What Is Wireless Communication
What Is Wireless Communication
Wireless Techniques:
1.1. Worldwide Voice Communications
1.1. Cellular Voice
In cellular voice the cellular radio is used as a means of supporting
local telephone service. This is used in many undeveloped countries
there is little or no infrastructure to support telephone services.
Wireless Local Loop (Fixed wireless loop)
In a telephone network a Wireless Local Loop is a generic term for
an access system that uses a wireless link to connect subscribers to
the local telephone station in place of conventional copper wire.
Wireless communication and Mobile Computing 3-7
Wireless communication and Mobile computing
The function of a WLL is access to local telephone station using
wireless link. WLL is the best system to handle high data traffic in
the local loop system
1.2. Wireless Radio
Wireless radio is being installed in place of traditional Central
Office systems that require expensive extended copper wire
external networks. Service providers are finding that wireless
radio central office systems are convenient, fast, and less costly
when compared with traditional central office switching systems.
Wireless communication and Mobile Computing 3-8
Wireless communication and Mobile computing
1.3. Wireless PBX Systems
PBX stands for Private Branch Exchange, which is a private
telephone network used within a company or organization.
The users of the PBX phone system can communicate internally
(within their company) and externally (with the outside world), using
different communication channels like Voice over IP, ISDN or
analog
Advantages of WLAN
Low cost
Easy stations
Portable network
Scalable network
Technology
Mobile Computing
Transmission
Involve mechanism
s
1. Mobile
communication Wireless
2. Mobile hardware communication
3. Mobile software
Now a day, wireless networks are much more complex and may
consist of hundreds or even thousands of access points, firewalls,
switches, managed power and various other components.
Role based access control: Role based access control (RBAC) allows
you to assign roles based on what, who, where, when and how a user or
device is trying to access your network.
Vehicles
Emergency
Business
Infotainment
The three general areas of focus for the management and security of
enterprise assets emerge:
Use antivirus software, firewall, and encryption to protect all data and
information
1. Power protection:
Using a UPS is a device that sits between an AC outlet and an
electronic device (such as a computer, server, or phone equipment) to
prevent power disturbances.
2. Computer virus
Ways to prevent computer viruses for business:
Install a reliable anti-virus.
Warn all staff members to avoid suspicious websites and not to
download untrustworthy material.
Never open email attachments without scanning them first.
Update the business’s anti-virus software regularly and install a
Wireless communication and Mobile Computing 3 - 42
Wireless communication and Mobile computing
5. General backups
It is the copying into an archive file of computer data
Used to restore the original after a data loss event
. Backups have two distinct purposes.
to recovers data after its loss, be it by data deletion or corruption
secondary purpose of backups is to recover data from an earlier
time, according to a user-defined data retention policy
The most common backup methods
Full Backup
Incremental Backup
Differential Backup