensed completely to have very fast rates for data transfer because infra-red needs data rates of upto 4 mbps. 5,_The greater range and RF of bluetooth makes it much more open to Interception and attack 1. Drain on battery power for smart phones. 2. Fairly limited range, . 3,_ Difficult process. 5.2.12 Frequency Band| «Bluetooth operates at frequencies between 2402 and 2480 MHz or 2400 and 2483.5 MHz, including guard bands of 2 MHz wide at the bottom and 3.5 MHz wide at the top, This is the short range radio frequency (RF) band ranging from 2.4 GHz. 5.2.13, Specifications] 1. Core Specifications : The core specifications define the bluetooth protocol stack and the requirements for testing and qualification of bluetooth-based products. + The core specifications consist of five layers as under (i) Radio, (i) Baseband layer, (i) Link manager protocol (LMP) (iv) Logical link control and adoption protocol (LLCAP) (v) Service discovery protocol Gor), SE __ 2 Most of the peripheral devices such as mouse, Keyboard, printer, speakers, et. are connected to the g PC cordlessly. n be used to allow one headset to be used with myriad devices, including telephones, portable fs, stereos etc. 3. It can automatically carry out certain tasks on behalf of the user without user intervention or awareness. 4,_ Exchanging of the multimedia data like songs, 5.2.15 IEEE 802.15.1 Bi © IEEE 802.15 is a working group of Institute of Electrical and Electronics Engineers (IEEE). IEEE 202 standards committee which specifies Wireless Personal Area Network (WPAN) standards. ‘There are 10 major areas of development, not all of which are active. + The number of task groups in IEEE 802.15 varies based on the number of active projects The task group one is based on bluetooth technology. It defines physical layer (PHL) and media access control (MAC) specifications for wireless connecting with fixed, portable and moving devices “within or entering personal operating space, These standards were issued in 2902 and 2005. ideo, pictures etc. can be transferred among devices. jooth Protocol il Scanned with CamScanner a ~The Personal Area Network (PAN) is designed to mate a bluetooth network simulate an ether from an applications perspective. Symbian OS supports only one active PAN at a time, + Each remote device that connects to the PAN device for networking purpose will be rnerged ints the some active PAN. «A personal area network (PAN) is a network concerned with the exchange of information in tre vicinity of a person. Typically, these systems are wireless and involve the transmission of data between devices such as smartphone, personal computers, tablets, computers, laptops etc. «The purpose of PAN network is usually to alloy either transmission of data or information between such devices of to serve as the network that allow further uplink to the intemet. Developments ic the area of PANs are largely overseen by IEEE 202.15 working group. . ~ APAN isan ad-hoc network of devices communicating on a standard network configuration, aver 2 bluetooth radio connection. * APAN may have anywhere from 2 to 8 participating member devices. ” + APAN is not the seme as piconet, where it is any ad-hoc networking of devices over a bluetocth connection for the purposes of sharing data or services, like when you pair your phone to your bluetooth hand-free kit. A PAN deals specifically with networking resources. [EB Definition] | * A personal area network (PAN) is a computer network for interconnecting devices centered cn or individual person workspace. + APAN provides data transmission among devices such as computers, smartphones, tablets and personal digital assistants. APA is @ technology that could enable wearable computer devices to communicate with other nearby computers and exchange of information in the viscinity of a person. a + PAM is the interconnection of information technology within the range of an individual person. typically within a range of 10 meters or 30 feet. « APANis a computer network organized around an individual person and is set-up for personal wse only. + APAN is formed, when two or more computers or cell phones connected to one another wirelessly over a short range, typically less than about 30 feet. ; 5.3.4 Technologies + PAbis can be wireless and constructed with cables, USB and Fire ware often linked together tough a wired PAN (WPANs). + Theoreticaly, a PAN might also consist of small wearable or embedded devices that <2” communicate upon nearby contact with other wireless devices. For example, that can store yeu! rmesical data, can connect witha device to transmit your information to a doctor. Scanned with CamScanne™ . ven (Electronics tga. Ge) $.9 ——— < i 3 SPAN Profile Roles Devices TT The PAN profile identifies certain configurati Sear nguration and set up + Wa device wants to join a PAN. it must support and’ i : of the prof n G3. Port and be able to be configured according to the’ +: Typical PAN profile roles include the followin 9 devices - () PANU (Personal Area Network User) - eve (@ PAN-GN (PAN-Group Ad-hoc Network) device, (i) PAN NAP (Pater Acces ro 5 Point) * 4 The PAN profile roles are described below, 1, PANU Device: A bluetooth enabled device seeking e icipating n ntry into a network or part ina peer- 30 pest (one-to-one) connection assumes the PANU rate thus becoming a client member the 2. PAN-GN Device : 5 of a partcip f the network, + APAN-GN device assumes the role of a forwarding node of host and the attached PANU devices act 2s diants, networking upto a maximum of 7 PANUs. ‘ The wireless network is formed without the need of additional hardware Fike @ hum or router 2s in the case of a conventional cabled network. Groupfed-hoc Network (GN) is a temporary ad-hoc network of device in proximity for sharing ‘Information and services. tS ‘is called ad-hoc because of its on the fly or transient nature and can induce upto 8 (including the host) available bluetooth-enabled devices in the immediate vicinity, that are willing to participate. ‘The device that initiate the network in this case the PAN-GN becomes the host or convoller ‘corresponding once in a PAN between the clients is routed through the PAN-GN device (host in ___~Béth one-to-one and one-to-many cases. ~3-PAN-NAP Device : device plays the role of a proxy bridge or a router between an existing network say 1d bluetooth-enabled devices. “abe? Ecos upto 7 active wireless clients. The NAP device acts as @ bridge between PANU devices of bluetooth networks and other networks for routing ethemet packets, The symbian OS PAN-NAP role allows only single PANU client access to the uptink for the externai 1. Surgeon can communicate with other team members in the Surgery fon 2. Itdoes not need keyboard to operate computers in other buildings or 2 is easily accessible to nearby hackers 3. Nocntra space required 5, Connect ta many devices at a time fective : 7. Epsy touse a frites id reliable. 9. High security 1 at in office, conference and meeting 12. Synchronize data between different devices : e, conference and 7 32 More portable 13 thcan connect to many devices at 2 time: : a5 i ‘ extra wires and extea data charges. ‘> 14. iis inexpensive because it doe not need - ta : Eee i ~ Scanned with CamScanner — Mobile and Wireless Communication (Electronics Engg. Gr.)_ 5.10 Mireless Network Technologies 15, It is more secured becaiise third party injection and data hacking are not possible in PAN. 16. Itis useful to interconnect digital devices in offices, meetings and conferences. 17. One person can synchronize several devices, ie, download, upload and exchange data among devices, ? 18. Itis portable without affecting data exchange. 5.3.7 Disadvant: 9 ‘1. Less distance range 2. Interface with radio signals 3. Slow data transfer 4. Brain and heart problem 5. Costly in terms of communication devices 6. Ithas limited range (upto 70 feet) for data sharing. 7. Itcan interfere with signals and data can be dropped. 8 Ithas less data transfer rate as compared to other networks like LAN. 9, It is expensive and costly because it is used in digital devices as smart phones, laptop and digital cameras, “ 5.3.8 Examples| 1. Wireless keyboard 2. Wireless mouse Z 3._ Smartphones . 24, TWremotes 5, Wireless printers “6, Gaming consoles 7._ Smart phone technologies include infrared, IR, Bluetooth (Fireware, Ultra wideband, Wibree, USB). 5.3.9 Applications) 1. Itis used for a personal purpose like data sharing among devices with a range of 30 feet. 2. It is commonly used to connect a laptop to a desktop PC although it can be used to connect different types of bluetooth devices. [G@iRabio FREQUENCY jDENTIE 5.4.1 Concept| + Sound waves vibrate a diaphragm, which slightly alters the shape of the resonator, which modulates the reflected radio frequency (RF). Even though the diaphragm was a convert listening device, rather than identification tag, it is considered to be a predecessor of RFID because it was passive, being ‘energized and activated by waves from an outside source. + Similarly technology such as the IFF transponder was routinely used by Germany in world war Il to identify aircraft as friend or foe. In 1948, Harry Stockman presented: a’ research paper about problems in reflected power communication and explored the use of RFID. ‘* | Marlo Cardulio invented the device, which was the first true ancestor of moder RFID. It was 2 passive radio transponder with memory. The initial device was passive, powered by the interrogating signed and was demonstrated in 1971 to the New York authority. It consisted of a transponder with .. 1G bit memory. : + _This technique is widely used by the majority of today’s deployed UHFID and microwave RFID tags. 2 introduction] * Radio frequency identification (RFID) uses electromagnetic fields to automatically Wently and wack tags attached to objects, The tags contain electronically stored information, — Scanned with CamScanner Mobile and Wireless Communication (Electronics Engg. Gr) 5.11 Wirelets Network Technologies «Unlike @ barcode, the tag need not be within the line of sight (LOS) of the reader, so it may be embedded in the tracked object. RFID 1s one method of automatic identification and data copture {alDQ. 7 + _RIFD tags can be attached to cash, clothing and possessions or implanted in animals and people, the possibility of reading’ personally linked information without consent has raised serious privacy concerns, These concerns resulted in standard specifications development addressing privacy and security issues. * RAID tags may either be read only having a factory assigned serial number that is used as a key into database, or may be read/write, where object-specific data can be written into the RFID tag by the © system user. Field programmable RFID tags may be written once, read-multiple, blank tags may be written with an electronic product code by the user. 5.4.3 Structure} * RFID tags contain at least three major parts as under - 1. An integrated circuit (IC) that stores and processes information, 2. Modulator and demodulator that modulates and demodulates radio frequency (RF) signals: ‘a means of collecting dc. power from the incident reader signal, 3. An antenna for receiving and transmitting the signal. ‘+. The tag information is stored in a non-volatile memory. The RFID tag includes either fined or "programmable logic for processing the transmission and senses data respectively. An RFID reader transmits. an encoded radio signal to interrogate the tag. The RFID tag receives the ‘Message and then responds with its identification and other information. This may be unique tag “number or may be product related information such as stock number, lot or batch number, production data or other specific information. Since tags have individual serial numbers.‘the RFID system design cen discriminate among several ‘tag$ that might be within the range of the RFID reader and read them simultaneously. RFID tags can be classified into two categories : 1. Passive RFID tag’ e 2. Active or battery assisted passive RFID tag a A passive tag is cheaper and smaller because it has rio battery, instead, the tag uses the radio energy i transmitted by the RFID reader. However, to operate 2 passive tag, it must be illuminated with a power level roughly a thousand times stronger than the signal transmission, that makes a difference in ' interference and in exposure to radiation An active tag has an on-board battery and periodically transmits its identification (D) signal. A batteny assisted passive (BAP) tag has a small battery on board and is activated in the presence of an RFID ‘ reader. _ >t RFID reader systems are clarified by the type of tag and reader into two categories as under. 1, Passive Reader Active Tag (PRAT) : A passive reader active tag (PRAT) system has a passive reader, which on! active tag (battery operated, transmit only). * The reception range of a PRAT system reader can be adjusted from 1 ly receives radio signals from 2000 feet oF 0-600 m silowing Scanned with CamScanner- Mobile and Wireless Communication (Electronics Engg. Gr) 5.12 Wireless Network Technologies flexibility in applications such as asset protection and supervision. 2. Active Reader Passive Tag (ARPT) : ‘+ An active reader passive tag (ARPT) system uses active tags awaken with an interrogator signal from the active reader. if ‘+ Avariation of this system could also use a battery. ‘+ Assisted Passive (BAP) tag, which acts like a passive tag, but has a small battery to power the tags “return reporting signal 5.4.5 Frequency Bands| 1. Low frequency (LF) band - 120-150 kHz 2. High frequency (HF) band - 13.56 MHz 3. Ultra high frequency (UHF) band - 433 - 928 MHz : 4. Microwave band - 3.1 - 10 GHz 5.4.6 Applications L.- Access management 2. Tracking of goods 3. Tracking of persons and animals 4, Toll collection and contactless payment 5. Machine readable travel documents “ 6. Smart dust for massively distributed sensor networks 7. Airport bagges tracking logistics 8. Timing sporting events 9. Tracking and billing processes 110. Item level tagging in retail stores 11. Cabins to authenticate packet chips, 12. Identification budgers replacing magnetic strips, 13. Track and test vehicles 14. Identify and locate underground pipelines, sewer lines, electrical cables, communication cables, etc. NETWORKS (WLANs) TECHNOL 5.5.1 Introduction} ‘* In the early 1990, Wide Local Area Networks (WLANs) were very expensive and were used in wired connections were strategically itis impossible. ‘© By the late 1990, most WLAN solution and preparedly protocol were replaced by IEEE 802.11 standards in various versions. WLAN prices also began to decrease significantly. * WLAN should not be confused with the Wi-Fi, which is not a technical term, but is described as a supernet of the IEEE 802.11 standard and is sometimes used interchangeably with that standard. However, not every Wi-Fi device actually receives Wi-Fi certification, ‘Every component that connects to a WLAN is considered as a station and falls into one of the two categories as under : 1. Access Points (APs) 2. Clients ‘* Access points (APs) transmit and receive RF signals with devices able to receive transmitted signals, they normally function as routers. ‘© Client may include a variety of devices such as desktop computers, workstat IP phones and other cell phones and smart phones, ‘ + While a WLAN may ook different than a traditional LAN, i unetions the same way. tions, Laptop computers, “Scanned with CamScanner Mobile and Wireless Communication (Electronics Engg. Gr.) _§.13 Jetwork Technologies «LANs and WLANs can be merged together using a bridge that connects two networks, + Many wireless routers also include internet ports, wireless devices. + In most cases, wireless router acts as'a bridge, merging the ethernet and Wi-Fi connected devices into the same network. This allows wired and wireless devices to communicate with each other through a single router. Definition! Providing connections for a limited number of WLAN is an abbreviation for Wide Local Area Network, A WLAN or Wireless LAN is a network that allows devices to connect and communicate wirelessly. Unlike a traditional wired LAN, in which devices communicate over ethernet cables, devices on a WLAN communicate via Wi-Fi 5.5.3 Advantages) 1 Itcan connect devices wirelessly, eliminating the need for cables. In allows homes and business to create local networks without wiring the building with ethernet. It also provides a way for small devices such as smart phones and tablets, to connect to the network It can support dozens or even hundreds of devices. ean extend the range easily by adding one or more repeaters. 6._It can be easily upgraded by replacing routers with new versions, 1 Itis naturally les secure than wired network. 2. Ithas limited access to the internet if security is concern. 3._Itis more susceptible to interference from other signals or physical barriers such as concrete walls. [5.5.5 Radio Spectrum 3 WLAN channels are frequently accessed sing Tee 602d protocols, which are sold under the trade name as Wi-Fi. “The RF spectrum is vital for wireless communications infrastructure. ‘Most operations on the RF spectrum require a license provided by a national regulatory body or the government... ‘© The 802.11 standard provides several distinct RF ranges for use in Wi-Fi communications. + Each range is divided into a multitude of channels. ‘* Countries apply their own regulations to the allowable channels, allowed users and maximum power levels within these frequency ranges. The ISM band ranges are also often used. + Network operators should consult their local authorities as these regulations may out of date as. they are subject to change at any time. ven 5.6.1 Introduction} IEEE 802.11 is @ part of the IEEE 802 set of LAN protocols, and specifies the set of media access control (MAC) and physical layer (PHY) protocols for implementing wireless local area nétwork (WLAN) Wi-Fi computer communication in various frequencies, including but not limited to 2, 4, 5 and 60 GHz frequency bands. Scanned with CamScanner Mobile and Wireless Communication (E © They are the world's most wictely used wireless computer networking standards, used in most home and office networks to allow laptops, printers and smart phones to talk to each other and access the intemet without connecting wires ‘+ They are created and maintained by the Institute of Electrical and Electronics Engineers (IEEE) LAN/MAN standards committee (IEEE 802). ‘+ The base version of the standard was released in 1997, and has / had subsequent amendments, * The standards and amendments provide the basic for wireless network products using the Wi-Fi band ' ‘* While each amendment is officially revoked when it is incorporated in the latest version of the standard, the corporate world tends to market to the revisions because they concisely denote capabilities of their products. © The protocols are typically used in conjunction with IEEE802.2 and are designed to interwork seamlessly with Ethemet, and are very often used to carry Internet Protocol traffic. © Although IEEE 802.11 specifications list channels that might be used, the RF spectrum availability allowed varies significantly by regulatory domain. 5.6.2 General Descriptio ‘+ The IEEE 802.11 family consists of a series of half duplex aver the ait modulation techniques thatuse _the same hasic pmtocol. = + IEEE 802.11 - 1937 was the first wireless networking standard in the family, but 802.11 was the first widely accepted one, followed by 802.1a, 802.119, 802.11n and 802112c ‘© The other standards in the family are service amendments that are used to extend the current scope of the existing stendard, which may also include corrections to a previous specification. «EEE 802.11 uses the SGHz 11 - Nil band, which, for much of the world, offers at least 23 non- overlapping 20 MHz wide channels rather than the 2.4 GHz ISM frequency band offering only three non-overlapping 20 MHz wide channels, where other adjacent channel overlap. «The segment of the RF spectrum used by IEEE 802.11 varies between countries. ‘EEE 02.11 technology has its origin in 1985 ruling by the US. Federal Communications Commission {FCO that released ISM band for unlicensed use. ‘+ 19.1987, NCR Corporation/AT&IT (New Nokia Laboratories and LSI Corporation) invented a precursor to 802.11 in Nieu Wegein in Netherlands. The inventors initially intended to use the technology for cashier systems. © The first wireless products were brought to the market under the name wave LAN with new data rates of 1 Mbps and 2 Mbps. © Vio Haves. who held the chair of IEEE 802.11 for 10 years, and has been the father of Wi-Fi was involved in designing the initial 802.11 and 80211b standards within the IEEE. «In 1996, the Wi-Fi Alliance was formed as a trade association to hold the Wi-Fi trademark under which most products are sold | | Scanned with CamScanner poral AWveless Conmuniention {tector stng9. Gr) 8.15. METROPOLITAN AREA NETWORK (WiAny’ (sia introduction] e. AWireless Metropolitan Are Area Notwork (WMAN) Is also known as a Wireless Local N Loop (WL) © WWMAN is based on the IEEE 802.16 standard wireless local loop (WLL) can teach effective transfer speed of 1 to 10 Mbps within a range of 4 to 10 kilometers, which makes it useful mainly for telecommunications companies, +The best known WMAN Is Wi-Max, which can reach speeds onthe order of 70 Mbps over a radius of several kilometers. i Table 5.3 Comparison of WLAN and WMAN WLAN Network 1. Itis intended to use for local area. L ei 2._Itis referred to as Wi-Fi 1 Iprovides regional, nationwide and global wireless coverage. 2, It provides better security than WLAN, 3. It is ideal for users away from home needing to connect virtually anywhere in their coverage area, 4, Ithas Increased efficiency of handling data. 5. It saves the cost attached to establish a wide area network, 6 Woffers‘centralized management of data and enables the users to create wireless connections within a metropolitan area. 7. Ituses either infrared light or radio waves to transfer data, 8. It-does not require high cost of placing fiber or copper cabling and leasing lines. WMAN Network This intended to use for wide area, 2._Itis a mobile broadband. 1. It provides privacy and personal computer security. ’ “2. Itpresents flexibility, roaming, hi fh standard and low cos. ‘The term WiMax is an abbreviation of Wide Interoperability for Microwave Access. It is a family of wireless broadband communication standard based on the IEEE 802.16 set of standards, which provide multiplie physical layer (PHY) and Media Access Control (MAC) options. «The home WiMax was created by the WiMax forum which was formed in June 2001 to promote conformity and interoperability of the standard, including the definition of predefined system profiles for commercial vendors. «The forum describes. WiMax as a standard-based technology enabling the delivery of last mile wire-less broadband access as an alternative to cables. © IEEE 802.16 m or WMAN - Advanced was a candidate for the 4G, in ‘competition with the LTE ‘Advanced standard WiMax also known as 4G technology. WiMax was initially designed to provide 30 to 40 Mbps data rates with the 2011 update providing upto 1 Gbps for fixed stations. «It is used for providing broadband Internet using wireless medium mainly at 2.5 GHz, 35 GHz and 5.8 GHz radio frequencies. « Itdelivers about 4 times fast Intemet compared to its 3G counterpart. a8 ae Scanned with CamScanner less Communication (Electronics Engg. Gr.) _$.16 ___ ~ WiMax is a broadband wireless access method that is based on the Data Over Cable Service Interface Specification (DOCSIS) protocol and uses OFDMA as the modulation scheme. It is not a 3GPP standard, but it is an IEEE 802.16 standard. It is also a complementary broadband service to Wi-Fi (EEE 802.11 standard). © WiMax is technology standard for long-range wireless networking for both mobile and fixed connections. ‘e While WiMax was once envisioned to be a leading form of internet communication as an alternative to cable and DSL. its adoption has been limited. 1. Power management 2. Multicast and broadcast services 3. Multi hop relay ‘ 5.8.4 Applications} 1. It provides portable moblle broadband connectivity across cities and countries through various devices. It provides a wireless alternative to cable and digital subscriber line (DSL) for broadband access. It provides data, telecommunications (VoIP) and IPTV services (triple play) It provides Internet connectivity as part of a business continuity plan. Ithas smart grids and metering [5.9 IEEE 802/46 Wi 5.9.1 Introduction) 5 © IEEE 802.16 is a series of wireless broadband standards written by the Institute of Electrical and Electronics Engineers (EEE) ‘+ The IEEE Standards Board established a working group in 1999 to develop standards for broadband for wireless metropolitan area networks (WMANS). 5 * The work group is a unit of the JEEE 802 local area network and metropolitan area network standard committee, + Although the 80216 family of standards is officially called wireless MAN in IEEE it has been ‘commercialized under the name WiMax by the WiMax forum industry alliance. * The forum promotes and certifies compatibility and interoperability of products based on the IEEE 802.16 standards. [5.9.2 Key Features of IEEE 802.16) 1. Broadband wireless access Upto 50 km and upto 70 Mbps. Data rate versus distance trade off using adaptive modulation (64 aan to BPSK), Offers non-line of site (NLOS) operation. 15 to 28 MHz channels. 6 Delivers more than 1 Mbps per user. Both licensed and licensee exempt spectrum. Q05 for voice, video and T1/E1, continuous and bursty traffic. Support point-to-multimedia and mesh network models. wen auneun ~ Scanned with CamScanner 5.10.4 Introduction] +. The IEEE 802.16a standard amended 2 GHz and 11 GHz, specifies a metroy alternative for cable, PSI and TI level backhaul for IEEE 802.11 hotspots. The new IEEE 802.16a standard specifies a protocol that among other things supports low latency applications such as voice and vi ivity without requiring a direct line of sight between subscriber termi thousands of subscribers from a single base station, The standard will help to accelerate the introduction of wieless broadband equipment into the market place, speeding up last mile broadband deployment worldwide by enabling sence Providers to increase system performance and reliability while reducing their equipment costs and investment risks. WiMax is a non-profit industry trade organization that has been chartered to remove an important barrier to adoption of the standard by assuming demonstrable interoperability between system components developed by OEMS. by the IEEE to cover fre ‘quency bands in the range between 19 protocol that will enable a wireless roadband access, as well as providing politan area networkin, Services for last mile br ‘WiMax will develop conformance and interoperability test plans, select certification laboratories and will host interoperability events for IEEE 802.16 equipment vendors. By defining and conducting interoperability testing, and by awarding vendor system 2 WiMax certified label, WiMax will model the approach pioneered by the Wi-Fi Alliance the ignited the WLAN industry, bringing the same benefits to the BWA market segment: : 1.256 point FFT OFDM waveform 2. Adaptive modulation and variable error correction encoding per RF burst. 3. TDD and FDD duplexing support. 4. Flexible channel sizes (e.g. 3.5 MHz, 5 MHz; 10 MHz, ete) Bi =" 5. Designed to support small antenna systems. : Built-in support for addressing multipath in outdoor LOS and NLOS environments. 2. “Address varying worldwide regulations, where one or both may be allowed. “Ensures a robust RF-link while maximizing the number of bits per second for each subscriber unit. t bility. necessary to operate in many different frequency bands with varying channet 5.11.1 History] = Basically, MANET can be categorized into first, second and third generation, ‘© The first generation (1G) came up with ‘packet radio’ network (PRNET), and were sponsored by DARDA in the early 1970s. has evolved to be a robust, reliable, operational experimental network, . The PRNET used @ combination of ALOHA and CSMA approaches for medium access, and a kind of distance - vector routing to provide packed - switched networking to mobile battlefield elements in an infrastructureless, hostile environment. ll Scanned with CamScanner Mobile and Wireless Communleation (Hectronics Engg. Gr)” 5.19 _Wireless Network Technologies * The second generation (2G) evolved in early 1980s when SURAN (Survivable A significantly improved upon the radios (making them smaller, cheaper, Pow! algorithm, and resilience to electronic attacks. * Important developments during this period include GLOMO (Global Mo! NTOR (Near Term Digital Radio), + _ The goal of GLOMO was to provide office environment Ethemet type multime' anywhere, in handheld devices. * Channel access approaches were now in the CSMA/CA and TDMA, and several topology control schemes were developed. ‘ ‘+The NTOR used clustering and link state routing, and self-organized into a two tier ai * Now used by the US arrays, NTOR is the only ‘eat’ (non-prototypical) ad-hoc network in use today. * The third generation (3G) evolved in 1990's also termed as commercial network with the advent of Notebooks, Computers, open source software and equipments housed on RF and infrared. ‘+ IEEE 802.11 subcommittee adopted the term ‘ad-hoc networks’. + The concept of commercial (non-military) ad-hoc networking had arrived. *. Within the IETF, the Mobile Ad-hoc Networking (MAHET) working group was born and sought to standardize routine protocol for ‘ad-hoc networks’. «The concept of commercial (non-military) and ad-hoc networking had arrived. _ * Within the IETP, the Mobile Ad-hoc Networking (MANET) working group was born and sought to standardize routine protocol for ad-hoc networks. ‘+ The development of routing within the MANET working group and the larger community forked into reactive (routes on demand) and proactive (routes ready to use) routing protocols 141. * The 802.11 subcommittee standardized a medium access protocol that was based on. collision avoidance and tolerated hidden terminals, making it usable, if not optimal, for handling mobile ad-hoc network prior to types out of notebooks and 802.11 PCMCIA cards. +__HIPERLAN and Bluetooth were some other standards that addressed and benefited ad-hoc networking. [5.11.2 Concept] daptive Radio Networks) er-thrifty), scalability of ile Information System) and .dia connectivity anytime, 1 novel routine and \d-hoc network. ‘+ Advancement in the field of Internet due to wireless networking gives rise to many new applications. ‘+ Mobile Ad-hoc Network (MANET) is one of the most promising fields for research and development of wireless network. ‘+ AS the popularity of mobile device and wireless networks significantly increased over the past years, ad-hoc network has now become one of the most vibrant and active field of communications and networks. + A mobile ad-hoc network (MANET) is an autonomous collection of mobile devices (Laptops, Smart phones, Sensors etc) that communicate with each other over wireless links and co-operate jn a distributed manner in order to provide the necessary network functionality in the absence of a fixed infrastructure. - + This type of network operating as a stand-alone network or multiple point of at Retworks or Internet paves the way for numerous new and exciting applications, 5.11.3 Characteristics] 1. Each node acts a5 both host and router, | Itis capable of multi-step radio routing, A centralized firewall is absent. Ithas distributed nature of operation for security, routing and host configurat The node can join or leave the network any time, making the topology dynamie The mobile nodes are characterized with less memory, power and light weigh ae The reliability, efficiency, stability and capacity of wireless links are at: with wite links, This shows the fluctuating link between bandwidth of enon Shem, compere inks. tachment to cellular it is an autonomous in behaviour, MoMawen i Scanned with CamScanner ete se leet Comenrtcation(eceores egg. Or) 534 _ & Mable end spontenecus behadens, which semards 9 Kb nodes have identical features wht simiter « Haren ieter sensing, 3 fe etpanniities ard © The chalienges in MANET are a3 ur: g 1 Autonomous. 2. Dynamic! togslagy, 2, Device discovery, 4, Caetnath spphesion, - 5. Limited resources. ; "6 Sealatitey, 7. Limited physical security. 8. Poor wtemationst quatey 9. Ad-hoc addressing 19. Network configuration. 11. Topology maintenance, 12. tohrasructmeless and wit-opecmed, * The advantages of MANET are 35 under: L 2. MANET allows users to access and exchange information regardless cf their gecarechic pecnion ar proximity to infrestrscture. 2. All modes in MANETs are mobile and their connections are Gynamnic. 4. MANETs do not require 2 fixed infractruct: 5. Rolfers an advantageous decentralized character to the network. 6 Decentratization makes the networrs more Rexbie and more robust. EB 5.11.6 Applications] - ‘* Some of the applications of MANET are as under = 1 It is used to maintain an information between the’ soldiers, vebicés and miltary information 2 It can be used in emergency rescue operations for disaster refet efforts, eg ini fre. flood or The schematic block of 2 wireless LAN in Ad-hoc network Is as shown in Fig. 5.2 it is abbvevated as WAHET. It 2 cecentvalized type of wireless network This network « ad-hoc, because it does rot rely on a pre-esisting infrastructure. Such a routers in wited networks of access points in managed infrastructure wnteless networks. Instead such in node participates in routing by forwarcing cata fer chet nodes, So the determination of which nodes forward data is made cynamucally on the basis of network connectnity, In addition to the classic routing ad-hoc networks can use flooding for forwarding data: Scanned with CamScanner > _Wireless Network Technologies a. akt Ad-Hoc Network} rg POA 7 Fig. 5.2 © WANET are self-configuring dynamic networks in which nodes are free to move. # Wireless networks lack the complexities of infrastructure set up and administration, enabling devices to operate and join networks‘on the fly, anywhere, anytime. ‘What is WLL? What are the features of WLL? Describe the operation of WLL with suitable diagram. List the advantages of WL. ~ E State the applications of WL. x Describe the operation of LMDS with suitable diagram: State advantages of LMDS. State disadvantages of LMDS. - What is difference between wireless and fixed telephone network? 10. What are the limitations of wireless networks? 11, Write a short note on WLAN. 12.” Describe the architecture of IEE 802.11 WLAN. 13. What is bluetooth? 14.” What are the applications of bluetooth? 15, What is bluetooth PAN? 16. What are the bluetooth PAN devices ? 17. Compare bluetooth with Wi-Fi. 18, Why do you need 4G? 7 19, What are the main aspects of 4G?" : 20. What is MANET? i 21. List the advantages of MANET. i 22, State applications of MANET. 23, What is blocking ? 24, What is voice channel blockage ? 25, What is call drop.? 26. Define the term voice quality. 27. What do you understand by the term word error rate ? Abe Beenanawnye Wel a Scanned with CamScanner

You might also like