Professional Documents
Culture Documents
Unit 3
Wireless Media:
It is also referred to as Unguided or Unbounded transmission media. No physical medium is
required for the transmission of electromagnetic signals.
Features:
o Signal is broadcasted through air
o Less Secure
o Used for larger distances
o There are 3 major types of Unguided Media:
Radio waves:
These are easy to generate and can penetrate through buildings. The sending and receiving antennas
need not be aligned. Frequency Range: 3 KHz – 1GHz. AM and FM radios and cordless phones use
Radio waves for transmission.
Further Categorized as (i) Terrestrial and (ii) Satellite.
Radio waves are omnidirectional that is when an antenna transmits radio waves they are propagated
in all direction. Here sending antenna can send waves that can be received by any receiving
antenna.
The radio wave band is relatively narrow, just under 1GHz, compared to the microwave band.
When this band is divided into sub-bands the sidebands are also narrow, leading to a low data rate
for digital communications.
Broadcast Radio:
Broadcast radio is a wireless transmission medium that distributes radio signals through the air over
long distances such as between cities, regions, and countries and short distances such as within an
office or home.
Bluetooth, UWB, Wi-Fi, and Wi-MAX communications technologies discussed earlier in this
chapter use broadcast radio signals.
Cellular Radio:
Cellular radio is a form of broadcast radio that is used widely for mobile communications,
specifically wireless modems and cell phones. A cell phone is a telephone device that uses high-
frequency radio waves to transmit voice and digital data messages.
Some mobile users connect their notebook computer or other mobile computer to a cell phone to
access the Web, send and receive e-mail, enter a chat room, or connect to an office or school
network while away from a standard telephone line. Read Looking Ahead 8-2 for a look at the next
generation of cellular communications.
Personal Communications Services (PCS) is the term used by the United States Federal
Communications Commission (FCC) to identify all wireless digital communications. Devices that
use PCS include cell phones, PDAs, pagers, and fax machines.
Microwaves :
It is a line of sight transmission i.e. the sending and receiving antennas need to be
properly aligned with each other. The distance covered by the signal is directly
proportional to the height of the antenna. Frequency Range:1GHz – 300GHz. These
are majorly used for mobile phone communication and television distribution.
Microwaves are unidirectional that is when an antenna transmits microwaves, they
can be narrowly focused, which means that the sending and receiving antennas need
to be aligned.
The microwave band is relatively wide almost 299 GHz. Therefore wider sub-bands
can be assigned and a high data rate is possible.
Communications Satellite:
A communications satellite is a space station that receives microwave signals from an earth-
based station, amplifies (strengthens) the signals, and broadcasts the signals back over a
wide area to any number of earth-based stations.
These earth-based stations often are microwave stations. Other devices, such as smart
phones and GPS receivers, also can function as earth-based stations. Transmission from an
earth-based station to a satellite is an uplink. Transmission from a satellite to an earth-based
station is a downlink.
Applications such as air navigation, television and radio broadcasts, weather forecasting,
video conferencing, paging, global positioning systems, and Internet connections use
communications satellites.
With the proper satellite dish and a satellite modem card, consumers access the Internet
using satellite technology. With satellite Internet connections, however, uplink
transmissions usually are slower than downlink transmissions. This difference in speeds
usually is acceptable to most Internet satellite users because they download much more data
than they upload.
Although a satellite Internet connection is more expensive than cable Internet or DSL
connections, sometimes it is the only high-speed Internet option in remote areas.
Infrared:
Infrared waves are used for very short distance communication. They cannot penetrate
through obstacles. This prevents interference between systems. Frequency Range: 300GHz
– 400THz. It is used in TV remotes, wireless mouse, keyboard, printer, etc.
These are used for short range communication.
Wireless Network:
Wireless networks are computer networks that are not connected by cables of any kind. The
use of a wireless network enables enterprises to avoid the costly process of introducing
cables into buildings or as a connection between different equipment locations. The bases of
wireless systems are radio waves, an implementation that takes place at the physical level of
network structure.
Wireless networks use radio waves to connect devices such as laptops to the Internet, the
business network and applications. When laptops are connected to Wi-Fi hot spots in public
places, the connection is established to that business’s wireless network.
There are four main types of wireless networks:
Wireless Local Area Network (LAN): Links two or more devices using a wireless distribution
method, providing a connection through access points to the wider Internet.
Wireless Metropolitan Area Networks (MAN): Connects several wireless LANs.
Wireless Wide Area Network (WAN): Covers large areas such as neighbouring towns and cities.
Wireless Personal Area Network (PAN): Interconnects devices in a short span, generally within a
person’s reach.
Advantages of Wireless Networks:
It provides clutter-free desks due to the absence of wires and cables.
It increases the mobility of network devices connected to the system since the devices need
not be connected to each other.
Accessing network devices from any location within the network coverage or Wi-Fi hotspot
becomes convenient since laying out cables is not needed.
Installation and setup of wireless networks are easier.
New devices can be easily connected to the existing setup since they needn’t be wired to the
present equipment. Also, the number of equipment that can be added or removed to the
system can vary considerably since they are not limited by the cable capacity. This makes
wireless networks very scalable.
Wireless networks require very limited or no wires. Thus, it reduces the equipment and
setup costs.
Note that 802.11b was actually an amendment to the original 802.11 standard added in 1999 to
permit wireless functionality to be analogous to hard-wired Ethernet connections.
IEEE 802.11g - 802.11g was indorsed in 2003. It operates in the 2.4 GHz band (as in 802.11b) and
provides a average throughput of 22 Mbps. It uses OFDM technique (as in 802.11a). It is fully
backward compatible with 802.11b. 802.11g devices also face interference from other devices
operating in 2.4 GHz band.
IEEE 802.11n - 802.11n was approved and published in 2009 that operates on both the 2.4 GHz
and the 5 GHz bands. It has variable data rate ranging from 54 Mbps to 600 Mbps. It provides a
marked improvement over previous standards 802.11 by incorporating multiple-input multiple-
output antennas (MIMO antennas).
IEEE 802.11p - 802.11 is an amendment for including wireless access in vehicular environments
(WAVE) to support Intelligent Transportation Systems (ITS). They include network
communications between vehicles moving at high speed and the environment. They have a data rate
of 27 Mbps and operate in 5.9 GHz band.
WLANs:
Wireless LANs (WLANs) are wireless computer networks that use high-frequency radio
waves instead of cables for connecting the devices within a limited area forming LAN
(Local Area Network). Users connected by wireless LANs can move around within this
limited area such as home, school, campus, office building, railway platform, etc.
Most WLANs are based upon the standard IEEE 802.11 standard or Wi-Fi.
Types of WLANs:
WLAN, as standardized by IEEE 802.11, operates in two basic modes, infrastructure, and ad hoc
mode.
Infrastructure Mode − Mobile devices or clients connect to an access point (AP) that in turn
connects via a bridge to the LAN or Internet. The client transmits frames to other clients via the AP.
Ad Hoc Mode − Clients transmit frames directly to each other in a peer-to-peer fashion.
Advantages of WLANs:
They provide clutter-free homes, offices and other networked places.
The LANs are scalable in nature, i.e. devices may be added or removed from the network at
greater ease than wired LANs.
The system is portable within the network coverage. Access to the network is not bounded
by the length of the cables.
Installation and setup are much easier than wired counterparts.
The equipment and setup costs are reduced.
Disadvantages of WLANs:
Since radio waves are used for communications, the signals are noisier with more
interference from nearby systems.
Greater care is needed for encrypting information. Also, they are more prone to errors. So,
they require greater bandwidth than the wired LANs.
WLANs are slower than wired LANs.
MACAW Protocol:
Multiple Accesses with Collision Avoidance for Wireless (MACAW) is a slotted medium
access control (MAC) protocol widely used in ad hoc networks.
It is the foundation of many other MAC protocols used in wireless sensor networks (WSN).
The IEEE 802.11 RTS/CTS mechanism is adopted from this protocol.
It uses RTS-CTS-DS-DATA-ACK frame sequence for transferring data, sometimes preceded
by an RTS-RRTS frame sequence, in view to provide solution to the hidden node problem.
Although protocols based on MACAW, such as S-MAC, use carrier sense in addition to the
RTS/CTS mechanism, MACAW does not make use of carrier sense.
MACAW is a non-persistent slotted protocol, meaning that after the medium has been busy,
for example after a CTS message, the station waits a random time after the start of a time
slot before sending an RTS.
Ad-hoc networks:
An ad hoc network is one that is spontaneously formed when devices connect and
communicate with each other. The term ad hoc is a Latin word that literally means "for
this," implying improvised or impromptu.
Ad hoc networks are mostly wireless local area networks (LANs). The devices
communicate with each other directly instead of relying on a base station or access points as
in wireless LANs for data transfer co-ordination. Each device participates in routing
activity, by determining the route using the routing algorithm and forwarding data to other
devices via this route.
Classifications of Ad Hoc Networks:
Ad hoc networks can be classified into several types depending upon the nature of their
applications. The most prominent ad hoc networks that are commonly incorporated are
illustrated in the diagram below –
Bluetooth:
Bluetooth wireless technology is a short range communications technology intended to replace the
cables connecting portable unit and maintaining high levels of security. Bluetooth technology is
based on Ad-hoc technology also known as Ad-hoc Pico nets, which is a local area network with a
very limited coverage.
History of Bluetooth
WLAN technology enables device connectivity to infrastructure based services through a
wireless carrier provider. The need for personal devices to communicate wirelessly with one
another without an established infrastructure has led to the emergence of Personal Area
Networks (PANs).
Ericsson's Bluetooth project in 1994 defines the standard for PANs to enable
communication between mobile phones using low power and low cost radio interfaces.
In May 1988, Companies such as IBM, Intel, Nokia and Toshiba joined Ericsson to form the
Bluetooth Special Interest Group (SIG) whose aim was to develop a de-facto standard for
PANs.
IEEE has approved a Bluetooth based standard named IEEE 802.15.1 for Wireless Personal
Area Networks (WPANs). IEEE standard covers MAC and Physical layer applications.
Bluetooth specification details the entire protocol stack. Bluetooth employs Radio Frequency (RF)
for communication. It makes use of frequency modulation to generate radio waves in
the ISM band.
Usage of Bluetooth:
Bluetooth offers a uniform structure for a wide range of devices to connect and
communicate with each other.
Bluetooth technology has achieved global acceptance such that any Bluetooth enabled
device, almost everywhere in the world, can be connected with Bluetooth enabled devices.
Low power consumption of Bluetooth technology and an offered range of up to ten meters
have paved the way for several usage models.
Bluetooth offers interactive conference by establishing an Adhoc network of laptops.
Bluetooth usage model includes cordless computer, intercom, cordless phone and mobile
phones.
Bluetooth Architecture:
Bluetooth network technology connects mobile devices wirelessly over a short-range to form a
personal area network (PAN). The Bluetooth architecture has its own independent model with a
stack of protocols, instead of following the standard OSI model or TCP/IP model.
The protocols in the Bluetooth standard can be loosely grouped into the physical layer, data link
layer, middleware layer, and application layer as shown in the following diagram.
Protocols in the Bluetooth Protocol Architecture
Physical Layer: This includes Bluetooth radio and Baseband (also in the data link layer.
Radio: This is a physical layer equivalent protocol that lays down the physical structure and
specifications for transmission of radio waves. It defines air interface, frequency bands, frequency
hopping specifications, and modulation techniques.
Baseband: This protocol takes the services of radio protocol. It defines the addressing scheme,
packet frame format, timing, and power control algorithms.
Data Link Layer: This includes Baseband, Link Manager Protocol (LMP), and Logical Link
Control and Adaptation Protocol (L2CAP).
Link Manager Protocol (LMP) − LMP establishes logical links between Bluetooth devices and
maintains the links for enabling communications. The other main functions of LMP are device
authentication, message encryption, and negotiation of packet sizes.
Logical Link Control and Adaptation Protocol (L2CAP) − L2CAP provides adaption between
upper layer frame and baseband layer frame format. L2CAP provides support for both connection-
oriented as well as connectionless services.
Middleware Layer: This includes Radio Frequency Communications (RF-Comm) protocol,
adopted protocols, SDP, and AT commands.
RF-Comm: It is short for Radio Frontend Component. It provides a serial interface with WAP.
Adopted Protocols: These are the protocols that are adopted from standard models. The commonly
adopted protocols used in Bluetooth are Point-to-Point Protocol (PPP), Internet Protocol (IP), User
Datagram Protocol (UDP), Transmission Control Protocol (TCP), and Wireless Application
Protocol (WAP).
Service Discovery Protocol (SDP): SDP takes care of service-related queries like device
information so as to establish a connection between contending Bluetooth devices.
AT Commands: ATtention command set.
Applications Layer: This includes the application profiles that allow the user to interact with the
Bluetooth applications.
Bluetooth Security:
o Bluetooth security is of paramount importance as devices are susceptible to a variety
of wireless and networking attacking including denial of service attacks,
eavesdropping, man-in-the-middle attacks, message modification, and resource
misappropriation.
o Bluetooth security must also address more specific Bluetooth related attacks that
target known vulnerabilities in Bluetooth implementations and specifications. These
may include attacks against improperly secured Bluetooth implementations which
can provide attackers with unauthorized access.
o Many users may not believe there is an issue with Bluetooth security, but hackers
may be able to gain access to information from phone lists to more sensitive
information that others may hold on Bluetooth enabled phones and other devices.
o There are three basic means of providing Bluetooth security:
Authentication: In this process the identity of the communicating devices are verified. User
authentication is not part of the main Bluetooth security elements of the specification.
Confidentiality: This process prevents information being eavesdropped by ensuring that only
authorised devices can access and view the data.
Authorisation: This process prevents access by ensuring that a device is authorised to use a
service before enabling it to do so.
Mobile IP:
Mobile IP is a communication protocol (created by extending Internet Protocol, IP) that allows the
users to move from one network to another with the same IP address. It ensures that the
communication will continue without user’s sessions or connections being dropped.
Terminologies:
Mobile Node (MN):It is the hand-held communication device that the user caries e.g. Cell phone.
Home Network:It is a network to which the mobile node originally belongs to as per its assigned
IP address (home address).
Home Agent (HA):It is a router in home network to which the mobile node was originally
connected
Home Address:It is the permanent IP address assigned to the mobile node (within its home
network).
Foreign Network:It is the current network to which the mobile node is visiting (away from its
home network).
Foreign Agent (FA):It is a router in foreign network to which mobile node is currently connected.
The packets from the home agent are sent to the foreign agent who delivers it to the mobile node.
Correspondent Node (CN):It is a device on the internet communicating to the mobile node.
Care of Address (COA): It is the temporary address used by a mobile node while it is moving
away from its home network.
Working:
o Correspondent node sends the data to the mobile node. Data packets contain
correspondent node’s address (Source) and home address (Destination). Packets
reach to the home agent. But now mobile node is not in the home network, it has
moved into the foreign network. Foreign agent sends the care-of-address to the home
agent to which all the packets should be sent. Now, a tunnel will be established
between the home agent and the foreign agent by the process of tunnelling.
o Tunnelling establishes a virtual pipe for the packets available between a tunnel entry
and an endpoint. It is the process of sending a packet via a tunnel and it is achieved
by a mechanism called encapsulation.
o Now, home agent encapsulates the data packets into new packets in which the source
address is the home address and destination is the care-of-address and sends it
through the tunnel to the foreign agent. Foreign agent, on other side of the tunnel
receives the data packets, de-capsulates them and sends them to the mobile node.
Mobile node in response to the data packets received sends a reply in response to
foreign agent. Foreign agent directly sends the reply to the correspondent node.
Key Mechanisms in Mobile IP:
Agent Discovery: Agents advertise their presence by periodically broadcasting their agent
advertisement messages. The mobile node receiving the agent advertisement messages observes
whether the message is from its own home agent and determines whether it is in the home network
or foreign network.
Agent Registration: Mobile node after discovering the foreign agent, sends registration request
(RREQ) to the foreign agent. Foreign agent in turn, sends the registration request to the home agent
with the care-of-address. Home agent sends registration reply (RREP) to the foreign agent. Then it
forwards the registration reply to the mobile node and completes the process of registration.
Tunnelling: It establishes a virtual pipe for the packets available between a tunnel entry and an
endpoint. It is the process of sending a packet via a tunnel and it is achieved by a mechanism called
encapsulation. It takes place to forward an IP datagram from the home agent to the care-of-address.
Whenever home agent receives a packet from correspondent node, it encapsulates the packet with
source address as home address and destination as care-of-address.
Route Optimization in Mobile IP:
The route optimization adds a conceptual data structure, the binding cache, to the correspondent
node. The binding cache contains bindings for mobile node’s home address and its current care-of-
address.
Every time the home agent receives a IP datagram that is destined to a mobile node currently away
from the home network, it sends a binding update to the correspondent node to update the
information in the correspondent node’s binding cache. After this the correspondent node can
directly tunnel packets to the mobile node.
Mobile TCP:
Mobile TCP introduces an asymmetric transport protocol design formobile
systems, where a transport layer connection between a mobile and a corresponding
stationary host is partition into twoconnections, the connection between the
mobile host and a local fixed host referred to as Mobile Gateway and the
connection between thelocal fixed host and the corresponding host.
In the first connection,TCP connection is an emulated version by means of L2 link
operation or else to reduce computation or other processing cost to savebattery
power of a mobile terminal.
When data (mobile internet) became a requirement in the GSM networks, the General Packet Radio
Service (GPRS) was introduced which added a packet-switched (PS) extension to accommodate
data services in the existing GSM networks. 3G UMTS networks use the same approach, i.e. CS for
voice and PS for data services.
4G networks have the capability to accommodate voice calls over IP using Voice over LTE
(VoLTE) protocol. However, they also have a circuit-switched Fall Back option which uses CS to
facilitate voice calls.
WLL components:
PSTN:It is Public Switched Telephone Network which is a circuit switched network. It is a
collection of world’s interconnected circuit switched telephone networks.
Switch Function:Switch Function switches the PSTN among various WANUs.
WANU:It is short for Wireless Access Network Unit. It is present at the local exchange office. All
local WASUs are connected to it. Its functions includes: Authentication, Operation & maintenance,
Routing, Transceiving voice and data. It consists of following sub-components:
Transceiver: It transmits/receives data.
WLL Controller: It controls the wireless local loop component with WASU.
AM: It is short for Access Manager. It is responsible for authentication.
HLR: It is short for Home Location Register. It stores the details of all local WASUs.
WASU: It is short for Wireless Access Subscriber Units. It is present at the house of the subscriber.
It connects the subscriber to WANU and the power supply for it is provided locally.
Advantages of WLL:
It eliminates the first mile or last mile construction of the network connection.
Low cost due to no use of conventional copper wires.
Much more secure due to digital encryption techniques used in wireless communication.
Highly scalable as it doesn’t require the installation of more wires for scaling it.
Features of WLL:
Internet connection via modem
Data service
Voice service
Fax service
Local Multipoint Distribution Service (LMDS):
It is a system for broadband microwave wireless transmission direct from a local antenna to homes
and businesses within a line-of-sight radius, a solution to the so- called last-mile technology
problem of economically bringing high-bandwidth services to users.
LMDS is an alternative to installing optical fibre all the way to the user or to adapting cable TV for
broadband Internet service.
Depending on the implementation, LMDS offers a bandwidth of up to 1.5 Gbps downstream to
users and 200 Mbps upstream from the user. A more typical data rate is 38 Mbps downstream.
Some services offer both downstream and upstream service (symmetrical service); others offer
downstream only (asymmetrical service) with upstream being obtained using wire connections.
However, the cost of installing LMDS is considered far lower than installing fibre optic cable or
upgrading cable TV systems. The first markets for LMDS are seen as:
High-speed data transmission for businesses
Interactive television and streaming multimedia from Web sites
Voice service (usually as a supplement to other services)
Because LMDS requires a more expensive and possibly larger transceiver than can conveniently be
packaged in a handheld device, LMDS is not viewed as a replacement for or alternative to mobile
wireless technologies such as cellular and GSM.
On the other hand, LMDS offers much higher data rates because of its use of a higher range of
frequencies with their wider bandwidths.
In general, LMDS is for fixed locations and offers higher data rates; cellular digital such as GSM is
for mobile users at lower data rates (although these will increase with technologies leading up
to UMTS).
LMDS uses the range of electromagnetic radiation spectrum in the vicinity of 28 GHz, with the
allocated range differing slightly between the U.S., Canada, and other countries. In
Europe, ETSI sponsors an equivalent technology. In Canada, it is called Local Multipoint
Communication Service (LMCS).
Like cellular telephone technologies, LMDS is point-to-multipoint. It is viewed as a future
component in the convergence of data and telephony services.
Ericsson's LMDS system uses either Ethernet, ATM, or T-carrier system/E-carriersystem network
interfaces at the user end. ATM allows the user to select and pay for varying qualities of service.
Ultra Wideband Technology:
Ultra-wideband (UWB), a 132-year-old communication, is now being revitalized for
wirelessly connecting devices over short distances. Many industry observers claim
UWB could prove more successful than Bluetooth because it has superior speed, is
cheaper, uses less power, is more secure, and provides superior location discovery
and device ranging.
It is a short range wireless communication protocol like Wi-Fi or Bluetooth that uses
radio waves of short pulses over a spectrum of frequencies ranging from 3.1 to 10.5
GHz in unlicensed applications.
It is used for a bandwidth larger or equal to 500 MHz.