Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 35

Institute of Business and Technology

Course: Introduction to Computer and Computer Application


Instructor: Mr. Hussain Khurasani
Topic: Wireless Networking.

Prepared by:

1-Asif Ayoub 2-Rabia Bahadurdin


BME/1005 BBE/608

3-Syed Asif Ahmed 4-Nadeem Akhter


BME-848 BME-828

5-Yasin Diwan 6-Shaharyar Insari


BME-846 BME-831

Page 1 of 35
Wireless networking

Page 2 of 35
April 10, 2010

Table of Contents
S.No: Topic Covered Page

A. Introduction 04

B. History 05

C. How does wireless networks work? 05

D. How does data transfer over wireless network? 06

E. Types of wireless networks: 07

1. WWAN 07

2. WMAN 08

3. WLAN 09

4. WPAN 09

5. Mobile technology 10

F. Connectivity technology: 11

1. Wi-Fi 11

2. WiMax 14

3. Bluetooth 18

4. GSM 20

5. GPRS 27

G. Advantages & disadvantages of wireless network 31

H. Wireless Revolution 33

I. Summary 34

J. Bibliography 35

Page 3 of 35
A. Introduction:

Wireless network refers to any type of computer network that is wireless, and is commonly
associated with a telecommunications network whose interconnections between nodes is
implemented without the use of wires. Wireless telecommunications networks are generally
implemented with some type of remote information transmission system that uses electromagnetic
waves, such as radio waves, for the carrier and this implementation usually takes place at the
physical level or "layer" of the network.

This network is getting popular nowadays due to


easy to setup feature and no cabling involved. You can connect computers anywhere in your home
without the need for wires.

Here is simple explanation of how it works, let say you have 2 computers each equipped with
wireless adapter and you have set up wireless router. When the computer sends out the data, the
binary data will be encoded to radio frequency and transmitted via wireless router. The receiving
computer will then decode the signal back to binary data. The details shall be covered in this report

Page 4 of 35
B. History:

  Heinrich Herz discovered and first produced radio waves in 1888 and by 1894 the modern way to
send a message over telegraph wires was first conducted.   Marconi sent and received signals up to
two miles using radio waves.  Marconi became known as the “father of radio”.  By 1899, Marconi
sent a signal nine miles across the Bristol Channel and 31 miles across the English Channel to
France.  In 1901 he was able to transmit across the Atlantic Ocean.

During World War II, the United States Army first used radio signals for data transmission. 
This inspired a group of researchers in 1971 at the University of Hawaii to create the first packet
based radio communications network called ALOHNET.  ALOHNET was the very first wireless
local area network (WLAN). This first WLAN consisted of 7 computers that communicated in a bi-
directional star topology.   

The first generation of WLAN technology used an unlicensed band (902-928 MHz ISM),
which later became crowded with interference from small appliances and industrial machinery. A
spread spectrum was used to minimize this interference, which operated at 500 kilobits per second.  
The second generation of WLAN technology was four times faster and operating at 2Mbps per
second.  Third generation WLAN technology operates on the same band as the second generation
and we currently use it today.

 In 1990, the IEEE 802 Executive Committee established the 802.11 Working Group to
create a wireless local area network (WLAN) standard. The standard specified an operating
frequency in the 2.4GHz ISM band. In 1997 the group approved IEEE 802.11 as the world's first
WLAN standard with data rates of 1 and 2 Mbp.

C. How does wireless networks work:


Wireless network begins with the sending and receiving of data. Any data that your computer
intends to share over a network is first sent to the network's wireless adapter. This information can
be anything from sending and receiving large files to simple text instant messages from one
computer to another. The adapter translates this information into a radio signal, which it then sends
over an antenna either directly to another computer or to a router.
The other computer (via another wireless adapter) or the router receives the radio signal and
converts it back into a format that computers can understand. Once this has happened, the
information can be accessed by all computers on the network if made accessible to everyone, or just
to individual computers if the specification was made. This entire process can happen quickly for
small files, or can take some time depending on file size and speed of antennas and routers.

Page 5 of 35
D. How Does Data Transfer Over a Wireless Network?
A wireless network functions with non-physical media. Where a wired network must use cables
(e.g., CAT5 or fiber-optic), a wireless network is able to connect its components, such as PCs,
laptops, servers and printers, with radio waves, microwaves, line-of-sight infrared or satellite
communication. Most wireless networks work off of radio waves. Each component of a wireless
network has an adapter or network card that is designed to intercept and broadcast specifically
tuned radio waves. The adapters work much like a radio antenna.

The network will have a device called a wireless router which physically attaches to the incoming
network and thus the Internet via high speed broadband or cable. The wireless router takes the
physically transmitted data and converts it into radio waves, which it transmits via its antennae. The
router also reverses this process by taking information from wireless sources (such as a computer)
and translates them from the radio waves into language for the physically connected Internet
connection to use.

Data is transmitted by being converted from its binary form of zeroes and ones into radio wave
media. The newly converted data is then broadcasted and intercepted by wireless adapters, which
then transform the radio data into zeroes and ones for the computer to understand. Wireless
networks use radio frequencies of 2.4 GHz or 5 GHz. Using a higher frequency allows for more
data to be transmitted. As all computer networks have a code for the standards in which they
operate; wireless networks function under the 802.11 standard.

Page 6 of 35
E. Types of wireless networks:

Different methods and standards of wireless communication have developed across the world,
based on various commercially driven requirements. These technologies can roughly be classified
into four individual categories, based on their specific application and transmission range. These
categories are summarised in the figure below.

1. Wireless wide area networks (WWANs):

Wireless Wide Area Network, enables users to establish wireless connections over remote private
or public networks using radio, satellite and mobile phone technologies instead of traditional cable
networking solutions like telephone systems or cable modems.

These connections can be maintained over large geographical areas, such as cities or countries,
through the use of satellite systems or multiple antenna sites maintained by wireless service
providers.

Schools or a business in rural areas benefit from Wireless WANs because it is more cost effective
than laying long cable or fiber links. The same can be said for institutions in built up urban areas.
Installing cable into an existing location could be very disruptive, so a wireless alternative is more
cohesive.

Page 7 of 35
Examples of Wireless WANs are Digital Cellular Phone and Data Services, Satellite Modems or a
computer hooked up with a wireless WAN card and used in a city or geographical area that has
WWAN deployed. There are cities that offer wireless internet services to the anyone who lives
within its reach. Some universities offer WWAN services to students who can hook up to the school
network from outside of the building or across town

Wireless Wide Area Networks (WWAN) are the most common of all wireless networks, because all
mobile phones are connected to a wireless wide area network. The main technologies are:

 GSM (Global System for Mobile Communication)


 GPRS (General Packet Radio Service)
 UMTS (Universal Mobile Telecommunication System)

2. Wireless metropolitan area networks (WMANs):


Fast communications of network within the vicinity of a metropolitan area is called WMAN, that
put up an entire city or other related geographic area and can span up to 50km. WMAN designed
for a larger geographical area than a LAN. The standard of MAN is DQDB which cover up to 30
miles with the speed of 34 Mbit/s to 155 Mbit/s.1t is more common in schools, colleges, and public
services support a high-speed network backbone. WMAN is a certified name by the IEEE 802.16
that functioning on Broadband for its wireless metropolitan. WMAN have air interface and a single-
carrier scheme intended to activate in the 10-66 GHz spectrum, supports incessantly unreliable
transfer levels at many certified frequencies. WMAN opens the door for the creation and Provide
high-speed Internet access to business subscribers.It can handle thousands of user stations with
prevents collisions and support legacy voice systems, voice over IP, TCP/IP. WMAN offer different
applications with different QoS requirements.The technology of WMAN consist of ATM, FDDI,
and SMDS. WiMAX is a term used for Wireless metropolitan area network and plinth on the IEEE
802.16. A Wireless Metropolitan Area Network (WMAN) is also known as a Wireless Local Loop
(WLL).

3. Wireless local area networks (WLANs):


Page 8 of 35
A wireless LAN or WLAN is a wireless Local Area Network, which is the linking of two or more
computers without using wires. It uses radio communication to accomplish the same functionality
that a wired LAN has. WLAN utilizes spread-spectrum technology based on radio waves to enable
communication between devices in a limited area, also known as the basic service set. This gives
users the mobility to move around within a broad coverage area and still be connected to the
network.

             

IEEE 802.11: IEEE 802.11, the Wi-Fi standard, denotes a set of Wireless LAN/WLAN standards
developed by working group 11 of the IEEE LAN/MAN Standards Committee (IEEE 802). The
802.11 family currently includes six over-the-air modulation techniques that all use the same
protocol. The most popular (and prolific) techniques are those defined by the b, a, and g
amendments to the original standard.

WLAN typically extends an existing wired local area network. WLANs are built by attaching a device called
the access point (AP) to the edge of the wired network. Clients communicate with the AP using a wireless
network adapter similar in function to a traditional Ethernet adapter.

Network security remains an important issue for WLANs. Random wireless clients must usually be
prohibited from joining the WLAN. Technologies like WEP raise the level of security on wireless
networks to rival that of traditional wired networks.

For WLANs that connect to the Internet, Wireless Application Protocol (WAP) technology allows
Web content to be more easily downloaded to a WLAN and rendered on wireless clients like cell
phones and PDAs.

4. Wireless personal area networks (WPANs):

A wireless personal area network (WPAN for short) is a low-range wireless network which covers
an area of only a few dozen meters. This sort of network is generally used for linking peripheral
devices (like printers, cell phones, and home appliances) or a personal assistant (PDA) to a
computer, or just two nearby computers, without using a hard-wired connection. There are several
kinds of technology used for WPANs:

The main WPAN technology is Bluetooth, launched by Ericsson in 1994, which offers a maximum
throughput of 1 Mbps over a maximum range of about thirty meters. Bluetooth, also known as

Page 9 of 35
IEEE 802.15.1, has the advantage of being very energy-efficient, which makes it particularly well-
suited to use in small devices. Wireless Personal Area Network (WPAN) is made possible with
network technologies such as Infrared (IrDA) and Bluetooth.

                       

Bluetooth: Bluetooth is an industrial specification for wireless personal area networks (PANs), also
known as IEEE 802.15.1. Bluetooth provides a way to connect and exchange information between
devices such as personal digital assistants (PDAs), mobile phones, laptops, PCs, printers, digital
cameras and video game consoles via a secure, globally unlicensed short-range radio frequency.
Bluetooth is a radio standard and communications protocol primarily designed for low power
consumption, with a short range (power class dependent: 1 meter, 10 meters, 100 meters) based
around low-cost transceiver microchips in each device.

Infrared (IrDA): The Infrared Data Association (IrDA) defines physical specifications
communications protocol standards for the short range exchange of data over infrared light, for
typical use in Personal Area Networks

5. Mobile Technology Network’s:


Mobile technology is exactly what the name implies technology that is portable. Examples of
mobile IT devices include; Laptop computers. Palmtop computers or personal digital assistants
Mobile phones and 'smart phones' - high-end phones with more advanced capabilities. Global
positioning system (GPS) devices Wireless debit/credit card payment terminals. Mobile devices can
be enabled to use a variety of communications technologies.

A mobile phone or mobile (also called cell phone and headphone) is an electronic device used for
mobile telecommunications (mobile telephone, text messaging or data transmission) over a cellular
network of specialized base stations known as cell sites. Mobile phones differ from cordless
telephones, which only offer telephone service within limited range, e.g. within a home or an office,
through a fixed line and a base station owned by the subscriber and also from satellite phones and
radio telephones. As opposed to a radio telephone, a cell phone offers full duplex communication,

Page 10 of 35
automates calling to and paging from a public land mobile network (PLMN), and handoff
(handover) during a phone call when the user moves from one cell (base station coverage area) to
another. Most current cell phones connect to a cellular network consisting of switching points and
base stations (cell sites) owned by a mobile network operator. In addition to the standard voice
function, current mobile phones may support many additional services, and accessories, such as
SMS for text messaging, email, packet switching for access to the Internet, gaming, Bluetooth,
infrared, camera with video recorder and MMS for sending and receiving photos and video, MP3
player, radio and GPS.

F. Connectivity Technologies:

1. Wireless fidelity (Wi-Fi):

Wi-Fi is wireless technology which enables connection between two or more devices wirelessly for
data sharing purposes. It is wireless networking which is based on IEEE 802.11 standards. it is now
being used by millions of people using various devices such as personal computers, laptops, PDAs',
printers, camera, games, mp3 players etc, more and more gadgets are coming with built in feature
of this amazing wireless technology.

Computer usage has dramatically increased in past few years which in result brought immense
technology enhancement in every field possible. Technology has reached to its heights but thirst of
knowledge is still in race and will always be till end of the world. Wireless communication between
computers is certainly one of the most appreciated and used technology globally. In “Computers”
Wi-Fi replaced traditional wired networks between two or more computers, it enabled file
transferring from server to clients and vice versa possible without wires, networking cards, hubs
and other important networking related hardware. Using Wi-Fi internet connection can be shared
among computers with minimum usage of hardware, WLAN cards enable feature of wireless
networking among devices, wireless routers help to broadcast wireless networking signals in given
area. 

Wi-Fi is a long-distance, transportable connectivity technology for individual, business or for


certain geographical area. Millions of people all over the world use Wife in their homes to converse

Page 11 of 35
to converse to anyone on the planet with Wi-Fi connected devices. This technology was make-believe by
anyone on the planet with Wi-Fi connected device. This technology was make-believe by the
Institute of Electrical and Electronic Engineers in 1997. 

Wi-Fi is ongoing technology, every now and then something new in wireless technology shows up.
Wi-Fi technology is by far the most used technology world wide as everyone is realizing growing
needs for being wireless which is impacting our daily lives and our businesses.

Features of “Wi-Fi” Technology


1.1. A new aspect in networking:

Wi-Fi has brought a new aspect in the ground of networking. The broadcast of data is completed via
radio waves and the cost of cables for network lying down. Wi-Fi enable a user to get access to
internet anywhere in the given location. Now you can make a network in Hotels, Libraries, colleges,
universities, campus, private institutes, and coffee shops and even on a public place to make your
business more profitable and connect with their client any time. Wi-Fi makes waves for business
with their highly effective cable less media.

1.2. Unmatched mobility and elasticity:

Wi-Fi, is allowing new intensity of connectivity without giving up functions. Wi-Fi introduced
various types of utilities such music streamers that transmit your music to speakers without any
wire you can also play music from the remote computer or any other attached to the network. The
most important now you can play online radio. Wife technology system is rather remarkable, you
can download songs, send email and transfer files expediently at sky-scraping speed and you can
move your computer easily because your Wi-Fi network has no cable to disrupt your work so we
can say that it is quite easy, helpful and most of all expedient.

1.3. Fortress Technology:

Wi-Fi providing secure wireless solutions support the growth and release of a prototype mobile ad
hoc wireless network for use in the wireless strategic skirmish.

1.4. Support an entire age bracket:

Wi-Fi technology has several advantages it support an entire age bracket and create a connection
between components on the same network and have ability to transfer data between the devices and
enable different kind of devices such as game, MP3 player, PDA’s and much more!

1.5. It's convenient and everywhere:

Page 12 of 35
Wi-Fi is a convenient technology and where the range station exists you are online during travel
you can equip with a Wi-Fi network and set up shop anyplace. You will automatically connect with
internet if you are near hotspot. These days Wi-Fi exist everywhere with all its wonders.

1.6. More faster and secure:

With Wi-Fi you can get high speed of internet because it is very fast than DSL and Cable
connection you can establish a Wife network in small space now you don’t need any professional
installation just connect to a power outlet with an Ethernet cord, and start browsing. Wi-Fi security
system for Threats makes it more renewable and its tool protect your VPN and secure web page.
You can easily configure the device to take better performance. The standard devices, embedded
systems and network security make it more powerful.

1.7. Wi-Fi with no limitation:

You can use a “Wi-Fi” network with no limitation because it can connect you worldwide. You can
easily reach to your requirements with Wi-Fi networking applications because the power
consumption is very high as compared to other bandwidth. The vision of wireless network is bright
with Pre-N products and high quality media streaming.

2. Wi-Fi Limitations:

Wi-Fi technology supports two types, one is called “infrastructure” other one is “Ad hoc” In ad hoc
Wi-Fi network can be connected without central device known as router or access point Ad hoc
mode is always preferred over infrastructure mode, however ad hoc networks have following issues
Wi-Fi devices configure on Ad hoc mode offers nominal security against network intruders. Ad
hock Wi-Fi configured devices cannot disable SSID broadcast in contrast to infrastructure mode.
Network attackers will not required much of effort to prevail in Ad hoc Network. Using Ad hoc
mode signals issues can experienced where as using alternative infrastructure mode will provide full
strength singles. Wi-Fi networking standard including 802.11g requires ad hoc mode of
communication supports which 11Mbps bandwidth Wi-Fi devices when configured to infrastructure
mode can transfer data up to 54 Mbps, where as using ad hoc mode only 11 mbps can be achieved.
Ad hoc mode is considered slower in comparison to infrastructure for this reason.

2.1. Security concerns

It is simple to set Wi-Fi network but keeping it secure takes much more effort, Access points of Wi-
Fi do not deploy encryption methods. It is required to be done as network is enabled. Secure Wi-Fi
network can be easily attacked by hackers to steal private information.
Guests who are not potentially harmful can still utilize the network resources and minimize the
performance.

2.2. Interference from other devices

Page 13 of 35
Wi-Fi transmits data at 2.4 GHz making susceptible to interfere Bluetooth enabled devices, mobile
phones, cordless, Microwaves and other communication devices, closer the interfering devices are
the poor communication will be and vice versa.

2.3. Lacking high-quality media streaming

Today’s fastest Wi-Fi standards are pushed beyond their limit when trying to view high end media.
High definition video and audios cannot be viewed flawlessly because of lower transfer rate; things
can be much more worst if other clients are accessing the same access points.

Even the fastest current Wi-Fi standards are pushed beyond their limit when trying to handle some
of today's high-end media. High-definition audio and video files are timely-delivery-intensive, and
typical wireless networks have neither the transfer speeds nor the consistency to transfer them
flawlessly. This problem is further compounded if there are multiple devices connected to the same
because the bandwidth must be divided between all of the equipment.

WiMax :

WiMAX is an IP based, wireless broadband access technology that provides performance similar to
802.11/Wi-Fi networks with the coverage and QOS (quality of service) of cellular networks.
WiMAX is also an acronym meaning "Worldwide Interoperability for Microwave Access
(WiMAX).

At its heart, however, WiMAX is a standards initiative. Its purpose is to ensure that the broadband
wireless radios manufactured for customer use interoperate from vendor to vendor. The primary
advantages of the WiMAX standard are to enable the adoption of advanced radio features in a
uniform fashion and reduce costs for all of the radios made by companies, who are part of the
WiMAX Forum™ - a standards body formed to ensure interoperability via testing. The more recent
Long Term Evolution (LTE) standard is a similar term describing a parallel technology to WiMAX
that is being developed by vendors and carriers as a counterpoint to WiMAX.

Page 14 of 35
WiMax (802.16) technology often misinterpreted by the people by the names of mobile WiMAX,
802.16d, fixed WiMAX and 802.16e. Actually 802.16-2004 or 802.16d is developed by the third
party as a standard and it is also referred to called as Fixed WiMAX because this standard is
lacking behind just because of the non-mobility feature that’s why it’s often called as Fixed
WiMAX. During the maturity period of WiMax (802.16) technology some of the amendments were
made to the above mentioned 802.16d and they referred this amending standard as 802.16e. 802.16e
introduced mobility and some other features amongst other standards and is also known as Mobile
WiMAX.

Less than one out of five people of the developed world and an even smaller, little percentage of
people across the world have broadband access today. Existing technologies such as Digital
Subscriber Line (DSL), cable, and fixed wireless are overwhelmed by expensive installs, problems
with loop lengths, upstream upgrade issues, line-of-sight restrictions, and poor scalability.

WiMax (802.16) is the next stage to a broadband as well as a wireless world, extending broadband
wireless access to new locations and over longer distances, as well as considerably reducing the
cost of bringing broadband to new areas. WiMax (802.16) technology offers greater range and
bandwidth than the other available or forthcoming broadband wireless technologies such as
Wireless Fidelity (Wi-Fi) and Ultra-wideband (UWB) family of standards. It provides a wireless
alternative to wired backhaul and last mile deployments that use Data Over Cable Service Interface
Specification (DOGS1S) cable modems, Digital Subscriber Line technologies (DSL), T-carrier and
E-carrier (Tax/Ex) systems, and Optical Carrier Level (OC-x) technologies.

The general initiative of metropolitan area wireless networking, as envisioned with 802.16, begins
with what is called fixed wireless. A backbone of base stations is connected to a public network,
and each base station carries hundreds of fixed subscriber stations, which can be both public hot
spots and fire-walled enterprise networks. Later in the development cycle of 802.16e, WiMax
(802.16) is expected to encourage mobile wireless technology specifically wireless transmissions
directly to mobile end users, This will be similar in function to the General Packet Radio Service
(GPRS) and the one times Radio Transmission Technology (RTT) offered by mobile phone
companies.

New organizations as well as individuals are increasingly adopting broadband, whereas those
already using broadband are becoming dependent on it and are demanding better services with
added benefits. To support this exceptional new demand, WiMax (802.16) has emerged as a
feasible solution, because of its inherent features that holds great promise for the future of wireless
communications.

There has been a lot of excitement about WiMax (802.16) and the impact that this standard based
wireless network technology will have on the broadband access market. All this hype has generated
great expectations, and the industry has responded with exceptional aggression and commitment
toward taking broadband to the next level with WiMax (802.16).

Page 15 of 35
2.1. How WiMAX Works:

The backhaul of the WiMax (802.16) is based on the typical connection to the public wireless
networks by using optical fiber, microwave link, cable or any other high speed connectivity. In few
cases such as mesh networks, Point-to-Multi-Point (PMP) connectivity is also used as a backhaul.
Ideally, WiMax (802.16) should use Point-to-Point antennas as a backhaul to join subscriber sites to
each other and to base stations across long distance.

A WiMax base station serves subscriber stations using Non-Line-of-Sight (NLOS) or LOS Point-to-
Multi-Point connectivity; and this connection is referred to as the last mile communication.  Ideally,
WiMax (802.16) should use NLOS Point-to-Multi-Point antennas to connect residential or business
subscribers to the WiMax Base Station (BS). A Subscriber Station (WiMax CPE) typically serves a
building using wired or wire.

2.2.  WiMAX Technology Design:

The design of the WiMax is ideal for challenges related with earlier versions of wired and wireless
access networks. At the same time the backhaul connects the WiMax system to the network, it is
not an integrated part of WiMAX system. Normally a WiMAX network consists of two parts, a
WiMax Base Station (BS) and a WiMax receiver also referred as Customer Premise Equipment
(WiMax CPE).

2.3. WiMax Base Station (BS):

A WiMax base station comprises of internal devices and a WiMax tower. A WiMax base station
can normally covers the area of about 50 kilometers or 30 miles radius, but some other and
environmental issues bound the limits of WiMax range to 10 km or 6 miles. Any wireless user
within the coverage area would be able to access the WiMax services (Fig: 2). The WiMax base
stations would use the media access control layer defines in the standard and would allocate uplink
and downlink bandwidth to subscribers according to their requirements on real time basis.

Base Station connectivity with Subscriber Stations

Page 16 of 35
2.4. WiMax Receiver:

A WiMax receiver, which is also referred as Customer Premise Equipment (WiMax CPE), may
have a separate antenna or could be a stand-alone box or a PCMCIA card that inserted in a laptop or
a desktop computer. Access to a WiMax base station is similar to accessing a wireless access point
(AP) in a Wi-Fi network, but the coverage is more.

So far one of the biggest restrictions to the widespread acceptance of WiMAX has been the cost of
WiMax CPE (WiMax Receiver). This is not only the cost of WiMax CPE (WiMax Receiver) itself,
but also that of installation. In the past, Broadband Wireless Access (BWA) have been
predominantly Line Of Sight (LOS), requiring highly skilled labor and a truck role to install and
provide a service to customer. The concept of a self-installed WiMax CPE (WiMax Receiver) has
been difficult for BWA from the beginning, but with the advent of WiMax technology this issue
seems to be getting resolved.  

Excel Max Indoor WiMAX Receiver

2.5. WiMax Backhaul:

WiMax backhaul is actually a connection system from the Access Point (AP) back to the provider
and to the connection from the provider to the network. A backhaul can set out any technology and
media provided; it connects the system to the backbone. In most of the WiMax deployments
circumstances, it is also possible to connect several WiMax base stations with one another by use of
high speed WiMax backhaul microware links. This would also allow for roaming by a WiMax
subscriber (WiMax Receiver) from one WiMax base station coverage area to another, similar to
roaming enabled by cellular phone companies

2.6. Types of WiMAX Technology (802.16):

The WiMax family of standards (802.16) concentrate on two types of usage models a fixed WiMax
usage model and a mobile WiMax usage model. The basic element that differentiates these systems
is the ground speed at which the systems are designed to manage. Based on mobility, wireless
access systems are designed to operate on the move without any disruption of service; wireless
access can be divided into three classes; stationary, pedestrian and vehicular.

Page 17 of 35
Bluetooth:

Bluetooth is a high-speed, low-power microwave wireless link technology, designed to connect


phones, laptops, PDAs and other portable equipment together with little or no work by the user.
Unlike infra-red, Bluetooth does not require line-of-sight positioning of connected units. The
technology uses modifications of existing wireless LAN techniques but is most notable for its small
size and low cost. The current prototype circuits are contained on a circuit board 0.9cm square, with
a much smaller single chip version in development.

The cost of the device is expected to fall very fast, from $20 initially to $5 in a year or two. It is
envisioned that Bluetooth will be included within equipment rather than being an optional extra.
When one Bluetooth product comes within range of another, (this can be set to between 10cm and
100m) they automatically exchange address and capability details. They can then establish a 1
megabit/s link (up to 2 Mbps in the second generation of the technology) with security and error
correction, to use as required.

The protocols will handle both voice and data, with a very flexible network topography. This
technology achieves its goal by embedding tiny, inexpensive, short-range transceivers into the
electronic devices that are available today. The radio operates on the globally-available unlicensed
radio band, 2.45 GHz (meaning there will be no hindrance for international travelers using
Bluetooth-enabled equipment.), and supports data speeds of up to 721 Kbps, as well as three voice
channels. The Bluetooth modules can be either built into electronic devices or used as an adaptor.
For instance in a PC they can be built in as a PC card or externally attached via the USB port.

Each device has a unique 48-bit address from the IEEE 802 standard. Connections can be point-to-
point or multipoint. The maximum range is 10 meters but can be extended to 100 meters by
increasing the power. Bluetooth devices are protected from radio interference by changing their
frequencies arbitrarily up to a maximum of 1600 times a second, a technique known as frequency

Page 18 of 35
hopping. They also use three different but complimentary error correction schemes. Built-in
encryption and verification is provided.

Moreover, Bluetooth devices won't drain precious battery life. The Bluetooth specification targets
power consumption of the device from a "hold" mode consuming 30 micro amps to the active
transmitting range of 8-30 milliamps (or less than 1/10th of a watt). The radio chip consumers only
0.3mA in standby mode, which is less than 3 % of the power used by a standard mobile phone. The
chips also have excellent power-saving features, as they will automatically shift to a low-power
mode as soon as traffic volume lessens or stops.

But beyond devices by replacing the cables, Bluetooth radio technology provides a universal bridge
to existing data networks, a peripheral interface, and a mechanism to form small private ad hoc
groupings of connected devices away from fixed network infrastructures. Designed to operate in a
noisy radio frequency environment, the Bluetooth radio uses a fast acknowledgment and frequency
hopping scheme to make the link robust. Bluetooth radio modules avoid interference from other
signals by hopping to a new frequency after transmitting or receiving a packet. Compared with
other systems operating in the same frequency band, the Bluetooth radio typically hops faster and
uses shorter packets. This makes the Bluetooth radio more robust than other systems. Short
packages and fast hopping also limit the impact of domestic and professional microwave ovens. Use
of Forward Error Correction (FEC) limits the impact of random noise on long-distance links. The
encoding is optimized for an uncoordinated environment.

Bluetooth guarantees security at the bit level. Authentication is controlled by the user by using a
128 bit key. Radio signals can be coded with 8 bits or anything up to 128 bits. The Bluetooth radio
transmissions will conform to the safety standards required by the countries where the technology
will be used with respect to the affects of radio transmissions on the human body. Emissions from
Bluetooth enabled devices will be no greater than emissions from industry-standard cordless
phones. The Bluetooth module will not interfere or cause harm to public or private
telecommunication networks.

The Bluetooth baseband protocol is a combination of circuit and packet switching. Slots can be
reserved for synchronous packets. Each packet is transmitted in a different hop frequency. A packet
nominally covers a single slot, but can be extended to cover up to five slots. Bluetooth can support
an asynchronous data channel, up to three simultaneous synchronous voice channels, or a channel,
which simultaneously supports asynchronous data and synchronous voice. It is thus possible to
transfer the date asynchronously whilst at the same time talking synchronously at the same time.
Each voice channel supports 64 kb/s synchronous (voice) link. The asynchronous channel can
support an asymmetric link of maximally 721 kb/s in either direction while permitting 57.6 kb/s in
the return direction, or a 432.6 kb/s symmetric link.

Page 19 of 35
Global system for mobile communications (GSM)

4.1. History of GSM:


During the early 1980s, analog cellular telephone systems were experiencing rapid growth in
Europe, particularly in Scandinavia and the United Kingdom, but also in France and Germany.
Each country developed its own system, which was incompatible with everyone else's in equipment
and operation. This was an undesirable situation, because not only was the mobile equipment
limited to operation within national boundaries, which in a unified Europe were increasingly
unimportant, but there was also a very limited market for each type of equipment, so economies of
scale and the subsequent savings could not be realized.

The Europeans realized this early on, and in 1982 the Conference of European Posts and Telegraphs
(CEPT) formed a study group called the Group Special Mobile (GSM) to study and develop a pan-
European public land mobile system. The proposed system had to meet certain criteria:

 Good subjective speech quality


 Low terminal and service cost
 Support for international roaming
 Ability to support handheld terminals
 Support for range of new services and facilities
 Spectral efficiency
 ISDN compatibility

In 1989, GSM responsibility was transferred to the European Telecommunication Standards


Institute (ETSI), and phase I of the GSM specifications were published in 1990. Commercial
service was started in mid-1991, and by 1993 there were 36 GSM networks in 22 countries.
Although standardized in Europe, GSM is not only a European standard. Over 200 GSM networks
(including DCS1800 and PCS1900) are operational in 110 countries around the world. In the
beginning of 1994, there were 1.3 million subscribers worldwide, which had grown to more than 55
million by October 1997. With North America making a delayed entry into the GSM field with a
derivative of GSM called PCS1900, GSM systems exist on every continent, and the acronym GSM
now aptly stands for Global System for Mobile communications.
From the beginning, the planners of GSM wanted ISDN compatibility in terms of the services
offered and the control signaling used. However, radio transmission limitations, in terms of
bandwidth and cost, do not allow the standard ISDN B-channel bit rate of 64 kbps to be practically
achieved.

Page 20 of 35
4.2. Architecture of the GSM network:
A GSM network is composed of several functional entities, whose functions and interfaces are
specified. Figure 1 shows the layout of a generic GSM network. The GSM network can be divided
into three broad parts. The Mobile Station is carried by the subscriber. The Base Station Subsystem
controls the radio link with the Mobile Station. The Network Subsystem, the main part of which is
the Mobile services Switching Center (MSC), performs the switching of calls between the mobile
users, and between mobile and fixed network users. The MSC also handles the mobility
management operations. Not shown is the Operations and Maintenance Center, which oversees the
proper operation and setup of the network. The Mobile Station and the Base Station Subsystem
communicate across the Um interface, also known as the air interface or radio link. The Base
Station Subsystem communicates with the Mobile services Switching Center across the A interface.

Page 21 of 35
4.3. Mobile Station:
The mobile station (MS) consists of the mobile equipment (the terminal) and a smart card called the
Subscriber Identity Module (SIM). The SIM provides personal mobility, so that the user can have
access to subscribed services irrespective of a specific terminal. By inserting the SIM card into
another GSM terminal, the user is able to receive calls at that terminal, make calls from that
terminal, and receive other subscribed services.

The mobile equipment is uniquely identified by the International Mobile Equipment Identity (IMEI).
The SIM card contains the International Mobile Subscriber Identity (IMSI) used to identify the
subscriber to the system, a secret key for authentication, and other information. The IMEI and the IMSI
are independent, thereby allowing personal mobility. The SIM card may be protected against
unauthorized use by a password or personal identity number.

4.4. Base Station Subsystem:


The Base Station Subsystem is composed of two parts, the Base Transceiver Station (BTS) and the
Base Station Controller (BSC). These communicate across the standardized Abis interface, allowing
(as in the rest of the system) operation between components made by different suppliers.

The Base Transceiver Station houses the radio transceivers that define a cell and handles the radio-
link protocols with the Mobile Station. In a large urban area, there will potentially be a large
number of BTSs deployed, thus the requirements for a BTS are ruggedness, reliability, portability,
and minimum cost.

The Base Station Controller manages the radio resources for one or more BTSs. It handles radio-
channel setup, frequency hopping, and handovers, as described below. The BSC is the connection
between the mobile station and the Mobile service Switching Center (MSC).

4.5. Network Subsystem:


The central component of the Network Subsystem is the Mobile services Switching Center (MSC).
It acts like a normal switching node of the PSTN or ISDN, and additionally provides all the
functionality needed to handle a mobile subscriber, such as registration, authentication, location
updating, handovers, and call routing to a roaming subscriber. These services are provided in
conjunction with several functional entities, which together form the Network Subsystem. The
MSC provides the connection to the fixed networks (such as the PSTN or ISDN). Signaling
between functional entities in the Network Subsystem uses Signaling System Number 7 (SS7), used
for trunk signaling in ISDN and widely used in current public networks.

The Home Location Register (HLR) and Visitor Location Register (VLR), together with the MSC,
provide the call-routing and roaming capabilities of GSM. The HLR contains all the administrative
information of each subscriber registered in the corresponding GSM network, along with the
current location of the mobile. The location of the mobile is typically in the form of the signaling

Page 22 of 35
address of the VLR associated with the mobile station. The actual routing procedure will be
described later. There is logically one HLR per GSM network, although it may be implemented as a
distributed database.

The Visitor Location Register (VLR) contains selected administrative information from the HLR,
necessary for call control and provision of the subscribed services, for each mobile currently located
in the geographical area controlled by the VLR. Although each functional entity can be
implemented as an independent unit, all manufacturers of switching equipment to date implement
the VLR together with the MSC, so that the geographical area controlled by the MSC corresponds
to that controlled by the VLR, thus simplifying the signaling required. Note that the MSC contains
no information about particular mobile stations --- this information is stored in the location
registers.

The other two registers are used for authentication and security purposes. The Equipment Identity
Register (EIR) is a database that contains a list of all valid mobile equipment on the network, where
each mobile station is identified by its International Mobile Equipment Identity (IMEI). An IMEI is
marked as invalid if it has been reported stolen or is not type approved. The Authentication Center
(AuC) is a protected database that stores a copy of the secret key stored in each subscriber's SIM
card, which is used for authentication and encryption over the radio channel.

4.6. Radio link aspects:


The International Telecommunication Union (ITU), which manages the international allocation of
radio spectrum (among many other functions), allocated the bands 890-915 MHz for the uplink
(mobile station to base station) and 935-960 MHz for the downlink (base station to mobile station)
for mobile networks in Europe. Since this range was already being used in the early 1980s by the
analog systems of the day, the CEPT had the foresight to reserve the top 10 MHz of each band for
the GSM network that was still being developed. Eventually, GSM will be allocated the entire 2x25
MHz bandwidth.

Page 23 of 35
4.7. Multiple access and channel structure
Since radio spectrum is a limited resource shared by all users, a method must be devised to divide
up the bandwidth among as many users as possible. The method chosen by GSM is a combination
of Time- and Frequency-Division Multiple Access (TDMA/FDMA). The FDMA part involves the
division by frequency of the (maximum) 25 MHz bandwidth into 124 carrier frequencies spaced
200 kHz apart. One or more carrier frequencies are assigned to each base station. Each of these
carrier frequencies is then divided in time, using a TDMA scheme. The fundamental unit of time in
this TDMA scheme is called a burst period and it lasts 15/26 ms (or approx. 0.577 ms). Eight burst
periods are grouped into a TDMA frame (120/26 ms, or approx. 4.615 ms), which forms the basic
unit for the definition of logical channels. One physical channel is one burst period per TDMA
frame.

Channels are defined by the number and position of their corresponding burst periods. All these
definitions are cyclic, and the entire pattern repeats approximately every 3 hours. Channels can be
divided into dedicated channels, which are allocated to a mobile station, and common channels,
which are used by mobile stations in idle mode.

4.8. Traffic channels.


A traffic channel (TCH) is used to carry speech and data traffic. Traffic channels are defined using
a 26-frame multiframe, or group of 26 TDMA frames.
4.9. Control channels
Common channels can be accessed both by idle mode and dedicated mode mobiles. The common
channels are used by idle mode mobiles to exchange the signaling information required to change to
dedicated mode. Mobiles already in dedicated mode monitor the surrounding base stations for
handover and other information. The common channels are defined within a 51-frame multiframe,
so that dedicated mobiles using the 26-frame multiframe TCH structure can still monitor control
channels. The common channels include:

Broadcast Control Channel (BCCH)

Frequency Correction Channel (FCCH) and Synchronization Channel (SCH)

Random Access Channel (RACH)

Paging Channel (PCH)

Access Grant Channel (AGCH)

Page 24 of 35
4.10. Speech coding
GSM is a digital system, so speech which is inherently analog, has to be digitized. The method
employed by ISDN, and by current telephone systems for multiplexing voice lines over high speed
trunks and optical fiber lines, is Pulse Coded Modulation (PCM). The output stream from PCM is
64 kbps, too high a rate to be feasible over a radio link. The 64 kbps signal, although simple to
implement, contains much redundancy. The GSM group studied several speech coding algorithms
on the basis of subjective speech quality and complexity (which is related to cost, processing delay,
and power consumption once implemented) before arriving at the choice of a Regular Pulse Excited
-- Linear Predictive Coder (RPE--LPC) with a Long Term Predictor loop. Basically, information
from previous samples, which does not change very quickly, is used to predict the current sample.
The coefficients of the linear combination of the previous samples, plus an encoded form of the
residual, the difference between the predicted and actual sample, represent the signal. Speech is
divided into 20 millisecond samples, each of which is encoded as 260 bits, giving a total bit rate of
13 kbps. This is the so-called Full-Rate speech coding. Recently, an Enhanced Full-Rate (EFR)
speech coding algorithm has been implemented by some North American GSM1900 operators. This
is said to provide improved speech quality using the existing 13 kbps bit rate.

4.11. Channel coding and modulation.


Because of natural and man-made electromagnetic interference, the encoded speech or data signal
transmitted over the radio interface must be protected from errors. GSM uses convolution encoding
and block interleaving to achieve this protection. The exact algorithms used differ for speech and
for different data rates. The method used for speech blocks will be described below.

Recall that the speech codec produces a 260 bit block for every 20 ms speech sample. From
subjective testing, it was found that some bits of this block were more important for perceived
speech quality than others. The bits are thus divided into three classes:

 Class Ia 50 bits - most sensitive to bit errors


 Class Ib 132 bits - moderately sensitive to bit errors
 Class II 78 bits - least sensitive to bit errors

Class Ia bits have a 3 bit Cyclic Redundancy Code added for error detection. If an error is detected,
the frame is judged too damaged to be comprehensible and it is discarded. It is replaced by a
slightly attenuated version of the previous correctly received frame. These 53 bits, together with the
132 Class Ib bits and a 4 bit tail sequence (a total of 189 bits), are input into a 1/2 rate convolution
encoder of constraint length 4. Each input bit is encoded as two output bits, based on a combination
of the previous 4 input bits. The convolution encoder thus outputs 378 bits, to which are added the
78 remaining Class II bits, which are unprotected. Thus every 20 ms speech sample is encoded as
456 bits, giving a bit rate of 22.8 kbps.

Page 25 of 35
To further protect against the burst errors common to the radio interface, each sample is interleaved.
The 456 bits output by the convolution encoder are divided into 8 blocks of 57 bits, and these
blocks are transmitted in eight consecutive time-slot bursts. Since each time-slot burst can carry two
57 bit blocks, each burst carries traffic from two different speech samples.

Recall that each time-slot burst is transmitted at a gross bit rate of 270.833 kbps. This digital signal
is modulated onto the analog carrier frequency using Gaussian-filtered Minimum Shift Keying
(GMSK). GMSK was selected over other modulation schemes as a compromise between spectral
efficiency, complexity of the transmitter, and limited spurious emissions. The complexity of the
transmitter is related to power consumption, which should be minimized for the mobile station. The
spurious radio emissions, outside of the allotted bandwidth, must be strictly controlled so as to limit
adjacent channel interference, and allow for the co-existence of GSM and the older analog systems
(at least for the time being).

4.12. Multipath equalization


At the 900 MHz range, radio waves bounce off everything - buildings, hills, cars, airplanes, etc.
Thus many reflected signals, each with a different phase, can reach an antenna. Equalization is used
to extract the desired signal from the unwanted reflections. It works by finding out how a known
transmitted signal is modified by multipath fading, and constructing an inverse filter to extract the
rest of the desired signal. This known signal is the 26-bit training sequence transmitted in the
middle of every time-slot burst. The actual implementation of the equalizer is not specified in the
GSM specifications.

4.13. Frequency hopping


The mobile station already has to be frequency agile, meaning it can move between a transmit,
receive, and monitor time slot within one TDMA frame, which normally are on different
frequencies. GSM makes use of this inherent frequency agility to implement slow frequency
hopping, where the mobile and BTS transmit each TDMA frame on a different carrier frequency.
The frequency hopping algorithm is broadcast on the Broadcast Control Channel. Since multipath
fading is dependent on carrier frequency, slow frequency hopping helps alleviate the problem. In
addition, co-channel interference is in effect randomized.

Page 26 of 35
2. General packet radio service (GPRS):
The General Packet Radio Service (GPRS) system is used by GSM mobile phones, the most
common mobile phone system in the world, for transmitting IP packets. The GPRS core network is
the centralized part of the GPRS system. It also provides support for WCDMA based 3G networks.
The GPRS core network is an integrated part of the GSM network switching subsystem.

5.1. General support functions:

GPRS core structure

The GPRS core network provides mobility management, session management and transport for
Internet Protocol packet services in GSM and WCDMA networks. The core network also provides
support for other additional functions such as billing and lawful interception. It was also proposed,
at one stage, to support packet radio services in the US D-AMPS TDMA system, however, in
practice, all of these networks have been converted to GSM so this option has become irrelevant.

5.2. Services offered:

GPRS extends the GSM circuit switched data capabilities and makes the following services
possible:

 "Always on" internet access


 Multimedia messaging service (MMS)
 Push to talk over cellular (PoC/PTT)
 Instant messaging and presence—wireless village
 Internet applications for smart devices through wireless application protocol (WAP)
 Point-to-point (P2P) service: inter-networking with the Internet (IP)

If SMS over GPRS is used, an SMS transmission speed of about 30 SMS messages per minute may
be achieved. This is much faster than using the ordinary SMS over GSM, whose SMS transmission
speed is about 6 to 10 SMS messages per minute.

Page 27 of 35
5.3. Protocols supported:

GPRS supports the following protocols:

 Internet protocol (IP). In practice, mobile built-in browsers use IPv4 since IPv6 is not yet
popular.
 Point-to-point protocol (PPP). In this mode PPP is often not supported by the mobile phone
operator but if the mobile is used as a modem to the connected computer, PPP is used to
tunnel IP to the phone. This allows an IP address to be assigned dynamically to the mobile
equipment.
 X.25 connections. This is typically used for applications like wireless payment terminals,
although it has been removed from the standard. X.25 can still be supported over PPP, or
even over IP, but doing this requires either a network based router to perform encapsulation
or intelligence built in to the end-device/terminal; e.g., user equipment (UE).

When TCP/IP is used, each phone can have one or more IP addresses allocated. GPRS will store
and forward the IP packets to the phone during cell handover (when you move from one cell to
another). TCP handles any packet loss (e.g. due to a radio noise induced pause) resulting in a
temporary throttling in transmission speed.

5.4. Hardware:

Devices supporting GPRS are divided into three classes:

5.4.1. Class A

Can be connected to GPRS service and GSM service (voice, SMS), using both at the same
time. Such devices are known to be available today.

5.4.2. Class B

Can be connected to GPRS service and GSM service (voice, SMS), but using only one or
the other at a given time. During GSM service (voice call or SMS), GPRS service is
suspended, and then resumed automatically after the GSM service (voice call or SMS) has
concluded. Most GPRS mobile devices are Class B.

5.4.3. Class C

Are connected to either GPRS service or GSM service (voice, SMS). Must be switched
manually between one or the other service.

A true Class A device may be required to transmit on two different frequencies at the same time,
and thus will need two radios. To get around this expensive requirement, a GPRS mobile may
implement the dual transfer mode (DTM) feature. A DTM-capable mobile may use simultaneous
voice and packet data, with the network coordinating to ensure that it is not required to transmit on

Page 28 of 35
two different frequencies at the same time. Such mobiles are considered pseudo-Class A, sometimes
referred to as "simple class A". Some networks are expected to support DTM in 2007.

Huawei E220 GPRS Modem

USB GPRS modems use a terminal-like interface USB 2.0 and later, data formats V.42bis, and
RFC 1144 and external antennas. Modems can be added as cards (for laptops) or external USB
devices which are similar in shape and size to a computer mouse.

5.5. Coding schemes and speeds:

The upload and download speeds that can be achieved in GPRS depend on a number of factors such
as:

 The number of BTS TDMA time slots assigned by the operator


 The maximum capability of the mobile device expressed as a GPRS multi slot class
 The channel encoding used summarized in the following table.

 Coding scheme  Speed (Kbit/s)

CS-1 8.0

CS-2 12.0

CS-3 14.4

CS-4 20.0

The least robust, but fastest, coding scheme (CS-4) is available near a base transceiver station
(BTS), while the most robust coding scheme (CS-1) is used when the mobile station (MS) is further
away from a BTS.

Using the CS-4 it is possible to achieve a user speed of 20.0 Kbit/s per time slot. However, using
this scheme the cell coverage is 25% of normal. CS-1 can achieve a user speed of only 8.0 Kbit/s
per time slot, but has 98% of normal coverage. Newer network equipment can adapt the transfer
speed automatically depending on the mobile location.

In addition to GPRS, there are two other GSM technologies which deliver data services: circuit-
switched data (CSD) and high-speed circuit-switched data (HSCSD). In contrast to the shared
nature of GPRS, these instead establish a dedicated circuit (usually billed per minute). Some
Page 29 of 35
applications such as video calling may prefer HSCSD, especially when there is a continuous flow of
data between the endpoints.

5.6. Multiple access schemes:

The multiple access methods used in GSM with GPRS are based on frequency division duplex
(FDD) and TDMA. During a session, a user is assigned to one pair of up-link and down-link
frequency channels. This is combined with time domain statistical multiplexing; i.e., packet mode
communication, which makes it possible for several users to share the same frequency channel. The
packets have constant length, corresponding to a GSM time slot. The down-link uses first-come
first-served packet scheduling, while the up-link uses a scheme very similar to reservation ALOHA
(R-ALOHA). This means that slotted ALOHA (S-ALOHA) is used for reservation inquiries during
a contention phase, and then the actual data is transferred using dynamic TDMA with first-come
first-served scheduling.

5.7. Addressing:

A GPRS connection is established by reference to its access point name (APN). The APN defines
the services such as wireless application protocol (WAP) access, short message service (SMS),
multimedia messaging service (MMS), and for Internet communication services such as email and
World Wide Web access.

In order to set up a GPRS connection for a wireless modem, a user must specify an APN, optionally
a user name and password, and very rarely an IP address, all provided by the network operator.

5.8. Usability:

The maximum speed of a GPRS connection offered in 2003 was similar to a modem connection in
an analog wire telephone network, about 32-40 Kbit/s, depending on the phone used. Latency is
very high; round-trip time (RTT) is typically about 600-700 ms and often reaches 1 s. GPRS is
typically prioritized lower than speech, and thus the quality of connection varies greatly.

Devices with latency/RTT improvements (via, for example, the extended UL TBF mode feature)
are generally available. Also, network upgrades of features are available with certain operators.
With these enhancements the active round-trip time can be reduced, resulting in significant increase
in application-level throughput speeds.

G. advantages and disadvantages of wireless network:

Page 30 of 35
In this world of modern technology, most people prefer not to connect computers with Ethernet
cables because excessive cables scattered throughout their office or home is unsightly. You can
choose to install a wireless network to avoid excessive cabling. For a wireless network, there is no
need to use Ethernet cables to connect your computers to the DSL or router.

Usually, a wireless network broadcast signal uses one or more wireless routers or wireless access
points. The access points or router are provided with an aerial and an Ethernet port. The Ethernet
port in the access point must be connected to the modem which is provided by your internet service
provider, if you need internet access. If you have to move the wireless network to another place,
you can simply transfer and install it in your new location easily.

You can also make a combination of wired and wireless connections with an access point or
wireless router. The access point functions as the receiver and radio frequency transmitter and can
interact with computers, IP Phones, PDAs and other access points having 802.11 wireless adapters.
IEEE 802.11 standard of wireless transmission is utilized in a wireless local area network (WLAN).
Certain other wireless networking standards such as Bluetooth are available now. However, 802.11
standards are considered as the most effectual networking solution. Actually, the aim of the
developers of this network interface was to connect computers through a local area network.
However, it has now been changed and a wireless network interface is also used for Voice over
Internet Protocol (VoIP) and internet access.

Based on the surveys conducted so far, it is clear that you can stay connected in your network for a
long period each day. If you have a laptop with a wireless connection, you can walk around your
office with your laptop without losing the connection. Nowadays, certain emergency services are
transferring their confidential data through a wireless network. We can consider this as an evidence
for the data security which is provided by wireless network. You can send and share data quickly
through a wireless network. This is the main reason why businesses and people prefer this network
interface for their data sharing. Another important fact regarding wireless networks is that you can
connect to the network easily even from the regions which have poor telecom infrastructure.

Some of the main reasons which make the wireless network interface popular include:

i) Convenience as you can use this network interface at home, the office or anywhere else without
hassle.

ii) WLANs are available anywhere in the world at an affordable cost.

iii) If you are moving to a new location, you can transfer the interface and install it at your new
location easily.

iv) There is no need for an Ethernet cable to connect computers to each other.

For a business, one of the main advantages in setting up a wireless network is savings. You can
access the changes in your business in a short period of time after installing the wireless network.
There is no need to spend money on cables and other equipments. The cost of maintaining a
wireless network is also less when compared to other network interfaces.

Page 31 of 35
Nowadays, you can buy wireless routers at an affordable cost. Also having a wireless network can
increase productivity and improve the working environment in your office.

One of the main drawbacks of this network interface is that it may cause health and environmental
hazards. Recent researches reported that the constant use of wireless network interfaces may lead to
memory loss, poor concentration, premature senility, nausea and even the hazardous disease named
cancer. Some environmental hazards that may occur due the constant usage of this interface are also
reported. These hazards occur due to electromagnetic radiation coming out of wireless networks.

Compatibility issues also arise when dealing with wireless networks. Different components not
made by the same company may not work together, or might require extra work to fix these issues.
Wireless networks are typically slower than those that are directly connected through an Ethernet
cable.

A wireless network is more vulnerable, because anyone can try to break into a network
broadcasting a signal. Many networks offer WEP - Wired Equivalent Privacy- security systems
which have been found to be vulnerable to intrusion. Though WEP does block some intruders, the
security problems have caused some businesses to stick with wired networks until security can be
improved. Another type of security for wireless networks is WPA - Wi-Fi Protected Access. WPA
provides more security to wireless networks than a WEP security set up. The use of firewalls will
help with security breaches which can help to fix security problems in some wireless networks that
are more vulnerable.

In recent times, there have been increased concerns about the safety of wireless communications,
despite little evidence of health risks. There are possible risk of tumors and other diseases due to
exposure to electromagnetic fields (EMFs) needs to be further investigated

H.Wireless revolution:

Page 32 of 35
Amidst the devastation of Hurricane Katrina, a bit of the future made an auspicious debut. The FCC
allowed an isolated temporary shelter in rural Louisiana to use the still-experimental technology
WiMAX (basically, Wi-Fi’s big brother) as a powerful, high-speed wireless link to the nearest
functioning Internet connection point, fifteen miles away. WiMAX worked flawlessly —  and now
discussions are underway to make wireless access a big part of New Orleans’ reconstructed
communications infrastructure.

Wireless is everywhere these days — from federal disaster areas to less-troubled climes like
Philadelphia and San Francisco, both of which are planning low-cost or free city-wide wireless
networks. And in fact, we‘re actually just at the beginning of the true wireless revolution as three
technologies — WiMAX, mesh networks and smart radios — converge to create a new generation
of seamless networks that extend from your pocket and living room to your automobile and beyond.

The first big game-changer will be WiMAX, which can reach thirty miles or more, blanketing an
entire region with an Internet connection as fast as or faster than currently available over telephone
or cable lines.

WiMAX has competition, of course. Companies like Verizon, Sprint and Cingular are already
rolling out high-speed Internet networks across the country and other telephone companies
providers won’t be far behind. The telephone folks have a head start — they’ve been planning 3G
(third-generation) technology for years now. But they also have a big disadvantage: in the U.S., the
carriers are adopting incompatible systems — Verizon broadband, for example, can’t use the same
equipment as Sprint broadband. WiMAX, on the other hand, is like Wi-Fi: a single standard
supported by many brands of hardware.

The first version of WiMAX will be commercially released late this year or early next, and already
companies like Intel are preparing big promotional efforts. (That’s notably in contrast to Wi-Fi,
which was launched rather quietly by Apple and took a few years to gain traction.) The first flavor
of WiMAX will only work for stationary reception, so in countries like the U.S., with plenty of
cable and telephone lines, the initial version may not have immediate impact. It will, however, be of
enormous importance in bringing broadband to the developing world as well as rural areas in the
U.S.

Shortly thereafter, however, a second standard will appear: mobile WiMAX, usable while walking
or driving. And that’s when it could get interesting in the U.S. For starters, you’d be able to use free
VoIP telephony instead of a traditional cell phone connection anywhere you can pick up a WiMAX
signal. A moving automobile could have a constant connection to the Internet, for anything from
continually updated navigation information to streaming Internet radio to car-to-car
communications (“Red Pontiac, is this the way to the stadium?”)  Just about anything could have a
connection to the Internet, from soda vending machines to billboards to your puppy’s collar.

I. Summary:
Page 33 of 35
The first version of WiMAX will be commercially released late this year or early next, and already
companies like Intel are preparing big promotional efforts. (That’s notably in contrast to Wi-Fi,
which was launched rather quietly by Apple and took a few years to gain traction.) The first flavor
of WiMAX will only work for stationary reception, so in countries like the U.S., with plenty of
cable and telephone lines, the initial version may not have immediate impact. It will, however, be of
enormous importance in bringing broadband to the developing world as well as rural areas in the
U.S. Shortly thereafter, however, a second standard will appear: mobile WiMAX, usable while
walking or driving. And that’s when it could get interesting in the U.S. For starters, you’d be able to
use free VoIP telephony instead of a traditional cell phone connection anywhere you can pick up a
WiMAX signal. A moving automobile could have a constant connection to the Internet, for
anything from continually updated navigation information to streaming Internet radio to car-to-car
communications (“Red Pontiac, is this the way to the stadium?”)  Just about anything could have a
connection to the Internet, from soda vending machines to billboards to your puppy’s collar.

These wireless communication technologies evolved over time to enable the transmission of larger
amounts of data at greater speeds across a global network. The following figure summarizes the
technical details of each cluster of technologies.

Bibliography:
Page 34 of 35
www.wikipedia.org
www.home-network-help.com
www.ehow.com
www.wisegeek.com
www.freewimaxinfo.com
www.wifinotes.com
www.aboutthestuff.com
www.fotosearch.com

Page 35 of 35

You might also like