Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from Term Paper:
Wireless technology has developed a large way from its infancy and is fast becoming the latest trend in communication. Wireless LANs have added an entirely new dimension to the communication sector. The advent of cellular technology, infrared and spread spectrum radio services have bought about a huge change to our world of communication and wireless technology has materialized our dream of a mobile workforce. Today there is no single standard in the industry and there are different wireless technologies available. Let us have a brief outlook of the 'IEEE 802.11' and 'Bluetooth', two of the important wireless LAN technologies.
IEEE 802.11 Protocol
The IEEE 802.11 (First adapted in 1997) is primarily a standard developed to provide time bound and asynchronous wireless services. The MAC layer is meant to handle different physical layers with distinct medium and transmission characteristics. The standard uses 2.4 GHz ISM band and a minimum data transfer rate of 1 Mbits / s. IEEE 802.11 specifies the physical and the medium access layer standards in particular to the wireless LAN's. IEEE 802.11 has seamless integration with other standards for wired networks. The Data link layer and the Logical Link layer control other aspects pertaining to different forms of the media. The MAC layer is concerned with three main tasks namely medium access, data fragmentation and encryption while the Physical layer takes care of the modulation, encoding and decoding of the signals. Let us study these two layers in a little detail.
The protocol supports three types of physical layers based on two kinds of radio and one infrared transmission. The protocol includes channel detection provision, which (CCA) is used for medium control.
Frequency Hopping Spread Spectrum
IEEE 802.11 includes Frequency hopping spread spectrum technique whereby communication on one channel of radio spectrum is transferred to another channel as data is transferred through the network. [Raymond P. Wenig, 57] Currently for a 1 Mbit data transfer a 2 level FSK (Frequency Shift Keying) is used as the standard. Each data frame in the physical layer consists of two main parts namely the physical layer convergence protocol (preamble and the header) and the payload. The PLCP is always transmitted at a standard speed of 1 Mbits/s while data part can vary from 1 Mbit/s to 2 Mbit/s. An 80-bit Synchronization pattern is used to synchronize the receivers with the transmitter once the receiver gets a line clear signal from the CCA. (Clear channel assessment signal). This is followed by a start frame delimiter (16 bits), which helps to synchronize the individual frames of data. The next part PLW (PLCP_PDU length word) contains information regarding the size of the payload. Next part of the frame is the PSF field (PCLP signaling Field), which indicates the actual data speed of the payload. (Either 1 or 2 Mbit/s). Furthermore data is scrambled using the polynomial equation s (z) = z^7 +Z^4+1. The field immediately before the actual payload is the HEC (Header Error Check) [Jochen Schiller, 171]
Direct Sequence Spread Spectrum
This is another form of spectrum wherein modulation is achieved by codes and not by frequency. Instead of the frequency shift keying the DSSS system uses the binary phase shift keying system for 1 Mbit/s data transfer and differential quadrature phase shift keying for 2 Mbit/s data transfer. Each data frame consists of seven parts with the first part being a 128 bit-synchronizing pattern followed by a 16-bit frame delimiter and an 8-bit stream indicating the data rate. (1 Mbit/s or 2 Mbit/s). The other fields are the Service, Length (length of the data or payload) and the HEC. [Jochen Schiller, 172]
The third type of transmission based on infrared light uses visible light in the range of 850 to 950 nm. The infrared transmission is of very short-range (10 m) and is primarily used for transmission within a confined area.
MAC Layer of IEEE 802.11
The MAC layer is responsible not only for medium access but also for managing power control, roaming and authentication services. In 802.11 there are three main types of medium access methods namely the CSMA/CA, a modified form of CDMA/CA with RTS and CTS, and a contention free polling method. In the CSMA / CA method if the medium is sensed busy the nodes have to wait for the longest waiting time (DIFS) before entering the contention phase. Each of the nodes wait for a random backoff time within its contention window. If a node does not have access to the medium during a particular cycle it stops its backoff timer and waits for the channel to be idle once gain. Once the channel is sensed to be idle for entire DIFS, the node starts the backoff counter again (as left from the previous cycle) and accesses the medium once the counter expires.
This way the nodes, which are waiting the longest duration enjoy high priority over other nodes, which are just entering the contention. If there is any data collision transmission is started again with a new randomly selected backoff time. Based on the collision the contention window doubles up. However the size of the contention window and access delays are interdependent and the smaller the contention window the lesser the access delays. [Daniel L. Lough]
CSMA with RTS and CTS
This is an improved form of the original CSMA / CA with special 'Request to send' and 'Clear to send' message control packets. Including these control functions improves the overall efficiency of the protocol because it eliminates the problem of hidden terminals. (A condition wherein two nodes start sending to a particular receiver without any idea about transmission state of each other leading to data collision at the receiving node). To overcome this problem each node, after waiting for the DIFS and the random backoff period, starts transmission with a RTS (request to send) signal to the intended recipient node. Actual data transmission occurs only after receiving the CTS ('Clear To Send' transmitted to all nodes within the range of the sender) from the receiver. In this way the transmission is collision free except for the possible collisions of the RTS packets.
Bluetooth (1998) was the outcome of the joint effort of five companies namely IBM, Ericsson, Intel, Nokia and Toshiba. Bluetooth represents a single chip, radio-based wireless network, which considerably reduces the cost factor involved in a typical wireless infrastructure. Bluetooth is the latest wireless technology that gives us total freedom from the system tethers associated with wired networks and infrastructure-based wireless networks. It is expected that 'Bluetooth technology' will in the near future eliminate cable connectivity and enable wireless link between the different communication gadgets such as computers, cell phones, printers, etc. By using the radio communication bluetooth technology enables communication between the different portable communication devices thereby totally eliminating the use of cables. This is made possible by embedding small radio chips called 'Bluetooth chips' inside the gadgets. This way, data which is transmitted by the blue chip in the transmitting gadget, can be deciphered back by the blue chip at the receiving gadget. [Bluetooth Solutions]
Bluetooth uses frequency band in the range of 2.4 GHZ and uses frequency hopping as well as time-division duplex scheme of data transmission. Typically a hopping rate of 1,600 hops per second is used. Bluetooth protocol uses 79 equally spaced hop carriers. Since Bluetooth devices are entirely battery dependent they cannot remain in the active transmit mode all the time. Thus each device goes into a standby mode and checks for messages periodically. (Every 1.28s). Devices listen to wake up carriers and visit the hop carriers corresponding to the wake up carrier. If there is correlation with the incoming signal the device is automatically activated. At any given time a bluetooth device can be in either the SNIFF, HOLD or the PARK states respectively. (with different levels of power consumption) [Jochen Schiller, 206]
Bluetooth uses the polling and reservation scheme of controlling the medium access within a piconet. (Devices using the same hopping sequence). In a piconet there can be only one master device and all others are slave devices. Bluetooth offers both synchronous and asynchronous wireless links. Each packet of data has three parts. The first part is the 72-bit access code, which is based on the master device identity. Since the access code is common for the particular piconet only those messages that carry the access code are accepted by the devices and the rest are just ignored. The packet header (54 bit) follows the access code and has a 3-bit MAC address. Each packet header also contains a FEC (Forward Error Correction code) which ensures data integrity.
To handle any transmission problems there is also a provision for requesting retransmission. An automatic request scheme (ARQ) makes sure that data is transmitted back if there is a negative acknowledgement from the receiver. By allowing individual devices to be part of different piconets (scatternet) at any given instance of time the overall efficiency…[continue]
"Information Technology Bluetooth And IEEE 802 11 Wireless Transmission Protocols" (2003, September 05) Retrieved October 22, 2016, from http://www.paperdue.com/essay/information-technology-bluetooth-and-ieee-152599
"Information Technology Bluetooth And IEEE 802 11 Wireless Transmission Protocols" 05 September 2003. Web.22 October. 2016. <http://www.paperdue.com/essay/information-technology-bluetooth-and-ieee-152599>
"Information Technology Bluetooth And IEEE 802 11 Wireless Transmission Protocols", 05 September 2003, Accessed.22 October. 2016, http://www.paperdue.com/essay/information-technology-bluetooth-and-ieee-152599
Bluetooth devices use encryption security and this makes the requirement of a "unique key session key to derive per-packet keys thus avoiding frequent key reuse." (Kennedy and Hunt, 2008, p.4) Kennedy and Hunt report that ZigBee is a reasonably priced low energy consumption two-way CDMA/BA-based wireless communications standard which is based on IEEE 802.15.4 which is referred to commonly as a 'Low Rate Wireless Personal Area Networks (LR-WPANs) and which
Wireless Broadband Technology Overview of Wireless technology Presently it is quite evident to come across functioning of a sort of wireless technology in the form of mobile phone, a Palm pilot, a smart phone etc. With the inception of fast connectivity in the sphere of commerce it is customary and useful to operate from central locations communicating with the remote branches, conducting conferences in remote places, discussing with every body at every
Wireless Local Area Networks The establishment of home and business networks desirous of upgrading to Wireless Local Area Network- WLAN confront with the problems of choosing from available alternatives. The vendors offer several products for sale that hovers around different wireless standards like 802.11a, 802.11b, 802.11g and Bluetooth. During the year 1997, the Institute of Electrical and Electronics Engineers -- IEEE developed the first WLAN standard. They termed it 802.11 in
(Gutierrez, Jose a; Callaway, 7) Another benefit of WSN is the minimum damage or repair. A wiring may be lost or disconnected or might break due to various reasons. This is called last meter connectivity problem. Such problems are reduced by WSN. In a WAN, it is usually called the last mile connectivity problem. Finally, WSN enables collection of recurring information from a manufacturing environment to upgrade the quality of
These aspects should be considered while designing and implementing a network to gain maximum efficiency. (Trulove, 19-20) The standard that defines the application of a WLAN is IEEE 802.11 WLAN standard. Though this is the basic standard amended ones define the additional prescriptions added to it like 802.11a or 802.11b. The capacity of a WLAN is defined by its basic compatibility. WLAN of the latest version comes with an 11
Wireless Networking Phenomenon Today's world is faced with a myriad of challenging and complex issues that require advanced technological solutions. As technology becomes increasingly user-friendly and focused on the consumer, it is evident that users have become more dependent on wireless technological devices as mechanisms that promote convenience, survival, and economic prosperity. Devices such as cellular phones, laptop computers, and personal digital assistants have become absolute essential components for many consumers
Despite its clear benefits and advantages in terms of ease of use and cost effectiveness, there are certain risks associated with wireless networking. These risks are discussed further below. Review of the Literature. Security Risks Associated with IEEE WLAN 802.11. The applications for wireless communication technology continue to develop and expand; today, at least, the 802.11b is the standard of choice for wireless router communication used with network installation (Gonazles & Higby