Professional Documents
Culture Documents
Objective
Introduction A Brief History of Wireless technology. Wired Vs Wireless Technology
Wireless Standards. Types of wireless networks. Types of technologies. Multiple Access Techniques. Wireless ad-hoc network. Mobile ad hoc network . Energy Conservation in Mobile Adhoc
INTRODUCTION
Wireless is a term used to describe communications in which electromagnetic waves are used for communication purpose
The first wireless transmitters went on the air in the early 20th century using radiotelegraphy (Morse code). Later, as modulation made it possible to transmit voices and music via wireless
demonstration by Tesla in 1893, followed by the invention of wireless telegraph by Marconi in 1896. Advances in wireless communications have led to radio, television, mobile telephones, and communication satellites Development of wireless networks: LAN, MAN, and WAN Trend continues: Voice Data Broadband Need to support mobility
Need of Wireless Technology Goes where cable and fibre cannot: The system will carry
information across geographical areas that are prohibitive in terms of distance, cost, access, or time.
wireless commonly both competes with and complements existing broadband access. Wireless technologies play a key role in extending the reach of cable, fibre, and DSL markets, and it does so quickly and reliably.
more popular over the past few years, with advancements in technology, wireless speeds are getting closer to matching those of wired and many homes and businesses are implementing them into their network.
convenience there are also many other important factors to consider when using them in place of wired networks.
oSPEED The networking of the wired networks are more faster as compared to other types of wireless networking devices because they are able to provide the speed of more then 1000 Mbps. oINSTALLATION Wired, ethernet cable must be on each computer to another computer or a central device. This often causes complications because of the length of cable required and necessary arrangements to wire the room neat. Wireless, can be configured in 2 ways o Ad hoc networks o Infrastructure mode oBoth ad hoc and infrastructure mode needs a Network adapter called WLAN cards.
RELIABILITY Due to there being no physical medium, data has to transfer through the air and must pass through any surface in its path. This means that signals can get blocked and deflected and this means your connection can suffer or even drop. Wired network fails very rarely and provide good speed and performance MOBILITY
In
wired technology it cannot provide mobile network. Difficult to lay down the cables and it looks very messy when install outside. In wireless technology it is not very much reliable only best for mobile devices such as Laptops. Not faster as compared to wired devices
COST oIn wired technology we need many expenses to setup the wired network. o Because we need large money to spread the network of coaxial cables. o As compared to other wired devices it is easy to setup the wireless networking devices at the very low and at the reliable cost.
Wireless?
network that is not connected by cables of any kind. It is a method by which homes,telecommunications networks and enterprise (business) installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. The last link with the users is wireless, to give a network connection to all users in a building or campus. The backbone of network usually uses cables.
Wireless Standards
IEEE 802.15.4 (Zigbee Alliance)
Sensors RAN
IEEE 802.22
WAN
3GPP (GPRS/UMTS) 3GPP2 (1X--/CDMA2000) GSMA, OMA
IEEE 802.20 IEEE 802.16e IEEE 802.16d WiMAX IEEE 802.11 Wi-Fi Alliance IEEE 802.15.3 UWB, Bluetooth Wi-Media, BTSIG, MBOA
ETSI HiperPAN
interconnect devices within a relatively small area, that is generally within a person's reach. For example- both Bluetooth radio and invisible infrared light provides a WPAN for interconnecting a headset to a laptop.
links two or more devices over a short distance using a wireless distribution method, usually providing a connection through an access point for Internet access. The use of spread-spectrum or OFDM technologies may allow users to move around within a local coverage area, and still remain connected to the network.
a wireless network made up of radio nodes organized in a mesh topology. Each node forwards messages on behalf of the other nodes. Mesh networks can "self heal", automatically re-routing around a node that has lost power.
wireless networks that typically cover large areas, such as between neighbouring towns and cities, or city and suburb. These networks can be used to connect branch offices of business or as a public internet access system.
Cellular network
A cellular network or mobile network is a radio network distributed over land areas called cells, each served by at least one fixed-location transceiver, known as a cell site or base station.
different set of radio frequencies from all their immediate neighbouring cells to avoid any interference. When joined together these cells provide radio coverage over a wide geographic area. This enables a large number of portable transceivers (e.g., mobile phones, pagers, etc.)
Technologies?
Cellular Technologies Wireless LAN Technology
2G system 2.5 system 3G system 4G system Next System Short range Technologies Home RF Bluetooth Zigbee
Cellular Technologies
2G system
2G (or 2-G) is short for second-generation wireless telephone technology. Second generation 2G cellular telecom networks were commercially launched on the GSM standard is launched in 1991.Three primary benefits of 2G networks over their predecessors were that phone conversations were digitally encrypted.
2G systems were significantly more efficient on the spectrum allowing for far greater mobile phone penetration levels and 2G introduced data services for mobile, starting with SMS text messages.
2.5 system
2.5G is used to describe 2G-systems that have implemented a
packet-switched domain in addition to the circuit-switched domain. It does not necessarily provide faster services because bundling of timeslots is used for circuit-switched data services (HSCSD) as well. The first major step in the evolution of GSM networks to 3G occurred with the introduction of General Packet Radio Service (GPRS).
GPRS could provide data rates from 56 kbit/s up to 115 kbit/s. It can
be used for services such as Wireless Application Protocol (WAP) access, Multimedia Messaging Service (MMS), and for Internet communication services such as email and World Wide Web access.
represent the 3rd generation of mobile telecommunications technology. Also called Tri-Band 3G. This is a set of standards used for mobile devices and mobile telecommunication services and networks that comply with the International Mobile Telecommunications-2000 (IMT-2000) specifications by the International Telecommunication Union.
access, fixed wireless Internet access, video calls and mobile TV.
mobile broadband access of several Mbit/s to smartphones and mobile modems in laptop computers.
mobile communications standards. It is a successor of the third generation (3G) standards. A 4G system provides mobile ultra-broadband Internet access, for example to laptops with USB wireless modems,to smartphones, and to other mobile devices. Conceivable applications include amended mobile web access, IP telephony, gaming services, high-definition mobile TV, video conferencing and 3D television. In Australia, Telstra launched the country's first 4G network (LTE) in September 2011 claiming "240 Mbps" speeds and announced an "aggressive" expansion of that network in 2012. In India, Bharti Airtel has launched India's first 4G service using TD-LTE technology in Kolkata on 10 April 2012. In New Zealand, the first 4G network will be introduced in December 2013.
INTRODUCTION: Wi-Fi is an alternative to Wired Technology, which is commonly used, for connecting devices in wireless mode. Wi-Fi (Wireless Fidelity) is a generic term that refers to the IEEE 802.11 communications standard for Wireless Local Area Networks (WLANs). Wi-Fi Network connect computers to each other, to the internet and to the wired network.
Cont
Wi-Fi is based on 802.11 technology It is originally intended to provide wireless computing for
staffs within businesses and commercial organisations However, residential customers adopted Wi-Fi faster than enterprises because of its simplicity, fewer concerns about security and the benefit of avoiding the expenses for cabling Its advantage is low equipment cost and easier installation Benefits were also immediately noticed for healthcare, education, retailing and warehousing
HOW WI-FI WORKS? Basic concept is same as Walkie talkies. A Wi-Fi hotspot is created by installing an access point to an internet connection. When Wi-Fi enabled device encounters a hotspot the device can then connect to that network wirelessly. Many access points can be connected to each other via Ethernet cables to create a single large network.
WIFI TOPOLOGIES AP-based topology (Infrastructure Mode) Peer-to-peer topology (Ad-hoc Mode) Point-to-multipoint bridge topology
WI-FI SECURITY THREATS Wi-Fi Is Also Having Some Security Issues Like>>Eavesdropping - Eavesdropping is the process of gathering information from a network by snooping on transmitted data. And to eavesdrop is to secretly overhear a private conversation over a confidential communication in a not legally authorized way. >>Man-in-the-middle attacks- is also known as a bucket brigade attack, or sometimes Janus attack in cryptography and computer security is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. >>Denial of Service- a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users.
WI-FI APPLICATIONS
o It
Is Most Commonly Used In Laptops And Mobiles For Internet Portability oUsed At Airport For Updating FlightTime Tables On Servers
Bluetooth is a wireless technology standard for exchanging data over short distances from fixed and mobile devices, creating personal area networks (PANs) with high levels of security. Using Bluetooth "Automatic communication between various devices within a small area in house or an office makes it possible. When you click on an icon for a device and you are linked to it, automatically and transparently
Zigbee is a specification for a suite of high level communication protocols using small, low-power digital radios based on the IEEE 802.15.4-2003 standard for wireless personal area networks (WPANs), such as wireless headphones connecting with cell phones via shortrange radio . Typical application of Zigbee areas includeHome Awareness Water sensors, power sensors, smoke and fire detectors ,smart appliances and access sensors. Mobile Services m-payment, m-monitoring and control, m-security and access control, m-healthcare. Commercial Building Energy monitoring, HVAC, lighting, access control. Industrial Plant Process control, asset management, environmental management, energy management, industrial device control.
Zigbee
802.11 - this is the network technology used in wireless LANs. In fact, it is a family of technologies such as 802.11a. 802.11b, etc., differing in speed and other attributes
ARCHITECTURE OF WLAN
o
o STATIONS
All components that can connect into a wireless medium in a network are referred to as stations
o
o o
The basic service set (BSS) is a set of all stations that can communicate with each other.
oThere
o DISTRIBUTION SYSTEM
The concept of a DS can be used to increase network coverage through roaming between cells.
points which provide a bridging function They let you stay connected as you roam from one coverage area to another They have unique security considerations They have specific interoperability requirements They require different hardware They offer performance that differs from wired LANs.
surpassed that of wired telephony industry Wireless applications span both local area and wide area for:
voice-oriented services, and data-oriented services
convenient communication infrastructure Broadband wireless networks are using Wireless LANs that are very popular.
Duplexing
Duplexing facilitates communications in both
directions simultaneously: base station to mobile and mobile to base station Duplexing is done either using frequency or time domain techniques:
Frequency division duplexing (FDD) Time division duplexing (TDD)
frequency bands or channels These channels are assigned to users on demand Multiple users cannot share a channel Users are assigned a channel as a pair of frequencies (forward and reverse channels) FDMA requires tight RF filtering to reduce adjacent channel interference
TIME
FDMA
Channel-1 Channel-2 Channel-3 Channel-4 Channel-5 Channel-6 Channel-7 Channel-8 Channel-9 FREQUENCY
slots, and in each time slot only one use is allowed to either transmit or receive Transmission for any user is non-continuous In each TDMA frame, the preamble contains the address and synchronization information TDMA shares a single carrier frequency with several users TDMA could allocate varied number of time slots per frame to different users
FREQUENCY Channel-1 Channel-2 Channel-3 Channel-4 TIME Channel-5 Channel-6 Channel-7 Channel-8 Channel-9 Channel-10
TDMA
bandwidth several orders of magnitude greater than the minimum required RF bandwidth SSMA provides immunity to multipath interference and robust multiple access capability SSMA is bandwidth efficient in multi-user environment SSMA techniques:
Frequency hopped (FH) multiple access Direct sequence (DS) multiple access It is Also known as code division multiple access (CDMA)
CDMA
bandwidth signal called spreading signal The spreading signal has a pseudo-noise code sequence that has a chip rate which is orders of magnitudes greater than the data rates of the message All users use the same carrier frequency and can transmit simultaneously Each use has its own pseudorandom codeword that is orthogonal to the others The receivers need to know the codeword of the corresponding sender Power control is used to combat the near-far problem Near-far problem: When many mobile users share the same channel, the strongest received mobile signal will capture the demodulator at a base station. Thus a nearby subscriber could overpower the basestation receiver by drowning out the signals of far away subscribers.
CDMA Features
Many users of CDMA share the same frequency either
TDD or FDD may be used CDMA has soft capacity limit system performance is inversely proportional to the number of users Multipath fading is reduced because of the signal spread Channel data rates are very high Prone to self-jamming and near-far problem
Self-jamming: when the spreading sequences of different users
undesired user has a high detected power compared to the desired user
and serves different users by using spot beam antennas Different areas covered by antenna beam may be served by same or different frequencies Reverse links present difficulty:
Transmitted power from each subscriber must be
controlled to prevent any single user from driving up the interference level Transmit power is limited by battery consumption at the subscriber unit
able to monitor the status of the channel before transmitting information Variations:
1-persistent CSMA non-persistent CSMA p-persistent CSMA CSMA/CD
IEEE 802.11
Standardization group formed in 1990, first
standards completed in 1997 IEEE 802.11 is the first WLAN standard; only one to secure a market 802.11a: PHY layer supports 11Mbps using CKK (complementary code keying) technology 802.11b: PHY layer supports 54 Mbps using OFDM Uses CSMA/CA for contention data Supports both infrastructure as well as ad hoc modes
Contention service
MAC layer
Distributed coordination function (DCF) 2.4-Ghz frequencyhopping spread spectrum 1Mbps 2Mbps 2.4-Ghz direct sequence spread spectrum 1Mbps 2Mbps Infrared 1Mbps 2Mbps 5-Ghz orthogonal FDM 6, 9. 12. 18, 24, 36, 48, 54 Mbps 2.4-Ghz direct sequence spread spectrum 5.5 Mbps 11 Mbps
IEEE 802.11
IEEE 802.11a
IEEE 802.11b
Offers productivity, convenience and cost advantages over traditional wired technology. Completes the access technology portfolios.
Goes where cable cannot. Involves reduced time to revenue. Provides broadband access extension. Greater flexibility and mobility for users.
Shorter range than wired connections. More prone to interferences. Several wireless networks can interfere with each other. More Expensive.
oDISADVANTAGES oBecause
cont
wireless transmissions can pass through walls, security is an issue. You will need to secure your private wireless network, generally by passwordrestricting the network and by using a firewall to prevent unwelcome visitors.
Wireless reception varies from area to area, even within your own apartment. It's not always guaranteed that you'll have a connection to the Internet.
o
of wireless network. The network is ad hoc because it does not rely on a pre existing infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Instead, each node participates in routing by forwarding data for other nodes, and so the determination of which nodes forward data is made dynamically based on the network connectivity. In addition to the classic routing, ad hoc networks can use flooding for forwarding the data.
Application
The decentralized nature of wireless ad hoc networks
makes them suitable for a variety of applications where central nodes can't be relied on, and may improve the scalability of wireless ad hoc networks compared to wireless managed networks, though theoretical and practical limits to the overall capacity of such networks have been identified. Wireless ad hoc networks can be further classified by their application: mobile ad hoc networks (MANET) wireless mesh networks(WMN) wireless Sensor networks(WSN)
MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a Link Layer ad hoc network.
Types of MANET
Vehicular Ad-hoc Networks (VANETs) are used for
are ad-hoc networks that link mobile nodes and fixed Internet-gateway nodes. In such type of networks normal adhoc routing algorithms don't apply directly.
The main disadvantages of such algorithms are: Advantage depends on number of Mathavan nodes activated. Reaction to traffic demand depends on gradient of traffic volume.
a communications network made up of radio nodes organized in a mesh topology. Wireless mesh networks often consist of mesh clients, mesh routers and gateways. The coverage area of the radio nodes working as a single network is sometimes called a mesh cloud. The mesh routers may be mobile, and be moved according to specific demands arising in the network. Routing protocols AODV, DSDV, OSPF, DSR.
distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. The WSN is built of "nodes. Each such sensor network node has typically several parts: a radio transceiver with an internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting.
Characteristics
Power consumption constrains for nodes using batteries or energy harvesting Ability to cope with node failures Mobility of nodes Communication failures Heterogeneity of nodes Scalability to large scale of deployment Ability to withstand harsh environmental conditions Ease of use Power consumption
Wireless Sensors
Low-power microscopic sensors with wireless communication capability Miniaturization of computer hardware Intelligence
resources in memory, computation power, bandwidth, and energy. With small physical sizeCan be embedded in the physical environment. Support powerful service in aggregated form (interacting/collaborating among nodes)
Self-organizing multi-hop ad-doc networks. Pervasive computing/sensoring
1/17/2013 cs526 WSN 68
WSN Applications
Wide area monitoring tools supporting Scientific Research
Wild life Habitat monitoring projects Great Duck Island (UCB),
James Reserve (UCLA), ZebraNet (Princeton. Building/Infrastructure structure study (Earthquake impact)
Military Applications
Shooter Localization Perimeter Defense (Oil pipeline protection) Insurgent Activity Monitoring (MicroRadar)
Commercial Applications
Light/temperature control Precision agriculture (optimize watering schedule) Asset management (tracking freight movement/storage)
Resource
Energy Conservation in Mobile Adhoc Network Energy Conservation in MANET is an important aspect of Wireless Network because the nodes are often unattended and their energy cannot be replenished. Communication in MANET can be categorised by following two ways. MULTICAST COMMUNICATION -The multicasting technique plays a major role during the transmission of the data packets from source to several client nodes and as the communication of mobile nodes is performed in the collective manner. CLUSTER BASED MULTICASTING The clustering technique takes only less connection among various zones in the network which results in the controlled access and energy expenditure and also interferences can be minimized.
Energy Conservation Technique in MANETsaving energy during active communication & saving energy during idle times in the communication.
The first targets the techniques used to support communication in an ad hoc network and is typically achieved through the use of energyefficient MAC and routing protocols. The second focuses on reducing the energy consumed when the node is idle and not participating in communication by placing the node in a low-power state.
Conclusion
Wireless or not, each technology has its advantages and
disadvantages. Wireless technologies often tend to increase convenience and decrease safety. Wired technologies are mostly used whenever reliability is of major importance. Flexibility and fault tolerance create exciting new applications for remote sensing. In future the wide range of applications will make sensor networks an integral part of our lives.
Use of Wireless technology is rapidly increasing an playing an important role in life of people. through the world very large number of people are replying on the technology directly or indirectly.
References: http://www.webopedia.com/DidYouKnow/Hardware_Software/Networking/selecting-a
wireless-network-standard.html http://www.elisa.com/on-elisa/corporate/history/radiolinjas-history/ http://www.internetnews.com/mobility/article.php/3733991/NY-Muni-Wireless-NetworkLaunch-in-Sight.htm http://www.slideshare.net/salahuddinjk/wireless-communication-adhoc-networks http://www.slideshare.net/salahuddinjk/wireless-communication-adhoc-networks Cedric Florens and Robert McEliece, Packet Distribution Algorithms for Sensor Networks, IEEE INFOCOM 2003. Samuel Madden, Robert Szewczyk, Michael J. Franklin and David Culler, Supporting Aggregate Queries Over Ad-Hoc Wireless Sensor Networks, http://en.wikipedia.org/wiki/Wireless_network http://en.wikipedia.org/wiki/Wireless_sensor_network http://www.authorstream.com/Presentation/pmashokk-539105-introduction-to-wsn