Вы находитесь на странице: 1из 16

AIM: Hardware and Software components of Mobile Computing.

THEORY: Mobile computing is a form of humancomputer interaction by which a computer is expected to be transported during normal usage. Mobile computing has three aspects: mobile communication, mobile hardware, and mobile software. The first aspect addresses communication issues in ad-hoc and infrastructure networks as well as communication properties, protocols, data formats and concrete technologies. The second aspect is on the hardware, e.g., mobile devices or device components. The third aspect deals with the characteristics and requirements of mobile applications. Devices Many types of mobile computers have been introduced since the 1990s including the:

Carputer Personal digital assistant/enterprise digital assistant Smartphone Tablet computer Ultra-Mobile PC Wearable computer

Limitations

Insufficient bandwidth: Mobile Internet access is generally slower than direct cable connections, using technologies such as GPRS and EDGE, and more recently HSDPA and HSUPA 3G networks. These networks are usually available within range of commercial cell phone towers. Higher speed wireless LANs are inexpensive but have very limited range. Security standards: When working mobile one is dependent on public networks, requiring careful use of VPN. Security is a major concern while concerning the mobile computing standards on the fleet. One can easily attack the VPN for a very huge number of networks interconnected through the line. Power consumption: When a power outlet or portable generator is not available, mobile computers must rely entirely on battery power. Combined with the compact size of many mobile devices, this often means unusually expensive batteries must be used to obtain the necessary battery life. Transmission interferences: Weather, terrain, and the range from the nearest signal point can all interfere with signal reception. Reception in tunnels, some buildings, and rural areas is often poor.

Potential health hazards: More car accidents are related to drivers who communicate with mobile devices. Cell phones may interfere with sensitive medical devices. There are allegations that cell phone signals may cause health problems. Human interface with device: Screens and keyboards tend to be small, which may make them hard to use. Alternate input methods such as speech or handwriting recognition require training.

In-vehicle computing and fleet computing Many commercial and government field forces deploy a ruggedized portable computer such as the Panasonic Toughbook or larger rack-mounted computers with their fleet of vehicles. This requires the units to be anchored to the vehicle for driver safety, device security, and ergonomics. Ruggedized computers are rated for severe vibration associated with large service vehicles and off-road driving and the harsh environmental conditions of constant professional use such as in emergency medical services, fire, and public safety.

The Compaq Portable Other elements that enables the unit to function in vehicle: Operating temperature: A vehicle cabin can often experience temperature swings from -20F to +140F. Computers typically must be able to withstand these temperatures while operating. Typical fan based cooling has stated limits of 95F-100F of ambient temperature, and temperature below freezing require localized heaters to bring components up to operating temperature(based on independent studies by the SRI Group and by Panasonic R&D). Vibration: Vehicles typically have considerable vibration that can decrease life expectancy of computer components, notably rotational storage such as HDDs. Daylight, or sunlight readability: Visibility of standard screens becomes an issue in bright sunlight. Touchscreens: These enable users to easily interact with the units in the field without removing gloves. High-temperature battery settings:. Lithium ion batteries are sensitive to high temperature conditions for charging. A computer designed for the mobile environment should be designed with a high-temperature charging function that limits the charge to 85% or less of capacity.

External wireless connections, and external GPS antenna connections: Necessary to contend with the typical metal cabins of vehicles and their impact on wireless reception, and to take advantage of much more capable external tranception equipment.

Several specialized manufacturers such as First Mobile Technologies, National Products Inc (Ram Mounts), Gamber Johnson and LedCo build mounts for vehicle mounting of computer equipment for a wide range of vehicles. The mounts are built to withstand the harsh conditions and maintain ergonomics. Specialized installation companies specialize in designing the mount design, assembling the parts, and installing them in a safe and consistent manner away from airbags, vehicle HVAC controls, and driver controls. Frequently installations will include a WWAN modem, power conditioning equipment, and WWAN/WLAN/GPS/etc. Transceiver antenna mounted external to the vehicle. Portable computing devices There are several categories of portable computing devices that can run on batteries but are not usually classified as laptops: portable computers, keyboardless tablet PCs, Internet tablets, PDAs, ultra mobile PCs (UMPCs) and smartphones.

A Nokia N800 Internet tablet A portable computer is a general-purpose computer that can be easily moved from place to place, but cannot be used while in transit, usually because it requires some "setting-up" and an AC power source. The most famous example is the Osborne 1. Portable computers are also called a "transportable" or a "luggable" PC. A tablet PC that lacks a keyboard (also known as a non-convertible tablet PC) is shaped like slate or a paper notebook, features a touchscreen with a stylus and handwriting recognition software. Tablets may not be best suited for applications requiring a physical keyboard for typing, but are otherwise capable of carrying out most tasks that an ordinary laptop would be able to perform. A personal digital assistant (PDA) is a small, usually pocket-sized, computer with limited functionality. It is intended to supplement and to synchronize with a desktop computer, giving access to contacts, address book, notes, e-mail and other features.

A Palm TX PDA A PDA with a web browser is an Internet tablet, an Internet appliance in tablet form. Unlike a tablet PC, an Internet tablet does not have much computing power and its applications suite is limited, and it cannot replace a general purpose computer. Internet tablets typically feature an MP3 and video player, a web browser, a chat application and a picture viewer. An ultra mobile PC is a full-featured, PDA-sized computer running a general-purpose operating system. A smart phone is a PDA with integrated cell phone functionality. Current smart phones have a wide range of features and installable applications. A carputer is a computing device installed in an automobile. It operates as a wireless computer, sound system, GPS, and DVD player. It also contains word processing software and is bluetooth compatible A Fly Fusion Pentop computer is a computing device the size and shape of a pen. It functions as a writing utensil, MP3 player, language translator, digital storage device, and calculator. Boundaries that separate these categories are blurry at times. For example, the OQO UMPC is also a PDA-sized tablet PC; the Apple eMate had the clamshell form factor of a laptop, but ran PDA software. The HP Omnibook line of laptops included some devices small enough to be called ultra mobile PCs. The hardware of the Nokia 770 internet tablet is essentially the same as that of a PDA such as the Zaurus 6000; the only reason it's not called a PDA is that it does not have PIM software. On the other hand, both the 770 and the Zaurus can run some desktop Linux software, usually with modifications. Mobile data communication Wireless data connections used in mobile computing take three general forms. Cellular data service uses technologies such as GSM, CDMA or GPRS, and more recently 3G networks such as W-CDMA, EDGE or CDMA2000. These networks are usually available within range of commercial cell towers. Wi-Fi connections offer higher performance, may be either on a private business network or accessed through public hotspots, and have a typical range of 100 feet indoors and up to 1000 feet outdoors. Satellite Internet access covers areas where cellular and Wi-Fi are not available and may be set up anywhere the user has a line of sight to the satellite's location, which for satellites in geostationary orbit means having an unobstructed view of the southern sky. Some enterprise deployments combine networks from multiple cellular networks or use a mix of cellular, Wi-Fi and satellite. When using a mix of networks, a mobile virtual private network (mobile VPN) not only handles the security concerns, but also performs the

multiple network logins automatically and keeps the application connections alive to prevent crashes or data loss during network transitions or coverage loss. GSM/GPRS Antenna GSM GPRS Yagi Omni Panel Antenna 2 dBi 3, 5, 10 dBi antenna China Korea Taiwan Singapore India RFID Tags gprs antenna gsm antenna booster gsm car antenna gsm gps antenna gsm external antenna gsm antenna antenna gsm enhanced data rates for enhanced data for egsm enhanced data rate for 900 1800 gsm 900 1800 1900 gsm900 dual band triple band 1800mhz dualband gsm1900 gsm1800 antenna triband 1900mhz iden800 dcs1800 tri band pcs1900 gprs gsm850 1900 egsm900 uhf antennas 1800 900 mhz umts wavecom vhf tc35 mhz gsm800 gsm+ frequenzband singleband 900 quadband 900mhz dcs

GSM Antennas

GSM, or Global System for Mobile Communication, is a system for transmitting mobile communication information. GSM uses a wide variety of antenna types. Indeed, as long as it is able to capture a GSM signal, almost any kind of antenna can potentially function as a GSM antenna. However, a few primary types of GSM antennas are in use today, and a review of these types is a good place to start in learning more about how GSM works. In general, GSM antennas must be small in size---small enough to be able to fit even inside a laptop bag. In addition, the antenna should have a gain of about 8 dBi. To operate at GSM antennas, the antenna must be able to receive both the standard and the extended GSM bands, 880 MHz (megahertz) to 960 MHz.

Directional and Omni directional

GSM antennas will be either directional or omnidirectional. Omni directional antennas, also known as helical antennas, can receive signals from any direction. Directional antennas usually have more gain, that is, more sensitivity to signal, than omnidirectional antennas. Directional antennas accomplish this greater sensitivity because they are able to focus their energy patterns onto a smaller area than omnidirectional antennas. However, to receive signal, directional antennas must be pointed in the specific direction from which the signal is emanating.

Monopole Antennas

Monopole antennas consist of a small pole placed upon a planar piece of metal or a series of wires radiated out from the pole. Monopole antennas are omnidirectional in nature and have equal gain in all directions.

Yagi-Uda Antennas

Yagi-Uda antennas, more often referred to simply as Yagi antennas, are directional antennas made up of a dipole element, a reflector dish and one or more director elements. Yagi antennas are much more complicated in design than most other types of GSM antennas.

Multiband Antennas

Multiband antennas can also be used to pick up GSM signals. They are able to pick up many sorts of different signals, including the GSM frequency, which is usually the 800 MHz or 1900 MHz bands. Multiband antennas can come in many different models. Triband

antennas can be tuned to pick up three different bands, while duoband antennas can pick up two different bands.

Base station subsystem

The hardware of GSM base station displayed in Deutsches Museum The base station subsystem (BSS) is the section of a traditional cellular telephone network which is responsible for handling traffic and signaling between a mobile phone and the network switching subsystem. The BSS carries out transcoding of speech channels, allocation of radio channels to mobile phones, paging, transmission and reception over the air interface and many other tasks related to the radio network.

Base transceiver station


The base transceiver station, or BTS, contains the equipment for transmitting and receiving radio signals (transceivers), antennas, and equipment for encrypting and decrypting communications with the base station controller (BSC). Typically a BTS for anything other than a picocell will have several transceivers (TRXs) which allow it to serve several different frequencies and different sectors of the cell (in the case of sectorised base stations). A BTS is controlled by a parent BSC via the "base station control function" (BCF). The BCF is implemented as a discrete unit or even incorporated in a TRX in compact base stations. The BCF provides an operations and maintenance (O&M) connection to the network management system (NMS), and manages operational states of each TRX, as well as software handling and alarm collection. The functions of a BTS vary depending on the cellular technology used and the cellular telephone provider. There are vendors in which the BTS is a plain transceiver which receives information from the MS (mobile station) through the Um (air interface) and then converts it to a TDM (PCM) based interface, the Abis interface, and sends it towards the BSC. There are vendors which build their BTSs so the information is preprocessed, target cell lists are

generated and even intracell handover (HO) can be fully handled. The advantage in this case is less load on the expensive Abis interface. The BTSs are equipped with radios that are able to modulate layer 1 of interface Um; for GSM 2G+ the modulation type is GMSK, while for EDGE-enabled networks it is GMSK and 8-PSK. Antenna combiners are implemented to use the same antenna for several TRXs (carriers), the more TRXs are combined the greater the combiner loss will be. Up to 8:1 combiners are found in micro and pico cells only. Frequency hopping is often used to increase overall BTS performance; this involves the rapid switching of voice traffic between TRXs in a sector. A hopping sequence is followed by the TRXs and handsets using the sector. Several hopping sequences are available, and the sequence in use for a particular cell is continually broadcast by that cell so that it is known to the handsets. A TRX transmits and receives according to the GSM standards, which specify eight TDMA timeslots per radio frequency. A TRX may lose some of this capacity as some information is required to be broadcast to handsets in the area that the BTS serves. This information allows the handsets to identify the network and gain access to it. This signaling makes use of a channel known as the Broadcast Control Channel (BCCH).

Sectorisation
By using directional antennae on a base station, each pointing in different directions, it is possible to sectorise the base station so that several different cells are served from the same location. Typically these directional antennas have a beam width of 65 to 85 degrees. This increases the traffic capacity of the base station (each frequency can carry eight voice channels) whilst not greatly increasing the interference caused to neighboring cells (in any given direction, only a small number of frequencies are being broadcast). Typically two antennas are used per sector, at spacing of ten or more wavelengths apart. This allows the operator to overcome the effects of fading due to physical phenomena such as multipath reception. Some amplification of the received signal as it leaves the antenna is often used to preserve the balance between uplink and downlink signal

Base station controller

GSM transmitter

The base station controller (BSC) provides, classically, the intelligence behind the BTSs. Typically a BSC has tens or even hundreds of BTSs under its control. The BSC handles allocation of radio channels, receives measurements from the mobile phones, and controls handovers from BTS to BTS (except in the case of an inter-BSC handover in which case control is in part the responsibility of the anchor MSC). A key function of the BSC is to act as a concentrator where many different low capacity connections to BTSs (with relatively low utilisation) become reduced to a smaller number of connections towards the mobile switching center (MSC) (with a high level of utilisation). Overall, this means that networks are often structured to have many BSCs distributed into regions near their BTSs which are then connected to large centralised MSC sites. The BSC is undoubtedly the most robust element in the BSS as it is not only a BTS controller but, for some vendors, a full switching center, as well as an SS7 node with connections to the MSC and serving GPRS support node (SGSN) (when using GPRS). It also provides all the required data to the operation support subsystem (OSS) as well as to the performance measuring centers. A BSC is often based on a distributed computing architecture, with redundancy applied to critical functional units to ensure availability in the event of fault conditions. Redundancy often extends beyond the BSC equipment itself and is commonly used in the power supplies and in the transmission equipment providing the A-ter interface to PCU. The databases for all the sites, including information such as carrier frequencies, frequency hopping lists, power reduction levels, receiving levels for cell border calculation, are stored in the BSC. This data is obtained directly from radio planning engineering which involves modelling of the signal propagation as well as traffic projections.
Transcoder

The transcoder is responsible for transcoding the voice channel coding between the coding used in the mobile network, and the coding used by the world's terrestrial circuit-switched network, the Public Switched Telephone Network. Specifically, GSM uses a regular pulse excited-long term prediction (RPE-LTP) coder for voice data between the mobile device and the BSS, but pulse code modulation (A-law or -law standardized in ITU G.711) upstream of the BSS. RPE-LPC coding results in a data rate for voice of 13 kbit/s where standard PCM coding results in 64 kbit/s. Because of this change in data rate for the same voice call, the transcoder also has a buffering function so that PCM 8-bit words can be recoded to construct GSM 20 ms traffic blocks. Although transcoding (compressing/decompressing) functionality is defined as a base station function by the relevant standards, there are several vendors which have implemented the solution outside of the BSC. Some vendors have implemented it in a stand-alone rack using a proprietary interface. In Siemens' and Nokia's architecture, the transcoder is an identifiable separate sub-system which will normally be co-located with the MSC. In some of Ericsson's systems it is integrated to the MSC rather than the BSC. The reason for these designs is that if the compression of voice channels is done at the site of the MSC, the number of fixed transmission links between the BSS and MSC can be reduced, decreasing network infrastructure costs. This subsystem is also referred to as the transcoder and rate adaptation unit (TRAU). Some networks use 32 kbit/s ADPCM on the terrestrial side of the network instead of 64 kbit/s PCM

and the TRAU converts accordingly. When the traffic is not voice but data such as fax or email, the TRAU enables its rate adaptation unit function to give compatibility between the BSS and MSC data rates.

Packet control unit


The packet control unit (PCU) is a late addition to the GSM standard. It performs some of the processing tasks of the BSC, but for packet data. The allocation of channels between voice and data is controlled by the base station, but once a channel is allocated to the PCU, the PCU takes full control over that channel. The PCU can be built into the base station, built into the BSC or even, in some proposed architectures, it can be at the SGSN site. In most of the cases, the PCU is a separate node communicating extensively with the BSC on the radio side and the SGSN on the Gb side.

BSS interfaces

Image of the GSM network, showing the BSS interfaces to the MS, NSS and GPRS Core Network Different Abbreviations: Um The air interface between the mobile station (MS) and the BTS. This interface uses LAPDm protocol for signaling, to conduct call control, measurement reporting, handover, power control, authentication, authorization, location update and so on. Traffic and signaling are sent in bursts of 0.577 ms at intervals of 4.615 ms, to form data blocks each 20 ms.

Abis The interface between the BTS and BSC. Generally carried by a DS-1, ES-1, or E1 TDM circuit. Uses TDM subchannels for traffic (TCH), LAPD protocol for BTS supervision and telecom signaling, and carries synchronization from the BSC to the BTS and MS. A The interface between the BSC and MSC. It is used for carrying traffic channels and the BSSAP user part of the SS7 stack. Although there are usually transcoding units between BSC and MSC, the signaling communication takes place between these two ending points and the transcoder unit doesn't touch the SS7 information, only the voice or CS data are transcoded or rate adapted. Ater The interface between the BSC and transcoder. It is a proprietary interface whose name depends on the vendor (for example Ater by Nokia), it carries the A interface information from the BSC leaving it untouched. Gb Connects the BSS to the SGSN in the GPRS core network.

Wireless LAN
A wireless local area network (WLAN) links two or more devices using some wireless distribution method (typically spread-spectrum or OFDM radio), and usually providing a connection through an access point to the wider internet. This gives users the mobility to move around within a local coverage area and still be connected to the network. Most modern WLANs are based on IEEE 802.11 standards, marketed under the Wi-Fi brand name. Wireless LANs have become popular in the home due to ease of installation, and the increasing to offer wireless access to their customers; often for free. Large wireless network projects are being put up in many major cities: New York City, for instance, has begun a pilot program to provide city workers in all five boroughs of the city with wireless Internet access.

Architecture
Stations

All components that can connect into a wireless medium in a network are referred to as stations. All stations are equipped with wireless network interface controllers (WNICs). Wireless stations fall into one of two categories: access points, and clients. Access points (APs), normally routers, are base stations for the wireless network. They transmit and receive radio frequencies for wireless enabled devices to communicate with. Wireless clients can be mobile devices such as laptops, personal digital assistants, IP phones and other smartphones, or fixed devices such as desktops and workstations that are equipped with a wireless network interface.
Basic service set

The basic service set (BSS) is a set of all stations that can communicate with each other. There are two types of BSS: Independent BSS (also referred to as IBSS), and infrastructure BSS. Every BSS has an identification (ID) called the BSSID, which is the MAC address of the access point

servicing the BSS. An independent BSS (IBSS) is an ad-hoc network that contains no access points, which means they cannot connect to any other basic service set. An infrastructure can communicate with other stations not in the same basic service set by communicating through access points.
Extended service set

An extended service set (ESS) is a set of connected BSSs. Access points in an ESS are connected by a distribution system. Each ESS has an ID called the SSID which is a 32-byte (maximum) character string.
Distribution system

A distribution system (DS) connects access points in an extended service set. The concept of a DS can be used to increase network coverage through roaming between cells. DS can be wired or wireless. Current wireless distribution systems are mostly based on WDS or MESH protocols, though other systems are in use.

Bluetooth
Bluetooth is a proprietary open wireless technology standard for exchanging data over short distances (using short wavelength radio transmissions in the ISM band from 2400-2480 MHz) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security. Created by telecoms vendor Ericsson in 1994, it was originally conceived as a wireless alternative to RS-232 data cables. It can connect several devices, overcoming problems of synchronization. Bluetooth is managed by the Bluetooth Special Interest Group, which has more than 14,000 member companies in the areas of telecommunication, computing, networking, and consumer electronics. The SIG oversees the development of the specification, manages the qualification program, and protects the trademarks. To be marketed as a Bluetooth device, it must be qualified to standards defined by the SIG. A network of patents are required to implement the technology and are only licensed to those qualifying devices; thus the protocol, whilst open, may be regarded as proprietary.

Mobile operating system


A mobile operating system, also known as a mobile OS, a mobile platform, or a handheld operating system, is the operating system that controls a mobile device or information appliancesimilar in principle to an operating system such as Windows, Mac OS, or Linux that controls a desktop computer or laptop. However, they are currently somewhat simpler, and deal more with the wireless versions of broadband and local connectivity, mobile multimedia formats, and different input methods. Typical examples of devices running a mobile operating system are smart phones, personal digital assistants (PDAs), tablet computers and information appliances, or what are sometimes referred to as smart devices, which may also include

embedded systems, or other mobile devices and wireless devices. Mobile Computing Software Mobile computing software is used in portable computing devices such as laptops, notebook PCs, tablet PCs, palmtops, personal digital assistant (PDAs) and other hand held devices. The software allows users to perform all the functions that are possible in a standard desktop PC connected to a LAN(local area network) or WAN(wide area network) network. It allows individual users to access the Internet, send and receive e-mails, and download electronic content. Users can work on windows word document, excel spreadsheets, and make audio/video presentations using Microsoft PowerPoint. They can draw images and write text messages in devices that use touch sensitive screens and digital pens. It can also be used to download audio files such as mp3. The software is also used in various hand held devices such as PDAs ( personal digital assistant) and pocket PCs. It is used to create business documents used by businesses worldwide. It allows manufacturer representatives to carry detailed price codes and other technical data in their pocket PCs. Healthcare professionals can use it to record patient details and lab results and transfer it to a main computer. Lawyers can use it to view codes or rules during the course of a trial. Finance professionals use it to view credit ratings and consult SEC (securities and exchange commission) regulations. A mobile computing software is designed to be used with a particular type of computing device. Users are recommended to check the compatibility of the software before making the purchase decision. They also have the option to download freeware from the Internet or order customized software to suit specific operational or professional needs. Wireless Communication As well as connecting to a home or office network with a cable, a laptop can also wirelessly connect to other computers, peripherals, cellular phones, or PDAs. Linux supports three types of wireless communication: WLAN With the largest range of these wireless technologies, WLAN is the only one suitable for the operation of large and sometimes even spatially disjointed networks. Single machines can connect with each other to form an independent wireless network or access the Internet. Devices called access points act as base stations for WLAN-enabled devices and play intermediate for access to the Internet. A mobile user can switch between various access points, depending on location and which access point is offering the best connection. Like in cellular telephony, a large network is available to WLAN users without binding them to a specific location for accessing it. Bluetooth
Bluetooth has the broadest application spectrum of all wireless technologies. It can be used for communication between computers (laptop) and PDAs or cellular phones, as can IrDA. It can also be

used to connect various computers within visible range. Bluetooth is also used to connect wireless system components, like a keyboard or mouse. The range of this technology is, however, not sufficient to connect remote systems to a network. WLAN is the technology of choice for communicating through physical obstacles like walls.

IrDA
IrDA is the wireless technology with the shortest range. Both communication parties must be within viewing distance of each other. Obstacles like walls cannot be overcome. One possible application of IrDA is the transmission of a file from a laptop to a cellular phone. The short path from the laptop to the cellular phone is then covered using IrDA. The long range transport of the file to the recipient of the file is handled by the mobile network. Another application of IrDA is the wireless transmission of printing jobs in the office.

Types of wireless LANs


Peer-to-peer

Peer-to-Peer or ad-hoc wireless LAN An ad-hoc network is a network where stations communicate only peer to peer (P2P). There is no base and no one gives permission to talk. This is accomplished using the Independent Basic Service Set (IBSS). A peer-to-peer (P2P) network allows wireless devices to directly communicate with each other. Wireless devices within range of each other can discover and communicate directly without involving central access points. This method is typically used by two computers so that they can connect to each other to form a network. If a signal strength meter is used in this situation, it may not read the strength accurately and can be misleading, because it registers the strength of the strongest signal, which may be the closest computer.

Hidden node problem: Devices A and C are both communicating with B, but are unaware of each other IEEE 802.11 defines the physical layer (PHY) and MAC (Media Access Control) layers based on CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance). The 802.11 specification includes provisions designed to minimize collisions, because two mobile units may both be in range of a common access point, but out of range of each other. The 802.11 has two basic modes of operation: Ad hoc mode enables peer-to-peer transmission between mobile units. Infrastructure mode in which mobile units communicate through an access point that serves as a bridge to a wired network infrastructure is the more common wireless LAN application the one being covered. Since wireless communication uses a more open medium for communication in comparison to wired LANs, the 802.11 designers also included shared-key encryption mechanisms: Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA, WPA2), to secure wireless computer networks. Bridge A bridge can be used to connect networks, typically of different types. A wireless Ethernet bridge allows the connection of devices on a wired Ethernet network to a wireless network. The bridge acts as the connection point to the Wireless LAN. Wireless distribution system A Wireless Distribution System enables the wireless interconnection of access points in an IEEE 802.11 network. It allows a wireless network to be expanded using multiple access points without the need for a wired backbone to link them, as is traditionally required. The notable advantage of WDS over other solutions is that it preserves the MAC addresses of client packets across links between access points. An access point can be either a main, relay or remote base station. A main base station is typically connected to the wired Ethernet. A relay base station relays data between remote base stations, wireless clients or other relay stations to either a main or another relay base

station. A remote base station accepts connections from wireless clients and passes them to relay or main stations. Connections between "clients" are made using MAC addresses rather than by specifying IP assignments. All base stations in a Wireless Distribution System must be configured to use the same radio channel, and share WEP keys or WPA keys if they are used. They can be configured to different service set identifiers. WDS also requires that every base station be configured to forward to others in the system. WDS may also be referred to as repeater mode because it appears to bridge and accept wireless clients at the same time (unlike traditional bridging). It should be noted, that throughput in this method is halved for all clients connected wirelessly. When it is difficult to connect all of the access points in a network by wires, it is also possible to put up access points as repeaters. Conclusion Thus, I have studied the various methods and processes of mobile computing. This topic deals with various topics like WLANS, Bluetooth and Infrared. It also illuminates the concept used for Mobile communications of cell phones.

Вам также может понравиться