Вы находитесь на странице: 1из 16

A PROJECT REPORT ON Wireless Technology

Under the guidance of (Department of Computer Application)


Amrapali Institute of Management and Computer Application

Submitted To: Submitted By: Shyam Singh Department of computer Application


1

Introduction
Wireless telecommunications is the transfer of information between two or more points that are not physically connected. Distances can be short, such as a few meters for television remote control, or as far as thousands or even millions of kilometers for deep-space radio communications. It encompasses various types of fixed, mobile, and portable two-way radios, cellular telephones, personal digital assistants (PDAs), and wireless networking. Other examples of wireless technology include GPS units, Garage door openers or garage doors, wireless computer mice, keyboards and Headset (telephone/computer), headphones, radio receivers, satellite television, broadcast television and cordless telephones. Wireless operations permits services, such as long range communications, that are impossible or impractical to implement with the use of wires. The term is commonly used in the telecommunications industry to refer to telecommunications systems (e.g. radio transmitters and receivers, remote controls, computer networks, network terminals, etc.) which use some form of energy (e.g. radio frequency (RF),acoustic energy, etc.) to transfer information without the use of wires. Information is transferred in this manner over both short and long distances.

Wireless services
This section does not cite any references or sources. Please help improve this section by adding citations to reliable sources. Unsourced material may be challenged and removed.

Telemetry control and traffic control systems Infrared and ultrasonic remote control devices Modulated laser light systems for point to point communications Professional LMR (Land Mobile Radio) and SMR (Specialized Mobile Radio) typically used by business, industrial and Public Safety entities. Consumer Two way radio including FRS Family Radio Service, GMRS (General Mobile Radio Service) and Citizens band ("CB") radios. The Amateur Radio Service (Ham radio). Consumer and professional Marine VHF radios. Air band and radio navigation equipment used by aviators and air traffic control Cellular telephones and pagers: provide connectivity for portable and mobile applications, both personal and business. Global Positioning System (GPS): allows drivers of cars and trucks, captains of boats and ships, and pilots of aircraft to ascertain their location anywhere on earth.

Cordless computer peripherals: the cordless mouse is a common example; keyboards and printers can also be linked to a computer via wireless using technology such as Wireless USB or Bluetooth Cordless telephone sets: these are limited-range devices, not to be confused with cell phones. Satellite television: Is broadcast from satellites in geostationary orbit. Typical services use direct broadcast satellite to provide multiple television channels to viewers.

Wireless networks
Wireless networking (i.e. the various types of unlicensed 2.4 GHz WiFi devices) is used to meet many needs. Perhaps the most common use is to connect laptop users who travel from location to location. Another common use is for mobile networks that connect via satellite. A wireless transmission method is a logical choice to network a LAN segment that must frequently change locations. The following situations justify the use of wireless technology:

To span a distance beyond the capabilities of typical cabling, To provide a backup communications link in case of normal network failure, To link portable or temporary workstations, To overcome situations where normal cabling is difficult or financially impractical, or To remotely connect mobile users or networks.

Modes

radio frequency communication, microwave communication, for example long-range line-of-sight via highly directional antennas, or short-range communication, Infrared (IR) short-range communication, for example from consumer IR devices such as remote controls or via Infrared Data Association (IrDA).

Applications may involve point-to-point communication, point-to-multipoint communication, broadcasting, cellular networks and other wireless networks.

Cordless
The term "wireless" should not be confused with the term "cordless", which is generally used to refer to powered electrical or electronic devices that are able to operate from a portable power source (e.g. a battery pack) without any cable or cord to limit the mobility of the cordless device through a connection to the mains power supply. Some cordless devices, such as cordless telephones, are also wireless in the sense that information is transferred from the cordless telephone to the telephone's base unit via some type of wireless communications link. This has caused some disparity in the usage of the term "cordless", for example in Digital Enhanced Cordless Telecommunications.

History
Photo phone
The world's first wireless telephone conversation occurred in 1880, when Alexander Graham Bell and Charles Sumner Tainted invented and patented the photo phone, a telephone that conducted audio conversations wirelessly over modulated light beams (which are narrow projections of electromagnetic waves). In that distant era when utilities did not yet exist to provide electricity, and lasers had not even been conceived of in science fiction, there were no practical applications for their invention, which was highly limited by the availability of both sunlight and good weather. Similar to free space optical communication, the photo phone also required a clear line of sight between its transmitter and its receiver. It would be several decades before the photo phones principles found their first practical applications in military communications and later in fiber-optic communications.

Early wireless work


David E. Hughes, eight years before Hertz's experiments, transmitted radio signals over a few hundred yards by means of a clockwork keyed transmitter. As this was before Maxwell's work was understood, Hughes' contemporaries dismissed his achievement as mere "Induction". In 1885, T. A. Edison used a vibrator magnet for induction transmission. In 1888, Edison deployed a system of signaling on the Lehigh Valley Railroad. In 1891, Edison obtained the wireless patent for this method using inductance (U.S. Patent 465,971). In the history of wireless technology, the demonstration of the theory of electromagnetic waves by Heinrich Hertz in 1888 was important.[2][3] The theory of electromagnetic waves was predicted from the research of James Clerk Maxwell and Michael Faraday. Hertz demonstrated that electromagnetic waves could be transmitted and caused to travel through space at straight lines and that they were able to be received by an experimental apparatus. The experiments were not followed up by Hertz. Jag dish Chandra Bose around this time developed an early wireless detection device and helped increase the knowledge of millimeter length electromagnetic waves. Practical applications of wireless radio communication and radio remote control technology were implemented by later inventors, such as Nikola Tesla.

Radio
The term "wireless" came into public use to refer to a radio receiver or transceiver (a dual purpose receiver and transmitter device), establishing its usage in the field of wireless telegraphy early on; now the term is used to describe modern wireless connections such as in cellular networks and wireless broadband Internet. It is also used in a general sense to refer to any type of operation that is implemented without the use of wires, such as "wireless remote control" or "wireless energy transfer", regardless of the specific technology (e.g. radio, infrared, ultrasonic) used. Guglielmo Marconi and Karl Ferdinand Braun were awarded the 1909 Nobel Prize for Physics for their contribution to wireless telegraphy.

Electromagnetic spectrum
4

Light, colors, AM and FM radio and electronic devices make use of the electromagnetic spectrum. The frequencies of the radio spectrum that are available for use for communication are treated as a public resource and are regulated by national organizations such as the Federal Communications Commission in the USA, or Occam in the United Kingdom. This determines which frequency ranges can be used for what purpose and by whom. In the absence of such control or alternative arrangements such as a privatized electromagnetic spectrum, chaos might result if, for example, airlines didn't have specific frequencies to work under and an amateur radio operator were interfering with the pilot's ability to land an aircraft. Wireless communication spans the spectrum from 9 kHz to 300 GHz.

Applications of wireless technology


Mobile telephones
One of the best-known examples of wireless technology is the mobile phone, also known as a cellular phone, with more than 4.6 billion mobile cellular subscriptions worldwide as of the end of 2010. These wireless phones use radio waves to enable their users to make phone calls from many locations worldwide. They can be used within range of the mobile telephone site used to house the equipment required to transmit and receive the radio signals from these instruments.

Wireless data communications


Wireless data communications are an essential component of mobile computing. The various available technologies differ in local availability, coverage range and performance, and in some circumstances, users must be able to employ multiple connection types and switch between them. To simplify the experience for the user, connection manager software can be used, or a mobile VPN deployed to handle the multiple connections as a secure, single virtual network. Supporting technologies include: Wi-Fi is a wireless local area network that enables portable computing devices to connect easily to the Internet. Standardized as IEEE 802.11Wi-Fi approaches speeds of some types of wired Ethernet. Wi-Fi has become the de facto standard for access in private homes, within offices, and at public hotspots. Some businesses charge customers a monthly fee for service, while others have begun offering it for free in an effort to increase the sales of their goods. Cellular data service offers effective coverage within a range of 10-15 miles from the nearest cell site. Speeds have increased as technologies have evolved, from earlier technologies such as GSM, CDMA and GPRS, to 3G networks such as W-CDMA, EDGE or CDMA2000. Mobile Satellite Communications may be used where other wireless connections are unavailable, such as in largely rural areas or remote locations. Satellite communications are especially important for transportation, aviation, maritime and military use.

Wireless energy transfer


5

Wireless energy transfer is a process whereby electrical energy is transmitted from a power source to an electrical load that does not have a built-in power source, without the use of interconnecting wires.

Computer interface devices


Answering the call of customers frustrated with cord clutter, many manufactures of computer peripherals turned to wireless technology to satisfy their consumer base. Originally these units used bulky, highly limited transceivers to mediate between a computer and a keyboard and mouse, however more recent generations have used small, high quality devices, some even incorporating Bluetooth. These systems have become so ubiquitous that some users have begun complaining about a lack of wired peripherals. Wireless devices tend to have a slightly slower response time than their wired counterparts, however the gap is decreasing. Initial concerns about the security of wireless keyboards have also been addressed with the maturation of the technology

What is Wireless Application Protocol?


The Wireless Application Protocol, often abbreviated to WAP, is the open-source international standard communication environment for wireless devices. WAP is typically accessed via mobile phones or Internet-connected Personal Digital Assistants (PDAs). WAP web browsers read Wireless Markup Language (WML) web documents, which are specially programmed for use with mobile cellular devices. WAP was a huge breakthrough in mobile data technology.

1. History of WAP
o o

In 1997 the WAP Forum, now a member of the Open Mobile Alliance (OMA), planned to restructure and standardize different mobile technologies. The first version of WAP was released in 1998, outlining software for mobile Internet. In 2000, WAP Push, added to the feature list allowed WAP addresses to be transmitted across the SMS and GPRS phone networks. WAP 2.0, released in 2002, remains the de facto standard for WAP technology.

Technical WAP Protocol Suite Breakdown

There are six parts that combine to make the WAP protocol suite: Wireless Application Environment (WAE), Wireless Session Protocol (WSP), Wireless
6

Transaction Protocol (WTP), Wireless Transport Layer Security (WTLS), Wireless Datagram Protocol (WDP) and the wireless network itself.

The Success of WAP

In Europe during the late 1990's, with WAP first introduced, the mobile phone network signals were very slow and so many users did not take advantage of the technology. During the mid-2000's, however, WAP saw a resurgence in Europe, especially in the UK. The US also saw WAP suffer as cellular providers charged additionally for the WAP service and data transfer.

The Failure of WAP

WAP required a specialized programming language, WML, to display web pages, as opposed to the Internet HTML standard. Many mobile phones differed in their handling of WAP, as there were no standardized requirements or features for manufacturers to implement. There was also a lack of support from many software developers for many years.

Wireless Markup Language (WML)

Websites designed for WAP browsing are programmed using the Wireless Markup Language (WML). WML is based on, and acts very similarly to, Hypertext Markup Language (HTML), although it optimizes performance for devices with slower connections and limited screen display sizes. WML was not implemented into much web development software until the mid-2000.

Wireless Application Protocol


Wireless Application Protocol (WAP) is a technical standard for accessing information over a mobile wireless network. A WAP browser is a web browser for mobile devices such as mobile phones (called "cellular phones" in some countries) that uses the protocol. Before the introduction of WAP, mobile service providers had limited opportunities to offer interactive data services, but needed interactivity to support Internet and Web applications such as:

Email by mobile phone Tracking of stock-market prices Sports results News headlines Music downloads

Technical specifications
7

The WAP standard described a protocol suite allowing the interoperability of WAP equipment and software with different network technologies, such as GSM and IS-95 (also known as CDMA).

The bottom-most protocol in the suite, the WAP Datagram Protocol (WDP), functions as an adaptation layer that makes every data network look a bit like UDP to the upper layers by providing unreliable transport of data with two 16-bit port numbers (origin and destination). All the upper layers view WDP as one and the same protocol, which has several "technical realizations" on top of other "data bearers" such as SMS, USSD, etc. On native IP bearers such as GPRS, UMTS packet-radio service, or PPP on top of a circuit-switched data connection, WDP is in fact exactly UDP. WTLS, an optional layer, provides a public-key cryptography-based security mechanism similar to TLS. WTP provides transaction support (reliable request/response) adapted to the wireless world. WTP supports more effectively than TCP the problem of packet loss, which occurs commonly in 2G wireless technologies in most radio conditions, but is misinterpreted by TCP as network congestion. Finally, one can think of WSP initially as a compressed version of HTTP. This protocol suite allows a terminal to transmit requests that have an HTTP or HTTPS equivalent to a WAP gateway; the gateway translates requests into plain HTTP.

Wireless Application Environment (WAE)


The Wireless Application Environment (WAE) is the top most level in the Wireless Application Protocol (WAP) suite, which combines both the WWW and Mobile Telephony technologies. WAE provides the operators and service providers an interoperable environment on which they can build applications and services for handheld client devices. WAE includes the micro-browser that contains functionality for using not only WML and WML Script as previously stated, but also Wireless Telephony Application, namely WTA and WTAI -- telephony services and programming interfaces as well as content formats including well-defined data formats, images, phone book records and calendar information..

Wireless Session Protocol (WSP)


Wireless Session Protocol (WSP) is an open standard for maintaining high level session. Wireless session is nothing but a normal Web browsing session that starts when the user connects to one URL and ends when the user leaves that URL. By establishing the session means that the session wide properties need only to be defined once at the beginning of the session. This has the benefit of saving bandwidth due to the nature of the wireless communication. The session establishing process will not have lengthy hand shaking mechanisms. WSP is based on HTTP with few enhancements. WSP provides the upper-level application layer of WAP with a consistent interface for two session services. The first is a connectionoriented service that operates above a transaction layer protocol WTP and the second is a connectionless service that operates above a secure or non-secure datagram transport service. Therefore, WSP exists for two reasons. First, in the connection-mode it enhances the HTTP 1.1's performance over wireless environment. Second, it provides a session layer so the whole WAP environment resembles ISO OSI Reference Model.

Wireless transaction protocol


The Wireless Transaction Protocol (WTP), a protocol in the Wireless Application Protocol (WAP) suite, operates efficiently over either secure or non-secure wireless datagram networks. It provides three different kinds of transaction services, namely, unreliable oneway, reliable one-way and reliable two-way transactions. This layer also includes optional user-to-user reliability by triggering the confirmation of each received message. To reduce the number of messages sent, the feature of delaying acknowledgements can be

Wireless Transport Layer Security


Wireless Transport Layer Security. WTLS is the security layer of the WAP, providing privacy, data integrity and authentication for WAP services. WTLS, designed specifically for the wireless environment, is needed because the client and the server must be authenticated in order for wireless transactions to remain secure and because the connection needs to be encrypted. For example, a user making a transaction with a bank over a wireless device needs to know that the connection is secure and private and not subject to a security breach during transfer (sometimes referred to as a man-in-the-middle attack). WTLS is needed because mobile networks do not provide complete end-to-end security. WTLS is based on the widely used TLS v1.0 security layer used in Internet. Because of the nature of wireless transmissions, modifications were made to the TLS v1.0 in order to accommodate for wireless' low bandwidth, datagram connection, limited processing power and memory capacity, and cryptography exporting restrictions.

Wireless Datagram Protocol


9

Wireless Datagram Protocol defines the movement of information from receiver to the sender and resembles the User Datagram Protocol in the Internet protocol suite. The Wireless Datagram Protocol (WDP), a protocol in WAP architecture, covers the Transport Layer Protocols in the Internet model. As a general transport service, WDP offers to the upper layers an invisible interface independent of the underlying network technology used. In consequence of the interface common to transport protocols, the upper layer protocols of the WAP architecture can operate independent of the underlying wireless network. By letting only the transport layer deal with physical network-dependent issues, global interoperability can be acquired using mediating gateways

Protocol design lessons from WAP


The original WAP model provided a simple platform for access to web-like WML services and e-mail using mobile phones in Europe and the SE Asian regions. As of 2009 it continues with a considerable user base. The later versions of WAP, primarily targeting the United States market, were designed for a different requirement - to enable full web XHTML access using mobile devices with a higher specification and cost, and with a higher degree of software complexity. Considerable discussion has addressed the question whether the WAP protocol design was appropriate. Some have suggested that the bandwidth-sparing simple interface of Gopher would be a better match for mobile phones and Personal digital assistants (PDAs). The initial design of WAP specifically aimed at protocol independence across a range of different protocols (SMS, IP over PPP over a circuit switched bearer, IP over GPRS, etc.). This has led to a protocol considerably more complex than an approach directly over IP might have caused. Most controversial, especially for many from the IP side, was the design of WAP over IP. WAP's transmission layer protocol, WTP, uses its own retransmission mechanisms over UDP to attempt to solve the problem of the inadequacy of TCP over

IP Wireless System Advantages

10

11

IP Wireless Services for Small and Medium Businesses


The small to medium business (SMB) customer requires services that range from typical Internet data access to business voice services. Most small businesses today have separate voice and data access lines. Almost all SMB customers use native IP in their networks. Voice access lines are typically analog POTS lines or key telephone system (KTS) trunks. As businesses grow, they may require a digital T1 trunk for their private branch exchange (PBX). Data access is typically anything from dial to ISDN, fractional T1 Frame Relay, and potentially up to a dedicated leased line T1 service.
SMB access technologies include these: Plain Old Telephone Service (POTS)

KTS trunks Digital T1 PBX trunks Internet data access (Fast Ethernet)
12

SMB service technologies include these: Internet access (IP service) Intranet access (VPN) Voice services (VoIP) Videoconferencing Service-level agreements for guaranteed data rates

Residential access offerings include these: POTS Internet data access Residential service offerings include these: Internet access (IP service) Intranet access Voice services (VoIP) -Videoconferencing

IP Point-to-Multipoint Architecture

The point-to-multipoint (P2MP) system consists of a hub, or head end (HE), or a base station (BS),1 which serves several sectors in the cell. Each sector consists of one radio communicating with many customers. The head end is an outdoor unit, or transverter, connected to a wireless modem card inside a Cisco UBR7246 or 7223 router. At the customers premises is another transverter, which is connected to a wireless network module in a router. Cisco P2MP objectives are these: Integrated end-to-end solution (one box, one management and provisioning platform) Complete multiservice offering (Voice over IP, data, Video over IP) Scalability and flexibility (scalable head end and CPE offerings) Enabled for non-line-of-sight (substantially better coverage) Native IP packet transport Part of an overall standards-based strategy to provide many Cisco hosts and many frequency bands on a global basis The shared-bandwidth, or multipoint, product delivers 1 to 22 Mbps aggregate full-duplex, shared-bandwidth, P2MP fixed-site data in the MMDS band for both residential and small business applications, as shown in Figure 20-9.
13

The P2MP wireless router will be an integrated solution. At the base station (or head end, or hub), it will consist of a base universal router (UBR 7246 or UBR7223), a wireless modem card, an outdoor unit (ODU) for the appropriate frequency band, cables, and antenna subsystems, as shown in Figure 20-10. At the small business customer premises, the system consists of a network module in a 3600family router, with an outdoor unit (ODU) and antenna. This CPE equipment is simpler and, therefore, less expensive than the head end (HE) equipment. The 3600 family has a wide variety of interfaces to match all types of customer equipment. At the SOHO or telecommuter customer premises, the system consists of a network module in a 2600or 900-family router, with an outdoor unit (ODU) and an antenna. This CPE equipment is simpler and, therefore, less expensive than the head end (HE) equipment. The 2600 and 900 families have a wide variety of interfaces to match all types of customer equipment.

Wireless Protocol Stack


The access wireless architecture consists of a base station system that serves a community of subscriber systems. It is a point-to-multipoint architecture in the sense that the entire bandwidth on the upstream and downstream is shared among all the subscribers. The protocol stack implemented to make all this work is based on the DOCSIS standards developed by the Cable Labs consortium. The current state of the art is the version by Cisco that includes a base station end (a UBR7200 router); the subscriber end is in the 3600 or a 900 router series. The base station end and the subscriber end operate as forwarding agents and also as end systems (hosts). As forwarding agents, these systems can also operate in bridging or routing mode. The principal function of the wireless system is to transmit Internet Protocol (IP) packets transparently between the base station and the subscriber location. Certain management functions also ride on IP that include, for example, spectrum management functions and the software downloading. Both the subscriber end and the base station end of the wireless link are IP hosts on a network, as shown in Figure 20-16, and they fully support standard IP and Logical Link Control (LLC) protocols, as defined
14

by the IEEE 802 LAN/MAN Standards Committee standards. The IP and Address Resolution Protocol (ARP) protocols are supported over DIX and SNAP link layer framing. The minimum link layer minimum transmission unit (MTU) on transmit from the base station is 64 bytes; there is no such limit for the subscriber end. IEEE 802.2 support for TEST and XID messages is provided. The primary function of the wireless system is to forward packets. As such, data forwarding through the base station consists of transparent bridging or network layer forwarding such as routing and IP switching. Data forwarding through the subscriber system is link layer transparent bridging as with Layer 3 routing based on IP. Forwarding rules are similar to [ISO/IEC10038], with modifications as described in DOCSIS specifications Section 3.1.2.2 and Section 3.1.2.3. Both the base station end and the subscriber end support DOCSIS-modified spanning-tree protocols and include the capability to filter 802.1d bridge PDUs (BPDUs). The DOCSIS specification also assumes that the subscriber units will not be connected in a configuration that would create network loops. Both the base station end and the subscriber end provide full support for Internet Group Management Protocol (IGMP) multicasting. Above the network layer, the subscribers or end users can use the transparent IP capability as a bearer for higher-layer services. Use of these services will be transparent to the subscriber end and the base station end. In addition to the transport of user data, several network management and operation capabilities are supported by the base station end and the subscriber end: Simple Network Management Protocol (SNMP), [RFC-1157], for network management Trivial File Transfer Protocol (TFTP), [RFC-1350], a file transfer protocol, for downloading software and configuration information, as modified by RFC 2349, TFTP Timeout Interval and Transfer Size Options [RFC-2349] Dynamic Host Configuration Protocol (DHCP), [RFC-2131], a framework for passing configuration information to hosts on a TCP/IP network Time of Day Protocol [RFC-868], to obtain the time of day

15

16

Вам также может понравиться