100% found this document useful (1 vote)
505 views45 pages

What Is Wireless Communication

The document discusses various topics related to wireless communication and mobile computing. It introduces wireless networks and their types, as well as wireless communication techniques such as satellite communication, Bluetooth, and infrared communication. It also covers cellular voice networks, wireless data services like CDPD and SMR, satellite communications, and wireless local area networks.

Uploaded by

Mehari Temesgen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
505 views45 pages

What Is Wireless Communication

The document discusses various topics related to wireless communication and mobile computing. It introduces wireless networks and their types, as well as wireless communication techniques such as satellite communication, Bluetooth, and infrared communication. It also covers cellular voice networks, wireless data services like CDPD and SMR, satellite communications, and wireless local area networks.

Uploaded by

Mehari Temesgen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 45

Chapter 1

what is wireless communication

Wireless communication and Mobile Computing 3-1


Outline
 Introduction to Wireless Network
 Wireless Techniques
 A Strategy for Worldwide Voice Communications
 Cellular Voice
 Wireless Radio
 Wireless PBX Systems
 Satellite Voice Services
 Wireless Considerations for a Data Communications Strategy
 CDPD as a wireless option
 Specialized Mobile Radio
 Commercial Mobile Data Communications Services
 Satellite Data and Wireless LANs
 Wireless Communication As an Alternative to Fixed Media
 The Wireless Cost Advantage
 Vendor Support for Wireless Solutions
 Outlook for Wireless Applications

Wireless communication and Mobile Computing 3-2


Outline
Mobile Communications Systems
 Introduction
 Safe Mobile Computing
 determining if an organization is at risk
 1.5.1. computer viruses
 1.5.1. power protection and security programs
 General Data Backup Mechanism
 1.5.4.1. Backing Up Pdas
 1.5.4.2 Data Recovery Centers and Data Transfers
physical security: locks and cases

Wireless communication and Mobile Computing 3-3


Wireless communication and Mobile computing
 Wireless network is a type of network sets up by using radio
signal frequency to communicate among computers and other
network devices.
 The Wireless network can be:
1. Infrastructure mode:
2. Infrastructureless (Ad hoc) mode:
 What is wireless communication
-The transmission of information over a distance without the help of
wires, cables or any other forms of electrical conductors.

Wireless communication and Mobile Computing 3-4


Wireless communication and Mobile computing
 Technologies of wireless communication:
 It has technologies such satellite communication, mobile
communication, Bluetooth communication, infrared
communication they are lack of physical connection.
 The wireless communication use radio and satellite
communication over long distance and
 TV remote controller used for for short distance
 There are also wireless device, mobile, GPS, wireless computer,
wireless adapter, wireless repeater, ZigBee etc.
Wireless communication and Mobile Computing 3-5
Wireless communication and Mobile computing
 Type of wireless Networks
 Wireless Personal Area Networks (WPAN)-- Bluetooth and
Infrared (IR) wireless communication
 Wireless Local Area Networks (WLAN)-- WLAN is: Wi-Fi
 Wireless Metropolitan Area Networks (WMAN)-- WiMAX
 Wireless Wide Area Networks (WWAN)-- Cellular or mobile
communication system.

Wireless communication and Mobile Computing 3-6


Wireless communication and Mobile computing

Wireless Techniques:
1.1. Worldwide Voice Communications
1.1. Cellular Voice
In cellular voice the cellular radio is used as a means of supporting
local telephone service. This is used in many undeveloped countries
there is little or no infrastructure to support telephone services.
Wireless Local Loop (Fixed wireless loop)
In a telephone network a Wireless Local Loop is a generic term for
an access system that uses a wireless link to connect subscribers to
the local telephone station in place of conventional copper wire.
Wireless communication and Mobile Computing 3-7
Wireless communication and Mobile computing
 The function of a WLL is access to local telephone station using
wireless link. WLL is the best system to handle high data traffic in
the local loop system
1.2. Wireless Radio
 Wireless radio is being installed in place of traditional Central
Office systems that require expensive extended copper wire
external networks. Service providers are finding that wireless
radio central office systems are convenient, fast, and less costly
when compared with traditional central office switching systems.
Wireless communication and Mobile Computing 3-8
Wireless communication and Mobile computing
1.3. Wireless PBX Systems
PBX stands for Private Branch Exchange, which is a private
telephone network used within a company or organization.
The users of the PBX phone system can communicate internally
(within their company) and externally (with the outside world), using
different communication channels like Voice over IP, ISDN or
analog

Wireless communication and Mobile Computing 3-9


Wireless communication and Mobile computing

 A PBX also allows you to have more phones than physical


phone lines (PTSN) and allows free calls between users.
 Additionally, it provides features like transfer calls,
voicemail, call recording, interactive voice menus (IVRs) and
call queues.

Wireless communication and Mobile Computing 3 - 10


Wireless communication and Mobile computing

1.4. Satellite Voice Services


Satellites are playing an increasing role in establishing still
another layer of worldwide voice communications.
Two of the most widely heralded impending services are the
Iridium and Teledesic low earth orbital (LEO) systems.
These systems will offer worldwide telephone service through
the use of a small handheld telephone similar to those now used
for cellular

Wireless communication and Mobile Computing 3 - 11


Wireless communication and Mobile computing

2. Wireless Considerations for a Data Communications Strategy


A variety of services are available to support wireless data
communications.
Wireless services like Cellular Digital Packet Data, Special
Mobile Radio, Ardis Mobile Data, and RAM Mobile Data support
slightly different needs.

Wireless communication and Mobile Computing 3 - 12


Wireless communication and Mobile computing
2.1. CDPD (Cellular Digital Packet Data)
is a specification for supporting wireless access to the Internet and
other public packet-switched networks.
It supports make it possible for mobile users to get access to the
Internet at up to 19.2 Kbps with 800 and 900MHZ of data transfer.
Because CDPD is an open specification that follows to the layered
structure of OSI model.
CDPD supports both the Internet Protocol and the ISO
Connectionless Network Protocol (CLNP) and IP multicast (one-to-
many) service. Wireless communication and Mobile Computing 3 - 13
Wireless communication and Mobile computing
2.2. Specialized Mobile Radio (SMR)

 It is two way radio systems in which two or more mobile wireless


transceivers are linked by single repeater.
It operated at frequency of very high frequency (VHF) or ultra-high
frequency (UHF) with range of 30MHZ-3GHZ.
The application of specialized mobile radio is a radio dispatch for
service fleets and taxicabs.
SMR operators are assigned licenses for exclusive use of assigned
channels in a given area.
Wireless communication and Mobile Computing 3 - 14
Wireless communication and Mobile computing
3. Commercial Mobile Data Communications Services
Its is any mobile data service that is not interconnected with public
switch network.
 It provides profits
 It available to public or to switch network of eligible users as
to be effective available to public.
Such commercial mobile communication services can be:
 Nationwide transparency, seamless, roaming capabilities,
 store, forward capabilities,
 accurate message transmission
Examples of mobile communication services
 RAM mobile data
Wireless communication and Mobile Computing 3 - 15
Wireless communication and Mobile computing
3. Commercial Mobile Data Communications Services

RAM mobile data: is a joint venture between BellSouth and RAM


broadcasting and provides a two-way data communications service that
is based on the Mobiltex network architecture.

Ardis mobile services: Ardis is a joint venture between IBM and


Motorola and is composed of a formerly private corporate network.

Satellite data: Satellite systems are composed of a transmission


device that is capable of receiving a signal from a ground station.

Signal is then amplified and rebroadcast to other earth stations


Wireless communication and Mobile Computing 3 - 16
Wireless communication and Mobile computing
satellite communication system involves three basic elements:

Space segment: (comprises the satellite and its launch vehicle.)

Signal element:(comprises frequency spectrum over which satellite


communicates)

 Ground segment:(comprises the earth station, antennae, multiplexer,


and access element).

Wireless communication and Mobile Computing 3 - 17


Wireless communication and Mobile computing
 Advantages of satellite communication

 For mobile communication

 Used for co-works with microwaves

 Used for global mobile communication

 For GPS application

 For TV, Radio weather forecast

 For connecting remote areas etc.

Wireless communication and Mobile Computing 3 - 18


Wireless communication and Mobile computing

Wireless LAN (WLAN)

 WLANs are governed by the IEEE Wireless Local Area Networks


Standard Working Group Project 802.11

 The 802.11 standard establishes the components and interface


requirements for a wireless LAN.

 The 802.11committee organizes wireless LANS into basic service


areas (BSAs) and access points (APs). Multiple BSAs can be
interconnected at the APs into an extended service area (ESA).

Wireless communication and Mobile Computing 3 - 19


Wireless communication and Mobile computing

 The 802.11architecture defines two types of services:

1. Basic Services Set (BSS): it contains stationary or mobile wireless


stations and single a central base station called access point (AP).
For short range communication

2. Extend Service Set (ESS): it is created by joining two or more basic


service sets (BSS) and have two or more than two wireless access
points These extended networks are created by joining the access
points of basic services sets through a wired LAN known as
distribution system.
Wireless communication and Mobile Computing 3 - 20
Wireless communication and Mobile computing

 The IEEE 802.11 architecture defines three type of station on the


basis of their mobility in wireless LAN:

1. No-transition Mobility: These types of stations are either stationary


i.e. immovable or move only inside a BSS.

2. BSS-transition mobility: It can move from one BSS to another but


the movement is limited inside an ESS.

3. ESS-transition mobility: These types of stations can move from one


ESS to another.

Wireless communication and Mobile Computing 3 - 21


Wireless communication and Mobile computing
 Sub layers of physical layer by IEEE standard architecture
1. The Physical Layer Convergence Procedure (PLCP):

 It provides carrier sense signal called clear channel assessment.

 Its role is to add preamble and physical header

 receiver timing is synchronize with timing of the sender and the


physical header contains the address and useful information frames

2. The Physical Medium Dependent (PMD):


defines the characteristics of the wireless medium and the method used
to transmit and receive data. Handles the modulation and
coding/decoding of signals
Wireless communication and Mobile Computing 3 - 22
Wireless communication and Mobile computing

 Advantages of WLAN

 Low cost

 Easy stations

 Portable network

 Scalable network

Wireless communication and Mobile Computing 3 - 23


Wireless communication and Mobile computing
6. Wireless Communication as an alternative to fixed media

 provides the flexibility to support many permanent and temporary


moves.

the user is only required to establish a base radio, transmitters for


each terminal to be moved and line-of-sight antennas.

The Wireless Cost Advantage

It is be more cost-effective for organizations that move or change


equipment frequently

Wireless communication and Mobile Computing 3 - 24


Wireless communication and Mobile computing
7. Vendor Support for Wireless Solutions

There are different vendor approaches for supporting WLAN

 Motorola’s Altair systems use the 18–19 GHz frequency


range to support a microcellular( designed with intelligent
antenna, low power, high frequency radio)

 radio hub and the transceiver(transceivers are attached to the


terminals and communicate with hub using a line-of-sight
arrangement.

 A single hub support up to 62 transceivers


Wireless communication and Mobile Computing 3 - 25
Wireless communication and Mobile computing
7. Vendor Support for Wireless Solutions …

 LAN bridges ( point to point connecting of neighbor buildings)

 Infrared and laser technology use beam of light with very


wide bandwidth for short distance
 Immune to electric interference and more secure than radio
transmission
Wireless Applications
 telephone service market, E-Mail and information access, military,
vehicle management and rental car agencies (RAM Mobile Data and
Ardis)

Wireless communication and Mobile Computing 3 - 26


Wireless communication and Mobile computing

 What mobile Computing


- It is a technology that allows transmission of data, audio and video
via a computer any other wireless enabled devices without having
connected to fixed physical link.
- It involves … mobile communication
- … mobile hardware
- … mobile software

Wireless communication and Mobile Computing 3 - 27


Wireless communication and Mobile computing

Technology

Mobile Computing
Transmission
Involve mechanism
s
1. Mobile
communication Wireless
2. Mobile hardware communication
3. Mobile software

Wireless communication and Mobile Computing 3 - 28


Wireless communication and Mobile computing

Wireless communication and Mobile Computing 3 - 29


Wireless communication and Mobile computing

 Synonyms of mobile computing can be


 Ubiquitous computing :Interconnecting computing
devices with environmental objects
 Pervasive computing: everywhere, everyone, at any time
paradigm

Wireless communication and Mobile Computing 3 - 30


Wireless communication and Mobile computing
 Mobility classification in mobile computing:
 User mobility a user can access the same services at different
locations/ places
 Network mobility – allows the user to move from on network of
attachment to another network attachment
 Bearer mobility -allows a device to change bearers without
interruption to the user's data sessions.
 Device mobility – a device can be connected any time, anywhere
to the network
 The communication is possible even the device is moving
Wireless communication and Mobile Computing 3 - 31
Wireless communication and Mobile computing
 Session mobility
 Allows to interrupt sessions and to resume them later
possibly from another terminal or another network
 Agent mobility - have the ability to move from one
host to another in a network.

Wireless communication and Mobile Computing 3 - 32


Wireless communication and Mobile computing
 Mobile computing features

Network management system:

 Now a day, wireless networks are much more complex and may
consist of hundreds or even thousands of access points, firewalls,
switches, managed power and various other components.

Wireless communication and Mobile Computing 3 - 33


Wireless communication and Mobile computing
Mobile computing features …

Role based access control: Role based access control (RBAC) allows
you to assign roles based on what, who, where, when and how a user or
device is trying to access your network.

Mobile device management: Suppose, many mobile devices are


accessing your wireless network; now think about the thousands of
applications are running on those mobile devices.

Wireless communication and Mobile Computing 3 - 34


Wireless communication and Mobile computing

 Mobile computing features


 Roaming: allows your end-users to successfully move from one
access point to another without ever noticing a dip in a performance.
 High capacity load balancing means, when one access point is
overloaded, the system will actively shift users from one access point
to another depending on the capacity which is available
 Advantages of Mobile Communication
 Flexibility
 Speed
 Cost effectiveness
 Accessibility
 Constant connectivity
Wireless communication and Mobile Computing 3 - 35
Wireless communication and Mobile computing
Application of mobile computing

 Vehicles

 Emergency

 Business

 Credit card verification

 Replacement of wired networks

 Infotainment

Wireless communication and Mobile Computing 3 - 36


Wireless communication and Mobile computing
Limitations of Mobile Computing
 Resource constraints: Battery

 Interference: Radio transmission cannot be protected against


interference using shielding and result in higher loss rates
 Bandwidth: transmission rates are still very low for wireless devices
compared to desktop systems.
 Dynamic changes in communication environment: variations in
signal power within a region, thus link delays and connection losses
 Interoperability issues: the varying protocol standards available b/n
different regions

 Security constraints( physical damage or privacy communication )


Wireless communication and Mobile Computing 3 - 37
Wireless communication and Mobile computing
4. Safe mobile computing

Enterprises should consider mobile antivirus and firewall protection,


for all enterprise supported mobile operating systems,

The three general areas of focus for the management and security of
enterprise assets emerge:

4.1.Securing mobile devices and data

Apply strong authentication to ensure authorized access to devices,


applications and data

Wireless communication and Mobile Computing 3 - 38


Wireless communication and Mobile computing
4.Safe mobile computing…

Use antivirus software, firewall, and encryption to protect all data and
information

Issue and enforce timely updates of OS patches and virus definition


files to every device

Continuously monitor, detect, block and log new threats or any


malicious use of a device.
Manage and maintain all configuration settings and security modules
Review firewall logs for intrusions
Wireless communication and Mobile Computing 3 - 39
Wireless communication and Mobile computing
4.Safe mobile computing…

4.2. Controlling mobile access to enterprise resources

Register all mobile users on the enterprise directory servers

Authenticate all devices and mobile users prior to allowing access to


enterprise systems and resources

Apply, enforce and activate secure network protocols such as VPN,


port management, etc.

Ensure that all enterprise information is encrypted while in transit.


Wireless communication and Mobile Computing 3 - 40
Wireless communication and Mobile computing
4.Safe mobile computing…

4.3. Enabling centralized enterprise IT management of all mobile


devices

Deploy and enforce enterprise IT policies and mechanisms

Continuously monitor, manage and maintain (update) mobile devices

Perform comprehensive enterprise device and application lifecycle


management

 Remotely control and assist mobile users

Clean devices of all sensitive information if lost or decommissioned


Wireless communication and Mobile Computing 3 - 41
Wireless communication and Mobile computing
5. Determining if an organization is at risk

1. Power protection:
Using a UPS is a device that sits between an AC outlet and an
electronic device (such as a computer, server, or phone equipment) to
prevent power disturbances.
2. Computer virus
Ways to prevent computer viruses for business:
Install a reliable anti-virus.
Warn all staff members to avoid suspicious websites and not to
download untrustworthy material.
Never open email attachments without scanning them first.
Update the business’s anti-virus software regularly and install a
Wireless communication and Mobile Computing 3 - 42
Wireless communication and Mobile computing
5. General backups
It is the copying into an archive file of computer data
Used to restore the original after a data loss event
. Backups have two distinct purposes.
 to recovers data after its loss, be it by data deletion or corruption
 secondary purpose of backups is to recover data from an earlier
time, according to a user-defined data retention policy
The most common backup methods
 Full Backup
 Incremental Backup
 Differential Backup

Wireless communication and Mobile Computing - 43


Wireless communication and Mobile computing

 Data recovery centers: retrieving, inaccessible, lost, corrupted,


damaged or formatted data from secondary storage, removable media
or files
 Operating system failure, malfunction of a storage device,
logical failure of storage devices, accidental damage or
deletion, etc.
 Data transfers
 data should be secure, reliable delivery
 It is used to safeguard proprietary and personal data in transit
and at rest.
 Physical security:
 The use of multiple layers of interdependent systems which include
Wireless communication and Mobile Computing 3 - 44

CCTV surveillance, security guards, protective barriers, locks, access


End of Beginning of
Chapter 1 Chapter 2

It is End of the Chapter But, Not


the End of the Class
Wireless communication and Mobile Computing 3 - 45

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy