Wireless Communication-Lect 1

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 22

A Presentation on:

Wireless Communication

Mobile and Ubiquitous Computing


Presenter: Noman Islam
Course Instructor: Dr. Zubair Shaikh
Introduction

 The communication does not require physical


cables
 Can be classified into:
– Fixed Wireless Network
– Wireless Network with Fixed Access Points
– Ad hoc network
A Cellular Network
Generations of Mobile Phones

 1G – AMPS , ETACS, JTACS, NMT


 2G – GSM, IS-95/CDMA One, GPRS, EDGE
 3G – UMTS, CDMA 2000
 4G – WiMAX, UMB
Generations of Mobile Phones
Generations of Mobile Phones
4G Vision
4G of Mobile Communication

 Fully Packet switched IP network


 Convergence Services
 Broadband Services
 Flexibility and Personalized Services
 Worldwide roaming
 Mobile Multimedia, Anytime Any where, Global Mobility
Support, Integrated Wireless Solution and Customized
Personal Services – MAGIC
 Software Defined Radios
 Ad hoc Networking
Mobile Ad hoc Networks

As defined by IETF:
“MANET is an autonomous system of mobile routers
(and associated hosts) connected by wireless links--
the union of which form an arbitrary graph. The routers
are free to move randomly and organize themselves
arbitrarily; thus, the network's wireless topology may
change rapidly and unpredictably. Such a network may
operate in a standalone fashion, or may be connected
to the larger Internet”
Applications of MANET

US Future Combat System Ubiquitous Computing


Disaster Recovery Mobile Workers
Automotive networks
Sensor Networks
Ad hoc networks are expected to become part of future 4G-architecture
Acoustic Modems for Ubiquitous
Computing
 Sound waves are characterized by:
– Comparatively Low data rate
– Sound waves can be localized within rooms
– No LOS
– Can be exposed to Humans
 Digital Voices project explores device communication
using sound
 It analyzed common modulation techniques and the
sounds they produce
Applications of Accoustic Modems
 Can easily be deployed in the existing voice
infrastructure
 Benefits from human awareness of the communication
 Requires short-range broadcasts enclosed within walls
and windows
 Steganography
– Agencies conducting secret operations might be interested in s
uch an application, given that these sounds can be broadcast
by traditional media and can be picked up anywhere in the wor
ld with a laptop or PDA.
 Entertainment
Digital Voices project
 Straightforward application of standard modulation
techniques used in non-audible modems is
inappropriate for audible modems
 Experiments show that constructing aerial acoustic
modems in software and using the existing hardware
infrastructure for sound is feasible
 In fact, modems produce sounds that are relatively
pleasing to humans over short time periods
 In most of cases, it was impossible to discriminate
synthesized sound with a natural sound
Bluetooth Radio System
 A low-cost, low-power radio-based cable replacement
 Enabled electronic devices to communicate wirelessly via
short-range ad hoc radio connections
 The technology enables the design of low-power, small-
sized, low-cost radios that can be embedded in existing
(portable) devices. Eventually, these embedded radios will
lead toward ubiquitous connectivity and truly connect
everything to everything
 Bluetooth system is the first commercial ad hoc radio
system envisioned to be used on a large scale and widely
available to the public
Issues
 Radio Spectrum
– ISM Band (2.45 GHz)
 Interference Immunity
– Microwave Ovens and lighting waves also use same band
– Interference suppression can be done by DSS
 Multiple Access Schemes
– FH-CDMA
– Set of 79 hop carriers are used
 Modulation scheme
– Gaussian shaped Frequency Shift Keying
Issues – contd…
 Medium Access Control
– An FH Bluetooth channel is associated with a piconet
– In a piconet, there is one master node and rest are slaves
– Master controls the access control
 Power Management (different modes: park, idle, sniff
mode etc.)
 Security
– Authentication using challenge response mechanism
 Inter-piconet communication
– scatternet
Bluetooth Authentication
Mechanism
IrDA
 Characterized by:
– Marginal cost to add infrared to a product , under $5
– Data rates of up to 115 kb/s
– Range from contact (0 m) through at least 1 m
– Angular coverage defined by a 15–30 degree half-angle cone
 A suite of protocols for infrared (IR) exchange of data
between two devices, up to 1 or 2 meters apart (20 to
30 cm for low-power devices)
IrDA
 It is present in virtually all new PDAs, emerging
in mobile phones, pagers, digital cameras, and
image capture devices
 Provides a communications platform and
application services fit for the era of information
appliances and which excel in the area of ease
of use
 Can be used for point-to-multipoint
communication
References

[1] “Wireless Communications, Principles and Practices”, Theodore


S. Rappaport, 2nd Edition
[2] http://www.ietf.org
[3] “The Bluetooth Radio System”, Jaap C. Haartsen, Ericsson Radio
Systems B.V., IEEE Personal Communications • February 2000
[4] “Acoustic Modems for Ubiquitous Computing”, Cristina Videira
Lopes University of California, Irvine Pedro M.Q. Aguiar,
Technical University of Lisbon, IEEE CS and IEEE ComSoc,
1536-1268/03/$17.00 © 2003 IEEE
[5] “IrDA: Past, Present and Future”, Stuart Williams, HP
Laboratories, IEEE Personal Communications, February 2000
Steganography

 Conceal the message and hope that others


can’t find it (Steganography)
 Invisible Inks
 Microdots
 DNA based Steganography
 Watermarking

You might also like