SlideShare uma empresa Scribd logo
1 de 12
Wireless LAN
================================================================
1. History of Wireless LAN[1]
Norman Abramson, a professor at the University of Hawaii,
developed the world’s first wireless computer communication network,
ALOHAnet (operational in 1971), using low-cost ham-like radios. The
system included seven computers deployed over four islands to
communicate with the central computer on the Oahu Island without using
phone lines.
In 1979, F.R. Gfeller and U. Bapst published a paper in the IEEE Proceedings reporting an
experimental wireless local area network using diffused infrared communications.
In 1980, P. Ferrert reported on an experimental application of a single code spread spectrum
radio for wireless terminal communications in the IEEE National Telecommunications
Conference.
Later on, M. Kavehrad reported on an experimental wireless PBX system using code division
multiple access. These efforts prompted significant industrial activities in the development of
a new generation of wireless local area networks and it updated several old discussions in the
portable and mobile radio industry.
European Telecommunications Standards Institute, ETSI, ratified in1996 with High
Performance Radio LAN (HiperLAN 1) standard. Later, ETSI, rolled out in June 2000, an
flexible Radio LAN standard called HiperLAN 2, designed to provide high speed access
54Mbps than HiperLAN 1(20 Mbps)
The IEEE finalized the initial standard for wireless LANs, IEEE 802.11 in June 1997. This
initial standard specifies a 2.4 GHz operating frequency with data rates of 1 and 2 Mbps.
With this standard, one could choose to use either FHSS or DSSS (two non compatible forms
of spread spectrum modulation).
Because of relatively low data rates (as compared to Ethernet), products based on the initial
standard did not flourish as many had hoped. In late 1999, the IEEE published two
supplements to the initial 802.11 standard: 802.11a and 802.11b (Wi-Fi).
The unlicensed PCS Unlicensed Personal Communications Services and the proposed
SUPERNet, later on renamed as U-NII, bands also presented new opportunities.
A HomeRF group formed in 1997 to promote a technology aimed for residential use, but it
disbanded at the end of 2002
Bluetooth is an industry specification for short-range RF-based connectivity for portable
personal devices with its functional specification released out in 1999 by Bluetooth Special
Interest Group. Bluetooth communicates on a frequency of 2.45 gigahertz.
In 2009 802.11n was added to 802.11. It operates in both the 2.4 GHz and 5 GHz bands at a
maximum data transfer rate of 300 Mbit/s. Most newer routers are able to utilise both
wireless bands, known as dualband. This allows data communications to avoid the crowded
2.4 GHz band, which is also shared with Bluetooth devices and microwave ovens. The 5 GHz
band is also wider than the 2.4 GHz band, with more channels.
2. Types of Wireless LANs:
Local area networks can be constructed in wireless fashion mainly so that wireless users
moving within a certain organization, such as a university campus, can access a backbone
network.
Wireless LANs are generally categorized according to the transmission technique that is
used. All current wireless LAN products fall into one of the following categories:
a) Infrared (IR) LANs
b) Spread spectrum LANs
c) Narrowband microwave LANs
a) Infrared LANs[2] :
Infrared communication technology is used in several home devices, such as television
remote controls.
Advantages of Infrared LANs[2]
 The bandwidth for infrared communication is large and can therefore can achieve high
data rates.
 IR light is diffusely reflected by light-coloured objects; thus it is possible to use ceiling
reflections to achieve coverage of an entire room.
 IR light does not penetrate walls or other opaque objects. This has two advantages:
- IR communications can be more easily secured against eavesdropping than
microwave
- A separate IR installation can be operated in every room in buildings without
interference, enabling the construction of very large IR LANs
 Equipment for infrared communication is relatively inexpensive and simple.
The one major disadvantage of infrared technology is that background radiation from sunlight
and indoor lighting can cause interference at the infrared receivers.
There are three alternative transmission techniques commonly used for IR data transmissions:
 Direct beam Configuration
 Omni directional Configuration
 Diffused Configuration
Direct beam Configuration:[2]
This configuration involves point-to-point connections. The range of communications is
limited by the transmitted power and the direction of focus. With proper focusing, ranges up
to a kilometre can be achieved. This technology can be used in token-ring LANs and
interconnections between buildings as shown below
Omni directional configuration[2]
This configuration consists of a single base station that is normally used on ceilings. The base
station sends an omnidirectional signal, which is picked up by all transceivers. The
transceivers in turn use a directional beam focused directly at the base-station unit.
Diffused-Configuration
In this the infrared transmitters direct the transmitted signal to a diffused reflected ceiling.
The signal is reflected in all directions from this ceiling. The receivers can then pick up the
transmitted signal.
b) Spread-Spectrum LANs[2]
The spread-spectrum techniques use three different frequency bands: 902-928 MHz, 2.4
GHz-2.4835 GHz and 5.725 GHz-5.825GHz. Higher-frequency ranges offer greater
bandwidth capability. However, the higher-frequency equipment is more expensive. The
spread-spectrum LANs makes use of multiple adjacent cells arrangement. Adjacent cells
make use of different centre frequencies within the same band to avoid interference. Within
each of these cells, a star or peer-to-peer topology can be deployed.
If a star topology is used, a hub as a network center is mounted on the ceiling. This hub acts
as an interface between wired and wireless LANs, can be connected to other wired LANs. All
users in the wireless LAN transmit and receive signals from the hub.
A peer to peer topology is one in which there is no hub. A MAC algorithm such as CSMA is
used to control access. This topology is appropriate for ad hoc LANs.
c) Narrowband RF LANs[2]
Narrowband radio frequency LANs use a very narrow bandwidth. These LANs can be either
licensed or unlicensed. In licensed narrowband RF, a licensed authority assigns the radio
frequency band. Most geographic areas are limited to a few licenses. Adjacent cells use
different frequency bands. The transmissions are encrypted to prevent attacks. The licensed
narrowband LANs guarantee communication without interference. The unlicensed
narrowband RF LANs use the unlicensed spectrum and peer-to-peer LAN topology.
3. Wireless LAN Standards
a) IEEE 802.11 Wireless Standard:
802.11 networks use free frequency bands (ISM: Industrial, Science, Medical). Thus
everybody can run 802.11 devices without licensing a frequency band.
802.11 Pros and Cons:
 Mobility
 Flexible configuration
 Relatively cheap
 Weak security (WEP Wired Equivalent Protection, but fixed with WPA Wired
Protection Access)
 Relatively low bandwidth for data (compared to wired networks)
 Electromagnetic interference with other devices (Bluetooth)
 Simple installation, but high skills needed for exploitation of full potential of
technology
Different 802.11standards:
 802.11a: 6, 9, 12, 18, 24, 36, 48, 54 Mbps (5 GHz band) uses OFDM
 802.11b: Up to 11Mbps, simple (cheap) technology uses DSSS.
 802.11g: Up to 54Mbps and uses OFDM,DSSS
 802.11n: <600Mbps (MIMO=Multiple In Multiple Out antenna technology, uses
multi-path transmission for better signal recovery at the receiver) uses OFDM
 802.11ac: Forthcoming standard for higher throughput (802.11n enhancements).
 802.11ad: Standard in progress, even higher throughput (<7Gpbs).
Operation modes of 802.11: Below picture taken from copyrighted content of Peter. R.
Egli[4]
Each wireless LAN user has a wireless LAN adapter for communication over the wireless
medium. This adapter is responsible for authentication, confidentiality and data delivery. To
send data to a user in the wired LAN, a user in the wireless LAN first sends the data packet to
the access point. The access point recognizes the wireless user through a unique ID called the
SSID. SSID is like a password protection system that enables any wireless client to join the
wireless LAN. Once the wireless user is authenticated, the access point forwards data packets
to the desired wired user through the switch or hub.
Access points build a table of association that contains the MAC addresses of all users in the
wireless network.
b) HiperLAN 1/2: HiperLAN 1 standard provides highspeed communications (20Mbps)
between portable devices in the 5GHz range. Similar to IEEE802.11, HiperLAN/1 adopts
CSMA to connect end user devices together. On top of that, HiperLAN/1 supports
isochronous traffic for different type of data such as video, voice, text, etc.
HIPERLAN/2 has a very high transmission rate (up to 54 Mbps at PHY layer) to a variety of
networks including 3G mobile core networks, ATM networks and IP based networks, and
also for private use as a wireless LAN system. This is achieved by making use of a
modularization method called Orthogonal Frequency Digital Multiplexing (OFDM).
c) Bluetooth: One of the ways Bluetooth devices avoid interfering with other systems is by
sending out very weak signals of 1 milliwatt. The low power limits the range of a Bluetooth
device to about 10 meters, cutting the chances of interference between a computer system and
a portable telephone or television. Bluetooth operates at 2.4 GHz frequency band and
supports data rates of 1 Mbps, with next generation products allowing anywhere from 2 to 12
Mbps, to be determined at a later date.
d) HomeRF: HomeRF is an open industry specification developed by Home Radio
Frequency Working Group that defines how electronic devices such as PCs, cordless phones
and other peripherals share and communicate voice, data and streaming media in and around
the home. HomeRF-compliant products operate in the license-free 2.4GHz frequency band
and utilize frequency-hopping spread spectrum RF technology for secure and robust wireless
communications with data rates of up to 1 Mbps (HomeRF1). Unlike Wi-Fi, HomeRF
already has quality-of-service support for streaming media and is the only wireless LAN to
integrate voice.
3. Challenges[3]:
The key challenges in wireless networks are:
a) Data Rate Enhancements.
b) Low power networking.
c) Security.
d) Radio Signal Interference.
e) System Interoperability.
a) Enhancing Data Rate: Improving the current data rates to support future high speed
applications is essential, especially, if multimedia service are to be provided. Data rate is a
function of various factors such as the data compression algorithm, interference mitigation
through error-resilient coding, power control, and the data transfer protocol. Therefore, it is
imperative that manufacturers implement a well thought out design that considers these
factors in order to achieve higher data rates.
b) Low Power Design: The size and battery power limitation of wireless mobile devices
place a limit on the range and throughput that can be supported by a wireless LAN. The
complexity and hence the power consumption of wireless devices vary significantly
depending on the kind of spread spectrum technology being used to implement the wireless
LAN. Normally, direct sequence spread spectrum (DSSS) based implementations require
large and power-hungry hardware compared to frequency hopped spread spectrum (FHSS).
They tend to consume about two to three times the power of an equivalent FHSS system. But,
the complex circuitry provides better error recovery capability to DSSS systems compared to
FHSS. The right time has come for researchers and developers to approach these issues in
wireless LAN technologies together and from a global perspective.
c) Security: Security is a big concern in wireless networking, especially in e-commerce
applications. Mobility of users increases the security concerns in a wireless network. Current
wireless networks employ authentication and data encryption techniques on the air interface
to provide security to its users. The IEEE 802.11 standard describes wired equivalent privacy
(WEP) that defines a method to authenticate users and encrypt data between the PC card and
the wireless LAN access point. In large enterprises, an IP network level security solution
could ensure that the corporate network and proprietary data are safe. Virtual private network
(VPN) is an option to make access to fixed access networks reliable. Since hackers are
getting smarter, it is imperative that wireless security features must be updated constantly.
d) Radio Signal Interference: Interference can take on an inward or outward direction. A
radio-based LAN, for example, can experience inward interference either from the harmonics
of transmitting systems or from other products using similar radio frequencies in the local
area. Microwave ovens operate in the S band (2.4GHz) that many wireless LANs use to
transmit and receive. These signals result in delays to the user by either blocking
transmissions from stations on the LAN or causing bit errors to occur in data being sent.
Newer products that utilize Bluetooth radio technology also operate in the 2.4GHz band and
can cause interference with wireless LANs, especially in fringe areas not well covered by a
particular wireless LAN access point. The other issue, outward interference, occurs when a
wireless network’s signal disrupts other systems, such as adjacent wireless LANs and
navigation equipment on aircraft.
e) System Interoperability: With wireless LANs, interoperability is taken as a serious issue.
There are still pre-802.11 (proprietary) wireless LANs, both frequency-hopping and direct
sequence 802.11 versions, and vendor-specific enhancements to 802.11-compliant products
that make interoperability questionable. To ensure interoperability with wireless LANs, it is
best to implement radio cards and access points from the same vendor, if possible.
Handoff: Handoff is the mechanism by which an ongoing connection between a Mobi lehost
(MH) and a corresponding Access point (AP) is transferred from one access point to the
other. Handoff occurs during cell boundary crossing, weak signal reception and while a QoS
deterioration occurs in the current cell. Present handoff mechanisms are based only on signal
strength and do not take into account the load of the new cell. There is no negotiation of QoS
characteristics with the new AP to ensure smooth carryover from the old AP to new AP.
Now, several methods are proposed by researchers to have a seamless handoff between
access points.
4. Future Researchareas:
FutureWLANs must have to mature in the following areas
 Higher Speeds
 Improved Security
 Seamless end-to-end protocols
 Better Error control
 Long distance Coverage
 Better interoperability
 Global networking
Anywhere, anytime, any-form connectivity
Mobile Networks
================================================================
1. History of Mobile Networks
You can get very nice information at http://www.indigoo.com/dox/itdp/12_MobileWireless/
2. MANET[5]:
The concept of mobile ad hoc networking is not a new one and its origins can be traced back
to the DARPA Packet Radio Network project in 1972. Infrastructured wireless networks
require a fixed network infrastructure with centralised administration is required for their
operation, potentially consuming a lot of time and money for set-up and maintenance.
Furthermore, an increasing number of devices such as laptops, personal digital assistants
(PDAs), pocket PCs, tablet PCs, smart phones, MP3 players, digital cameras, etc. are
provided with short-range wireless interfaces. In addition, these devices are getting smaller,
cheaper, more user friendly and more powerful. This evolution is driving a new alternative
way for mobile communication, in which mobile devices form a self creating, self-organising
and self-administering wireless network, called a mobile ad hoc network.
Nodes that lie within each other’s send range can communicate directly and are responsible
for dynamically discovering each other. In order to enable communication between nodes
that are not directly within each other’s send range, intermediate nodes act as routers that
relay packets generated by other nodes to their destination. These nodes are often energy
constrained— that is, battery-powered— devices with a great diversity in their capabilities.
Furthermore, devices are free to join or leave the network and they may move randomly,
possibly resulting in rapid and unpredictable topology changes.
3. Challenges:
MANETs impose challenges in all layers of protocol stack. The physical layer must deal
with rapid changes in link characteristics. The media access control (MAC) layer needs to
allow fair channel access, minimise packet collisions and deal with hidden and exposed
terminals. At the network layer, nodes need to cooperate to calculate paths. The transport
layer must be capable of handling packet loss and delay characteristics that are very different
from wired networks. Applications should be able to handle possible disconnections and
reconnections.
The Key Challenges are:
a) Routing
b) Service or resource discovery
c) Addressing or internet connectivity
d) Security and node co-operation
a) Routing: As mobile ad hoc networks are characterised by a multi-hop network topology
that can change frequently due to mobility, efficient routing protocols are needed to establish
communication paths between nodes, without causing excessive control traffic overhead or
computational burden on the power constrained devices.
A number of proposed solutions attempt to have an up-to-date route to all other nodes at all
times. To this end, these protocols exchange routing control information periodically and on
topological changes. These protocols, which are called proactive routing protocols, are
typically modified versions of traditional link state or distance vector routing protocols
encountered in wired networks, adapted to the specific requirements of the dynamic mobile
ad hoc network environment.
Most of the time, it is not necessary to have an up-to-date route to all other nodes. Therefore,
reactive routing protocols only set up routes to nodes they communicate with and these routes
are kept alive as long as they are needed.
Combinations of proactive and reactive protocols, where nearby routes (for example,
maximum two hops) are kept up-to-date proactively, while far-away routes are set up
reactively, are also possible and fall in the category of hybrid routing protocols.
A completely different approach is taken by the location-based routing protocols, where
packet forwarding is based on the location of a node’s communication partner. Location
information services provide nodes with the location of the others, so that packets can be
forwarded.
b) Service and resource discovery: MANET nodes may have little or no knowledge at all
about the capabilities or services offered by each other. Therefore, service and resource
discovery mechanisms, which allow devices to automatically locate network services and to
advertise their own capabilities to the rest of the network are an important aspect of self-
configurable networks. Possible services or resources include storage, access to databases or
files, printer, computing power, Internet access, etc.
Directory-less service and resource discovery mechanisms, in which nodes reactively request
services when needed and/or nodes proactively announce their services to others, seem an
attractive approach for infrastructureless networks.
The alternative scheme is directory-based and involves directory agents where services are
registered and service requests are handled. This implies that this functionality should be
statically or dynamically assigned to a subset of the nodes and kept up-to-date. Existing
directory-based service and resource discovery mechanisms such as UPnP or Salutation are
unable to deal with the dynamics in ad hoc networks.
Currently, no mature solution exists, but it is clear that the design of these protocols should be
done in close cooperation with the routing protocols and should include context-awareness
(location, neighbourhood, user profile, etc.) to improve performance.
Also, when ad hoc networks are connected to fixed infrastructure (for example, Internet,
cellular network, etc.), protocols and methods are needed to inject the available external
services offered by service and content providers into the ad hoc network.
c) Addressing and Internet connectivity: In order to enable communication between nodes
within the ad hoc network, each node needs an address. In stand-alone ad hoc networks, a
unique MAC addresses could be used to address nodes. However, all current applications are
based on TCP/IP or UDP/IP. In addition, as future mobile ad hoc networks will interact with
IP-based networks and will run applications that use existing Internet protocols such as
transmission control protocol (TCP) and user datagram protocol (UDP), the use of IP
addresses is inevitable.
Unfortunately, an internal address organisation with prefixes and ranges like in the fixed
Internet is hard to maintain in mobile ad hoc networks due to node mobility and overhead
reasons and other solutions for address assignment are thus needed.
One solution is based on the assumption (and restriction) that all MANET nodes already have
a static, globally unique and pre-assigned IPv4 or IPv6 address. This solves the whole issue
of assigning addresses, but introduces new problems when interworking with fixed networks.
Connections coming from and going to the fixed network can be handled using mobile IP,
where the pre-assigned IP address serves as the mobile node’s home address (HoA). All
traffic sent to this IP address will arrive at the node’s home agent (HA) . When the node in
the ad hoc network advertises to its home agent the IP address of the Internet gateway as its
careof- address (CoA), the home agent can tunnel all traffic to the ad hoc network , on which
it is delivered to the mobile node using an ad hoc routing protocol . For outgoing connections,
the mobile node has to route traffic to an Internet gateway, and for internal traffic an ad hoc
routing protocol can be used.
The main problem with this approach is that a MANET node needs an efficient way to figure
out if a certain address is present in the MANET or if it is necessary to use an Internet
gateway, without flooding the entire network.
Another solution is the assignment of random, internally unique addresses. This can be
realised by having each node picking a more or less random address from a very address
detection (DAD) techniques in order to impose address uniqueness within the MANET.
Strong DAD techniques will always detect duplicates, but are difficult to scale in large
networks. Weak DAD approaches can tolerate duplicates as long as they do not interfere with
each other; that is, if packets always arrive at the intended destination. If interconnection to
the Internet is desirable, outgoing connections could be realised using network address
translation (NAT), but incoming connections still remain a problem if random, not globally
routable, addresses are used. Also, the use of NAT remains problematic when multiple
Internet gateways are present. If a MANET node switches to another gateway, a new IP
address is used and ongoing TCP connections will break.
Another possible approach is the assignment of unique addresses that all lie within one subnet
(comparable to the addresses assigned by a dynamic host configuration protocol (DHCP)
server). When attached to the Internet, the ad hoc network can be seen as a separate routable
subnet. This simplifies the decision if a node is inside or outside the ad hoc network.
However, no efficient solutions exist for choosing dynamically an appropriate, externally
routable and unique network prefix (for example, special MANET prefixes assigned to
Internet gateways), handling the merging or splitting of ad hoc networks, handling multiple
points of attachment to the Internet, etc.
The above discussion makes clear that, although many solutions are being investigated, no
common adopted solution for addressing and Internet connectivity is available yet. New
approaches using host identities, where the role of IP is limited to routing and not addressing,
combined with dynamic name spaces, could offer a potential solution.
d) Security and node cooperation: The wireless mobile ad hoc nature of MANETs brings
new security challenges to the network design. As the wireless medium is vulnerable to
eavesdropping and ad hoc network functionality is established through node cooperation,
mobile ad hoc networks are intrinsically exposed to control packets or data packets. Securing
ad hoc networks against malicious attacks is difficult to achieve.
Preventive mechanisms include among others authentication of message sources, data
integrity and protection of message sequencing, and are typically based on key-based
cryptography. Incorporating cryptographic mechanisms is challenging, as there is no
centralised key distribution centre or trusted certification authority. These preventative
mechanisms need to be sustained by detection techniques that can discover attempts to
penetrate or attack the network.
The previous problems were all related to malicious nodes that intentionally damage or
compromise network functionality. However, selfish nodes, which use the network but do not
cooperate to routing or packet forwarding for others in order not to spill battery life or
network bandwidth, constitute an important problem as network functioning entirely relies on
the cooperation between nodes and their contribution to basic network functions.
To deal with these problems, the self-organising network concept must be based on an
incentive for users to collaborate, thereby avoiding selfish behaviour. Existing solutions aim
at detecting and isolating selfish nodes based on watchdog mechanisms, which identify
misbehaving nodes, and reputation systems, which allow nodes to isolate selfish nodes.
Another promising approach is the introduction of a billing system into the network based on
economical models to enforce cooperation. Using virtual currencies or micro-payments,
nodes pay for using other nodes forwarding capabilities or services and are remunerated for
making theirs available. This approach certainly has potential in scenarios in which part of
the ad hoc network and services is deployed by companies or service providers.
Also, when ad hoc networks are interconnected to fixed infrastructures by gateway nodes,
which are billed by a telecom operator (for example, UMTS, hot-spot access, etc.), billing
mechanisms are needed to remunerate these nodes for making these services available.
Questions such as who is billing, to whom and for what, need to be answered and will lead to
complex business models.
We may conclude that in some ad hoc network scenarios, the network organisation can
completely or partially rely on a trust relationship between participating nodes (for example,
PANs). In many others security mechanisms, mechanisms to enforce cooperation between
nodes or billing methods are needed and will certainly be an important subject of future
research.
[1]en.wikipedia.org/wiki/Wireless_LAN
[2]Wireless Communications and Standards, Second Edition, William Stallings
[3]Chandramouli, Vijay. "A detailed study on wireless LAN technologies." URL: h
ttp://crystal. uta. edu/~ kumar/cse6392/termpapers/Vijay_paper. pdf# search='A%
20Detailed% 20St udy% 20on% 20Wireless% 20LAN% 20Technologies (2002).
[4]http://www.indigoo.com/dox/itdp/12_MobileWireless/
[5]Hoebeke, Jeroen, et al. "An overview of mobile ad hoc networks: Applications and
challenges." Journal-Communications Network 3.3 (2004): 60-66.
Keywords
Cellular networks versus mobile adhoc networks, mobile adhoc network enabling
technologies, Challenges in MANET, MANET, History of Mobile Networks, Mobile
Networks, Future Research areas in WLANs, challenges in wireless networks,
HomeRF, Bluetooth, HiperLAN ½, Operation modes of 802.11, Different
802.11standards, IEEE 802.11 Wireless Standard:, Wireless LAN Standards, Diffused
Configuration, Omni directional Configuration, Direct beam Configuration,
Narrowband microwave LANs, Spread spectrum LANs, Infrared (IR) LANs , Types of
Wireless LANs, History of Wireless LAN.

Mais conteúdo relacionado

Mais procurados

Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area NetworksDilum Bandara
 
Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & SecurityHimangshu Hazra
 
Wireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High RateWireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High RateDon Norwood
 
Next Generation Networks
Next Generation NetworksNext Generation Networks
Next Generation NetworksRejinaParvin
 
Personal Area Network
Personal Area NetworkPersonal Area Network
Personal Area NetworkFaizan Rasool
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technologysai krish
 
Ec8004 wireless networks unit 1 ieee 802.11a and ieee 802.11b
Ec8004 wireless networks unit 1 ieee 802.11a and ieee 802.11bEc8004 wireless networks unit 1 ieee 802.11a and ieee 802.11b
Ec8004 wireless networks unit 1 ieee 802.11a and ieee 802.11bHemalathaR31
 
WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.pptUmme habiba
 
802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lanMohd Arif
 
Wireless Personal Area Networks – Bluetooth, UWB and Sensor Networks
Wireless Personal Area  Networks – Bluetooth, UWB  and Sensor Networks Wireless Personal Area  Networks – Bluetooth, UWB  and Sensor Networks
Wireless Personal Area Networks – Bluetooth, UWB and Sensor Networks Manas Rai
 

Mais procurados (20)

Personal area networks (PAN)
Personal area networks (PAN)Personal area networks (PAN)
Personal area networks (PAN)
 
Wireless Local Area Networks
Wireless Local Area NetworksWireless Local Area Networks
Wireless Local Area Networks
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & Security
 
Wireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High RateWireless Personal Area Networks (WPAN): Lowrate amd High Rate
Wireless Personal Area Networks (WPAN): Lowrate amd High Rate
 
Next Generation Networks
Next Generation NetworksNext Generation Networks
Next Generation Networks
 
Personal Area Network
Personal Area NetworkPersonal Area Network
Personal Area Network
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Wlan wireless network
Wlan wireless networkWlan wireless network
Wlan wireless network
 
Ec8004 wireless networks unit 1 ieee 802.11a and ieee 802.11b
Ec8004 wireless networks unit 1 ieee 802.11a and ieee 802.11bEc8004 wireless networks unit 1 ieee 802.11a and ieee 802.11b
Ec8004 wireless networks unit 1 ieee 802.11a and ieee 802.11b
 
Pan
PanPan
Pan
 
WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.ppt
 
Satellite
SatelliteSatellite
Satellite
 
Wireless LAN
Wireless LANWireless LAN
Wireless LAN
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lan
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 
Wireless LAN Technoloy
Wireless LAN TechnoloyWireless LAN Technoloy
Wireless LAN Technoloy
 
Wireless Personal Area Networks – Bluetooth, UWB and Sensor Networks
Wireless Personal Area  Networks – Bluetooth, UWB  and Sensor Networks Wireless Personal Area  Networks – Bluetooth, UWB  and Sensor Networks
Wireless Personal Area Networks – Bluetooth, UWB and Sensor Networks
 
BLUETOOTH _TECHNOLOGY
BLUETOOTH _TECHNOLOGYBLUETOOTH _TECHNOLOGY
BLUETOOTH _TECHNOLOGY
 

Destaque

LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationAbdelkhalik Mosa
 
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notesgouse_1210
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methodsbwire sedrick
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationAbdelkhalik Mosa
 
C08 wireless atm[1]
C08 wireless atm[1]C08 wireless atm[1]
C08 wireless atm[1]Rio Nguyen
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerAbdelkhalik Mosa
 

Destaque (12)

01600 ppt ch09
01600 ppt ch0901600 ppt ch09
01600 ppt ch09
 
Infrared lan's
Infrared lan'sInfrared lan's
Infrared lan's
 
12 wireless la-ns
12 wireless la-ns12 wireless la-ns
12 wireless la-ns
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notes
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methods
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
 
C08 wireless atm[1]
C08 wireless atm[1]C08 wireless atm[1]
C08 wireless atm[1]
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport Layer
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
GSM ARCHITECTURE
GSM ARCHITECTUREGSM ARCHITECTURE
GSM ARCHITECTURE
 

Semelhante a Wireless LANs and Mobile Networks

8. Wireless (1).ppt
8. Wireless (1).ppt8. Wireless (1).ppt
8. Wireless (1).pptSAMBIT34
 
Wireless LAN and bluetooth technology
Wireless LAN and bluetooth technologyWireless LAN and bluetooth technology
Wireless LAN and bluetooth technologyRAVIKIRAN ANANDE
 
Mobile Networking and Ad hoc routing protocols validation
Mobile Networking and Ad hoc routing protocols validationMobile Networking and Ad hoc routing protocols validation
Mobile Networking and Ad hoc routing protocols validationIOSR Journals
 
It fundamentals wired and wireless troubleshooting
It fundamentals   wired and wireless troubleshootingIt fundamentals   wired and wireless troubleshooting
It fundamentals wired and wireless troubleshootingProf. Dr. AMOL KASTURE
 
Chap 01 introduction to wirelless
Chap 01 introduction to wirelless Chap 01 introduction to wirelless
Chap 01 introduction to wirelless EngkaderAMuse
 
computer network
computer networkcomputer network
computer networkRedHeart11
 
Comparative study of bluetooth, 802 and hiperlan
Comparative study of bluetooth, 802 and hiperlanComparative study of bluetooth, 802 and hiperlan
Comparative study of bluetooth, 802 and hiperlanIAEME Publication
 
Telecommunications and networks
Telecommunications and networksTelecommunications and networks
Telecommunications and networksBikash Kumar
 
How to get Hardware and Networking jobs in Delhi
How to get Hardware and Networking jobs in DelhiHow to get Hardware and Networking jobs in Delhi
How to get Hardware and Networking jobs in DelhiSilicon Univ
 
Chapter 4 - Wirelsess LAN Lec Concise (1).ppt
Chapter 4 - Wirelsess LAN Lec Concise (1).pptChapter 4 - Wirelsess LAN Lec Concise (1).ppt
Chapter 4 - Wirelsess LAN Lec Concise (1).pptabenimelos
 
Wireless Network
Wireless NetworkWireless Network
Wireless Networkdfg1990
 
Wireless networking
Wireless networkingWireless networking
Wireless networkingAditya Raj
 
13 mainstream wireless communication technologies -by C&T RF Antennas Inc
13 mainstream wireless communication technologies -by C&T RF Antennas Inc13 mainstream wireless communication technologies -by C&T RF Antennas Inc
13 mainstream wireless communication technologies -by C&T RF Antennas IncAntenna Manufacturer Coco
 
Ccna Wireless Study Guide
Ccna  Wireless Study GuideCcna  Wireless Study Guide
Ccna Wireless Study GuideCCNAResources
 
Wireless Netwok.pptx
Wireless Netwok.pptxWireless Netwok.pptx
Wireless Netwok.pptxSajibMandal2
 

Semelhante a Wireless LANs and Mobile Networks (20)

8. Wireless (1).ppt
8. Wireless (1).ppt8. Wireless (1).ppt
8. Wireless (1).ppt
 
Wireless LAN and bluetooth technology
Wireless LAN and bluetooth technologyWireless LAN and bluetooth technology
Wireless LAN and bluetooth technology
 
Mobile Networking and Ad hoc routing protocols validation
Mobile Networking and Ad hoc routing protocols validationMobile Networking and Ad hoc routing protocols validation
Mobile Networking and Ad hoc routing protocols validation
 
It fundamentals wired and wireless troubleshooting
It fundamentals   wired and wireless troubleshootingIt fundamentals   wired and wireless troubleshooting
It fundamentals wired and wireless troubleshooting
 
Chap 01 introduction to wirelless
Chap 01 introduction to wirelless Chap 01 introduction to wirelless
Chap 01 introduction to wirelless
 
Dual patharchwp
Dual patharchwpDual patharchwp
Dual patharchwp
 
computer network
computer networkcomputer network
computer network
 
Comparative study of bluetooth, 802 and hiperlan
Comparative study of bluetooth, 802 and hiperlanComparative study of bluetooth, 802 and hiperlan
Comparative study of bluetooth, 802 and hiperlan
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 
wlans
wlanswlans
wlans
 
Telecommunications and networks
Telecommunications and networksTelecommunications and networks
Telecommunications and networks
 
How to get Hardware and Networking jobs in Delhi
How to get Hardware and Networking jobs in DelhiHow to get Hardware and Networking jobs in Delhi
How to get Hardware and Networking jobs in Delhi
 
Chapter 4 - Wirelsess LAN Lec Concise (1).ppt
Chapter 4 - Wirelsess LAN Lec Concise (1).pptChapter 4 - Wirelsess LAN Lec Concise (1).ppt
Chapter 4 - Wirelsess LAN Lec Concise (1).ppt
 
GI-FI (Gigabit Wireless)
GI-FI (Gigabit Wireless)GI-FI (Gigabit Wireless)
GI-FI (Gigabit Wireless)
 
Wireless Network
Wireless NetworkWireless Network
Wireless Network
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Computer project
Computer project Computer project
Computer project
 
13 mainstream wireless communication technologies -by C&T RF Antennas Inc
13 mainstream wireless communication technologies -by C&T RF Antennas Inc13 mainstream wireless communication technologies -by C&T RF Antennas Inc
13 mainstream wireless communication technologies -by C&T RF Antennas Inc
 
Ccna Wireless Study Guide
Ccna  Wireless Study GuideCcna  Wireless Study Guide
Ccna Wireless Study Guide
 
Wireless Netwok.pptx
Wireless Netwok.pptxWireless Netwok.pptx
Wireless Netwok.pptx
 

Mais de Lakshmi Sarvani Videla (20)

Data Science Using Python
Data Science Using PythonData Science Using Python
Data Science Using Python
 
Programs on multithreading
Programs on multithreadingPrograms on multithreading
Programs on multithreading
 
Menu Driven programs in Java
Menu Driven programs in JavaMenu Driven programs in Java
Menu Driven programs in Java
 
Recursion in C
Recursion in CRecursion in C
Recursion in C
 
Simple questions on structures concept
Simple questions on structures conceptSimple questions on structures concept
Simple questions on structures concept
 
Errors incompetitiveprogramming
Errors incompetitiveprogrammingErrors incompetitiveprogramming
Errors incompetitiveprogramming
 
Relational Operators in C
Relational Operators in CRelational Operators in C
Relational Operators in C
 
Recursive functions in C
Recursive functions in CRecursive functions in C
Recursive functions in C
 
Function Pointer in C
Function Pointer in CFunction Pointer in C
Function Pointer in C
 
Functions
FunctionsFunctions
Functions
 
Java sessionnotes
Java sessionnotesJava sessionnotes
Java sessionnotes
 
Singlelinked list
Singlelinked listSinglelinked list
Singlelinked list
 
Graphs
GraphsGraphs
Graphs
 
B trees
B treesB trees
B trees
 
Functions in python3
Functions in python3Functions in python3
Functions in python3
 
Dictionary
DictionaryDictionary
Dictionary
 
Sets
SetsSets
Sets
 
Lists
ListsLists
Lists
 
DataStructures notes
DataStructures notesDataStructures notes
DataStructures notes
 
Solutionsfor co2 C Programs for data structures
Solutionsfor co2 C Programs for data structuresSolutionsfor co2 C Programs for data structures
Solutionsfor co2 C Programs for data structures
 

Último

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 

Último (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Wireless LANs and Mobile Networks

  • 1. Wireless LAN ================================================================ 1. History of Wireless LAN[1] Norman Abramson, a professor at the University of Hawaii, developed the world’s first wireless computer communication network, ALOHAnet (operational in 1971), using low-cost ham-like radios. The system included seven computers deployed over four islands to communicate with the central computer on the Oahu Island without using phone lines. In 1979, F.R. Gfeller and U. Bapst published a paper in the IEEE Proceedings reporting an experimental wireless local area network using diffused infrared communications. In 1980, P. Ferrert reported on an experimental application of a single code spread spectrum radio for wireless terminal communications in the IEEE National Telecommunications Conference. Later on, M. Kavehrad reported on an experimental wireless PBX system using code division multiple access. These efforts prompted significant industrial activities in the development of a new generation of wireless local area networks and it updated several old discussions in the portable and mobile radio industry. European Telecommunications Standards Institute, ETSI, ratified in1996 with High Performance Radio LAN (HiperLAN 1) standard. Later, ETSI, rolled out in June 2000, an flexible Radio LAN standard called HiperLAN 2, designed to provide high speed access 54Mbps than HiperLAN 1(20 Mbps) The IEEE finalized the initial standard for wireless LANs, IEEE 802.11 in June 1997. This initial standard specifies a 2.4 GHz operating frequency with data rates of 1 and 2 Mbps. With this standard, one could choose to use either FHSS or DSSS (two non compatible forms of spread spectrum modulation). Because of relatively low data rates (as compared to Ethernet), products based on the initial standard did not flourish as many had hoped. In late 1999, the IEEE published two supplements to the initial 802.11 standard: 802.11a and 802.11b (Wi-Fi). The unlicensed PCS Unlicensed Personal Communications Services and the proposed SUPERNet, later on renamed as U-NII, bands also presented new opportunities. A HomeRF group formed in 1997 to promote a technology aimed for residential use, but it disbanded at the end of 2002 Bluetooth is an industry specification for short-range RF-based connectivity for portable personal devices with its functional specification released out in 1999 by Bluetooth Special Interest Group. Bluetooth communicates on a frequency of 2.45 gigahertz. In 2009 802.11n was added to 802.11. It operates in both the 2.4 GHz and 5 GHz bands at a maximum data transfer rate of 300 Mbit/s. Most newer routers are able to utilise both wireless bands, known as dualband. This allows data communications to avoid the crowded
  • 2. 2.4 GHz band, which is also shared with Bluetooth devices and microwave ovens. The 5 GHz band is also wider than the 2.4 GHz band, with more channels. 2. Types of Wireless LANs: Local area networks can be constructed in wireless fashion mainly so that wireless users moving within a certain organization, such as a university campus, can access a backbone network. Wireless LANs are generally categorized according to the transmission technique that is used. All current wireless LAN products fall into one of the following categories: a) Infrared (IR) LANs b) Spread spectrum LANs c) Narrowband microwave LANs a) Infrared LANs[2] : Infrared communication technology is used in several home devices, such as television remote controls. Advantages of Infrared LANs[2]  The bandwidth for infrared communication is large and can therefore can achieve high data rates.  IR light is diffusely reflected by light-coloured objects; thus it is possible to use ceiling reflections to achieve coverage of an entire room.  IR light does not penetrate walls or other opaque objects. This has two advantages: - IR communications can be more easily secured against eavesdropping than microwave - A separate IR installation can be operated in every room in buildings without interference, enabling the construction of very large IR LANs  Equipment for infrared communication is relatively inexpensive and simple. The one major disadvantage of infrared technology is that background radiation from sunlight and indoor lighting can cause interference at the infrared receivers. There are three alternative transmission techniques commonly used for IR data transmissions:  Direct beam Configuration  Omni directional Configuration  Diffused Configuration Direct beam Configuration:[2] This configuration involves point-to-point connections. The range of communications is limited by the transmitted power and the direction of focus. With proper focusing, ranges up to a kilometre can be achieved. This technology can be used in token-ring LANs and interconnections between buildings as shown below
  • 3. Omni directional configuration[2] This configuration consists of a single base station that is normally used on ceilings. The base station sends an omnidirectional signal, which is picked up by all transceivers. The transceivers in turn use a directional beam focused directly at the base-station unit. Diffused-Configuration In this the infrared transmitters direct the transmitted signal to a diffused reflected ceiling. The signal is reflected in all directions from this ceiling. The receivers can then pick up the transmitted signal. b) Spread-Spectrum LANs[2] The spread-spectrum techniques use three different frequency bands: 902-928 MHz, 2.4 GHz-2.4835 GHz and 5.725 GHz-5.825GHz. Higher-frequency ranges offer greater bandwidth capability. However, the higher-frequency equipment is more expensive. The spread-spectrum LANs makes use of multiple adjacent cells arrangement. Adjacent cells make use of different centre frequencies within the same band to avoid interference. Within each of these cells, a star or peer-to-peer topology can be deployed. If a star topology is used, a hub as a network center is mounted on the ceiling. This hub acts as an interface between wired and wireless LANs, can be connected to other wired LANs. All users in the wireless LAN transmit and receive signals from the hub. A peer to peer topology is one in which there is no hub. A MAC algorithm such as CSMA is used to control access. This topology is appropriate for ad hoc LANs. c) Narrowband RF LANs[2] Narrowband radio frequency LANs use a very narrow bandwidth. These LANs can be either licensed or unlicensed. In licensed narrowband RF, a licensed authority assigns the radio frequency band. Most geographic areas are limited to a few licenses. Adjacent cells use different frequency bands. The transmissions are encrypted to prevent attacks. The licensed narrowband LANs guarantee communication without interference. The unlicensed narrowband RF LANs use the unlicensed spectrum and peer-to-peer LAN topology. 3. Wireless LAN Standards a) IEEE 802.11 Wireless Standard: 802.11 networks use free frequency bands (ISM: Industrial, Science, Medical). Thus everybody can run 802.11 devices without licensing a frequency band. 802.11 Pros and Cons:  Mobility
  • 4.  Flexible configuration  Relatively cheap  Weak security (WEP Wired Equivalent Protection, but fixed with WPA Wired Protection Access)  Relatively low bandwidth for data (compared to wired networks)  Electromagnetic interference with other devices (Bluetooth)  Simple installation, but high skills needed for exploitation of full potential of technology Different 802.11standards:  802.11a: 6, 9, 12, 18, 24, 36, 48, 54 Mbps (5 GHz band) uses OFDM  802.11b: Up to 11Mbps, simple (cheap) technology uses DSSS.  802.11g: Up to 54Mbps and uses OFDM,DSSS  802.11n: <600Mbps (MIMO=Multiple In Multiple Out antenna technology, uses multi-path transmission for better signal recovery at the receiver) uses OFDM  802.11ac: Forthcoming standard for higher throughput (802.11n enhancements).  802.11ad: Standard in progress, even higher throughput (<7Gpbs). Operation modes of 802.11: Below picture taken from copyrighted content of Peter. R. Egli[4] Each wireless LAN user has a wireless LAN adapter for communication over the wireless medium. This adapter is responsible for authentication, confidentiality and data delivery. To send data to a user in the wired LAN, a user in the wireless LAN first sends the data packet to the access point. The access point recognizes the wireless user through a unique ID called the SSID. SSID is like a password protection system that enables any wireless client to join the wireless LAN. Once the wireless user is authenticated, the access point forwards data packets to the desired wired user through the switch or hub. Access points build a table of association that contains the MAC addresses of all users in the wireless network. b) HiperLAN 1/2: HiperLAN 1 standard provides highspeed communications (20Mbps) between portable devices in the 5GHz range. Similar to IEEE802.11, HiperLAN/1 adopts CSMA to connect end user devices together. On top of that, HiperLAN/1 supports isochronous traffic for different type of data such as video, voice, text, etc.
  • 5. HIPERLAN/2 has a very high transmission rate (up to 54 Mbps at PHY layer) to a variety of networks including 3G mobile core networks, ATM networks and IP based networks, and also for private use as a wireless LAN system. This is achieved by making use of a modularization method called Orthogonal Frequency Digital Multiplexing (OFDM). c) Bluetooth: One of the ways Bluetooth devices avoid interfering with other systems is by sending out very weak signals of 1 milliwatt. The low power limits the range of a Bluetooth device to about 10 meters, cutting the chances of interference between a computer system and a portable telephone or television. Bluetooth operates at 2.4 GHz frequency band and supports data rates of 1 Mbps, with next generation products allowing anywhere from 2 to 12 Mbps, to be determined at a later date. d) HomeRF: HomeRF is an open industry specification developed by Home Radio Frequency Working Group that defines how electronic devices such as PCs, cordless phones and other peripherals share and communicate voice, data and streaming media in and around the home. HomeRF-compliant products operate in the license-free 2.4GHz frequency band and utilize frequency-hopping spread spectrum RF technology for secure and robust wireless communications with data rates of up to 1 Mbps (HomeRF1). Unlike Wi-Fi, HomeRF already has quality-of-service support for streaming media and is the only wireless LAN to integrate voice. 3. Challenges[3]: The key challenges in wireless networks are: a) Data Rate Enhancements. b) Low power networking. c) Security. d) Radio Signal Interference. e) System Interoperability. a) Enhancing Data Rate: Improving the current data rates to support future high speed applications is essential, especially, if multimedia service are to be provided. Data rate is a function of various factors such as the data compression algorithm, interference mitigation through error-resilient coding, power control, and the data transfer protocol. Therefore, it is imperative that manufacturers implement a well thought out design that considers these factors in order to achieve higher data rates. b) Low Power Design: The size and battery power limitation of wireless mobile devices place a limit on the range and throughput that can be supported by a wireless LAN. The complexity and hence the power consumption of wireless devices vary significantly depending on the kind of spread spectrum technology being used to implement the wireless LAN. Normally, direct sequence spread spectrum (DSSS) based implementations require large and power-hungry hardware compared to frequency hopped spread spectrum (FHSS). They tend to consume about two to three times the power of an equivalent FHSS system. But, the complex circuitry provides better error recovery capability to DSSS systems compared to FHSS. The right time has come for researchers and developers to approach these issues in wireless LAN technologies together and from a global perspective. c) Security: Security is a big concern in wireless networking, especially in e-commerce applications. Mobility of users increases the security concerns in a wireless network. Current wireless networks employ authentication and data encryption techniques on the air interface to provide security to its users. The IEEE 802.11 standard describes wired equivalent privacy (WEP) that defines a method to authenticate users and encrypt data between the PC card and the wireless LAN access point. In large enterprises, an IP network level security solution
  • 6. could ensure that the corporate network and proprietary data are safe. Virtual private network (VPN) is an option to make access to fixed access networks reliable. Since hackers are getting smarter, it is imperative that wireless security features must be updated constantly. d) Radio Signal Interference: Interference can take on an inward or outward direction. A radio-based LAN, for example, can experience inward interference either from the harmonics of transmitting systems or from other products using similar radio frequencies in the local area. Microwave ovens operate in the S band (2.4GHz) that many wireless LANs use to transmit and receive. These signals result in delays to the user by either blocking transmissions from stations on the LAN or causing bit errors to occur in data being sent. Newer products that utilize Bluetooth radio technology also operate in the 2.4GHz band and can cause interference with wireless LANs, especially in fringe areas not well covered by a particular wireless LAN access point. The other issue, outward interference, occurs when a wireless network’s signal disrupts other systems, such as adjacent wireless LANs and navigation equipment on aircraft. e) System Interoperability: With wireless LANs, interoperability is taken as a serious issue. There are still pre-802.11 (proprietary) wireless LANs, both frequency-hopping and direct sequence 802.11 versions, and vendor-specific enhancements to 802.11-compliant products that make interoperability questionable. To ensure interoperability with wireless LANs, it is best to implement radio cards and access points from the same vendor, if possible. Handoff: Handoff is the mechanism by which an ongoing connection between a Mobi lehost (MH) and a corresponding Access point (AP) is transferred from one access point to the other. Handoff occurs during cell boundary crossing, weak signal reception and while a QoS deterioration occurs in the current cell. Present handoff mechanisms are based only on signal strength and do not take into account the load of the new cell. There is no negotiation of QoS characteristics with the new AP to ensure smooth carryover from the old AP to new AP. Now, several methods are proposed by researchers to have a seamless handoff between access points. 4. Future Researchareas: FutureWLANs must have to mature in the following areas  Higher Speeds  Improved Security  Seamless end-to-end protocols  Better Error control  Long distance Coverage  Better interoperability  Global networking Anywhere, anytime, any-form connectivity
  • 7. Mobile Networks ================================================================ 1. History of Mobile Networks You can get very nice information at http://www.indigoo.com/dox/itdp/12_MobileWireless/ 2. MANET[5]: The concept of mobile ad hoc networking is not a new one and its origins can be traced back to the DARPA Packet Radio Network project in 1972. Infrastructured wireless networks require a fixed network infrastructure with centralised administration is required for their operation, potentially consuming a lot of time and money for set-up and maintenance. Furthermore, an increasing number of devices such as laptops, personal digital assistants (PDAs), pocket PCs, tablet PCs, smart phones, MP3 players, digital cameras, etc. are provided with short-range wireless interfaces. In addition, these devices are getting smaller, cheaper, more user friendly and more powerful. This evolution is driving a new alternative way for mobile communication, in which mobile devices form a self creating, self-organising and self-administering wireless network, called a mobile ad hoc network. Nodes that lie within each other’s send range can communicate directly and are responsible for dynamically discovering each other. In order to enable communication between nodes that are not directly within each other’s send range, intermediate nodes act as routers that relay packets generated by other nodes to their destination. These nodes are often energy constrained— that is, battery-powered— devices with a great diversity in their capabilities. Furthermore, devices are free to join or leave the network and they may move randomly, possibly resulting in rapid and unpredictable topology changes.
  • 8. 3. Challenges: MANETs impose challenges in all layers of protocol stack. The physical layer must deal with rapid changes in link characteristics. The media access control (MAC) layer needs to allow fair channel access, minimise packet collisions and deal with hidden and exposed terminals. At the network layer, nodes need to cooperate to calculate paths. The transport layer must be capable of handling packet loss and delay characteristics that are very different from wired networks. Applications should be able to handle possible disconnections and reconnections. The Key Challenges are: a) Routing b) Service or resource discovery c) Addressing or internet connectivity d) Security and node co-operation a) Routing: As mobile ad hoc networks are characterised by a multi-hop network topology that can change frequently due to mobility, efficient routing protocols are needed to establish communication paths between nodes, without causing excessive control traffic overhead or computational burden on the power constrained devices.
  • 9. A number of proposed solutions attempt to have an up-to-date route to all other nodes at all times. To this end, these protocols exchange routing control information periodically and on topological changes. These protocols, which are called proactive routing protocols, are typically modified versions of traditional link state or distance vector routing protocols encountered in wired networks, adapted to the specific requirements of the dynamic mobile ad hoc network environment. Most of the time, it is not necessary to have an up-to-date route to all other nodes. Therefore, reactive routing protocols only set up routes to nodes they communicate with and these routes are kept alive as long as they are needed. Combinations of proactive and reactive protocols, where nearby routes (for example, maximum two hops) are kept up-to-date proactively, while far-away routes are set up reactively, are also possible and fall in the category of hybrid routing protocols. A completely different approach is taken by the location-based routing protocols, where packet forwarding is based on the location of a node’s communication partner. Location information services provide nodes with the location of the others, so that packets can be forwarded. b) Service and resource discovery: MANET nodes may have little or no knowledge at all about the capabilities or services offered by each other. Therefore, service and resource discovery mechanisms, which allow devices to automatically locate network services and to advertise their own capabilities to the rest of the network are an important aspect of self- configurable networks. Possible services or resources include storage, access to databases or files, printer, computing power, Internet access, etc. Directory-less service and resource discovery mechanisms, in which nodes reactively request services when needed and/or nodes proactively announce their services to others, seem an attractive approach for infrastructureless networks. The alternative scheme is directory-based and involves directory agents where services are registered and service requests are handled. This implies that this functionality should be statically or dynamically assigned to a subset of the nodes and kept up-to-date. Existing directory-based service and resource discovery mechanisms such as UPnP or Salutation are unable to deal with the dynamics in ad hoc networks. Currently, no mature solution exists, but it is clear that the design of these protocols should be done in close cooperation with the routing protocols and should include context-awareness (location, neighbourhood, user profile, etc.) to improve performance. Also, when ad hoc networks are connected to fixed infrastructure (for example, Internet, cellular network, etc.), protocols and methods are needed to inject the available external services offered by service and content providers into the ad hoc network. c) Addressing and Internet connectivity: In order to enable communication between nodes within the ad hoc network, each node needs an address. In stand-alone ad hoc networks, a unique MAC addresses could be used to address nodes. However, all current applications are based on TCP/IP or UDP/IP. In addition, as future mobile ad hoc networks will interact with IP-based networks and will run applications that use existing Internet protocols such as
  • 10. transmission control protocol (TCP) and user datagram protocol (UDP), the use of IP addresses is inevitable. Unfortunately, an internal address organisation with prefixes and ranges like in the fixed Internet is hard to maintain in mobile ad hoc networks due to node mobility and overhead reasons and other solutions for address assignment are thus needed. One solution is based on the assumption (and restriction) that all MANET nodes already have a static, globally unique and pre-assigned IPv4 or IPv6 address. This solves the whole issue of assigning addresses, but introduces new problems when interworking with fixed networks. Connections coming from and going to the fixed network can be handled using mobile IP, where the pre-assigned IP address serves as the mobile node’s home address (HoA). All traffic sent to this IP address will arrive at the node’s home agent (HA) . When the node in the ad hoc network advertises to its home agent the IP address of the Internet gateway as its careof- address (CoA), the home agent can tunnel all traffic to the ad hoc network , on which it is delivered to the mobile node using an ad hoc routing protocol . For outgoing connections, the mobile node has to route traffic to an Internet gateway, and for internal traffic an ad hoc routing protocol can be used. The main problem with this approach is that a MANET node needs an efficient way to figure out if a certain address is present in the MANET or if it is necessary to use an Internet gateway, without flooding the entire network. Another solution is the assignment of random, internally unique addresses. This can be realised by having each node picking a more or less random address from a very address detection (DAD) techniques in order to impose address uniqueness within the MANET. Strong DAD techniques will always detect duplicates, but are difficult to scale in large networks. Weak DAD approaches can tolerate duplicates as long as they do not interfere with each other; that is, if packets always arrive at the intended destination. If interconnection to the Internet is desirable, outgoing connections could be realised using network address translation (NAT), but incoming connections still remain a problem if random, not globally routable, addresses are used. Also, the use of NAT remains problematic when multiple Internet gateways are present. If a MANET node switches to another gateway, a new IP address is used and ongoing TCP connections will break. Another possible approach is the assignment of unique addresses that all lie within one subnet (comparable to the addresses assigned by a dynamic host configuration protocol (DHCP) server). When attached to the Internet, the ad hoc network can be seen as a separate routable subnet. This simplifies the decision if a node is inside or outside the ad hoc network. However, no efficient solutions exist for choosing dynamically an appropriate, externally routable and unique network prefix (for example, special MANET prefixes assigned to Internet gateways), handling the merging or splitting of ad hoc networks, handling multiple points of attachment to the Internet, etc. The above discussion makes clear that, although many solutions are being investigated, no common adopted solution for addressing and Internet connectivity is available yet. New approaches using host identities, where the role of IP is limited to routing and not addressing, combined with dynamic name spaces, could offer a potential solution.
  • 11. d) Security and node cooperation: The wireless mobile ad hoc nature of MANETs brings new security challenges to the network design. As the wireless medium is vulnerable to eavesdropping and ad hoc network functionality is established through node cooperation, mobile ad hoc networks are intrinsically exposed to control packets or data packets. Securing ad hoc networks against malicious attacks is difficult to achieve. Preventive mechanisms include among others authentication of message sources, data integrity and protection of message sequencing, and are typically based on key-based cryptography. Incorporating cryptographic mechanisms is challenging, as there is no centralised key distribution centre or trusted certification authority. These preventative mechanisms need to be sustained by detection techniques that can discover attempts to penetrate or attack the network. The previous problems were all related to malicious nodes that intentionally damage or compromise network functionality. However, selfish nodes, which use the network but do not cooperate to routing or packet forwarding for others in order not to spill battery life or network bandwidth, constitute an important problem as network functioning entirely relies on the cooperation between nodes and their contribution to basic network functions. To deal with these problems, the self-organising network concept must be based on an incentive for users to collaborate, thereby avoiding selfish behaviour. Existing solutions aim at detecting and isolating selfish nodes based on watchdog mechanisms, which identify misbehaving nodes, and reputation systems, which allow nodes to isolate selfish nodes. Another promising approach is the introduction of a billing system into the network based on economical models to enforce cooperation. Using virtual currencies or micro-payments, nodes pay for using other nodes forwarding capabilities or services and are remunerated for making theirs available. This approach certainly has potential in scenarios in which part of the ad hoc network and services is deployed by companies or service providers. Also, when ad hoc networks are interconnected to fixed infrastructures by gateway nodes, which are billed by a telecom operator (for example, UMTS, hot-spot access, etc.), billing mechanisms are needed to remunerate these nodes for making these services available. Questions such as who is billing, to whom and for what, need to be answered and will lead to complex business models. We may conclude that in some ad hoc network scenarios, the network organisation can completely or partially rely on a trust relationship between participating nodes (for example, PANs). In many others security mechanisms, mechanisms to enforce cooperation between nodes or billing methods are needed and will certainly be an important subject of future research. [1]en.wikipedia.org/wiki/Wireless_LAN [2]Wireless Communications and Standards, Second Edition, William Stallings [3]Chandramouli, Vijay. "A detailed study on wireless LAN technologies." URL: h ttp://crystal. uta. edu/~ kumar/cse6392/termpapers/Vijay_paper. pdf# search='A% 20Detailed% 20St udy% 20on% 20Wireless% 20LAN% 20Technologies (2002). [4]http://www.indigoo.com/dox/itdp/12_MobileWireless/ [5]Hoebeke, Jeroen, et al. "An overview of mobile ad hoc networks: Applications and challenges." Journal-Communications Network 3.3 (2004): 60-66.
  • 12. Keywords Cellular networks versus mobile adhoc networks, mobile adhoc network enabling technologies, Challenges in MANET, MANET, History of Mobile Networks, Mobile Networks, Future Research areas in WLANs, challenges in wireless networks, HomeRF, Bluetooth, HiperLAN ½, Operation modes of 802.11, Different 802.11standards, IEEE 802.11 Wireless Standard:, Wireless LAN Standards, Diffused Configuration, Omni directional Configuration, Direct beam Configuration, Narrowband microwave LANs, Spread spectrum LANs, Infrared (IR) LANs , Types of Wireless LANs, History of Wireless LAN.