KEMBAR78
Wireless Communication and Mobile Computing | PDF | Multiplexing | Radio Spectrum
0% found this document useful (0 votes)
15 views47 pages

Wireless Communication and Mobile Computing

Mobile computing refers to the use of portable devices for accessing information and services wirelessly, relying on technologies like Wi-Fi and cellular networks. It encompasses various applications, including healthcare, e-commerce, and education, while facing challenges such as security risks and battery life limitations. The evolution of wireless communication technologies, from 1G to 5G, has significantly transformed connectivity and user experiences across multiple sectors.

Uploaded by

Gudeta Amsalu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views47 pages

Wireless Communication and Mobile Computing

Mobile computing refers to the use of portable devices for accessing information and services wirelessly, relying on technologies like Wi-Fi and cellular networks. It encompasses various applications, including healthcare, e-commerce, and education, while facing challenges such as security risks and battery life limitations. The evolution of wireless communication technologies, from 1G to 5G, has significantly transformed connectivity and user experiences across multiple sectors.

Uploaded by

Gudeta Amsalu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 47

What is Mobile Computing?

• Mobile computing involves the use of portable devices to access information and
services anytime and anywhere.
Wireless Communication
• Mobile computing relies on wireless communication technologies like Wi-Fi, cellular
networks, and Bluetooth.
Mobile Applications
• Mobile computing enables the development and use of a wide range of applications such
as social networking, e-commerce, and location-based services.
Smartphones
• Smartphones are the most common mobile devices, combining telephony, internet access,
and computing capabilities.
Tablets
• Tablets provide larger screens and more immersive experiences, making them ideal for
media consumption and productivity tasks.
Wearables
• Wearable devices like smartwatches and fitness trackers have become popular companions
for monitoring health and receiving notifications on the go.
Mobile Computing Issues and Challenges
Security
• Mobile devices face security risks like data breaches, malware, and unauthorized access,
requiring robust security measures.
Battery Life
• The limited battery life of mobile devices poses a challenge for ensuring uninterrupted
usage, leading to innovations in power management.
Connectivity
• Inconsistent network connectivity, especially in remote areas, affects mobile computing
experiences and requires efficient network protocols.
Mobile Computing Technologies
5G Networks
• The introduction of 5G networks brings faster speeds, lower latency, and support for a
larger number of connected devices
Cloud Computing
• Cloud computing enables seamless access to data and applications from multiple devices,
enhancing collaboration and scalability.
Near Field Communication (NFC)
• NFC allows contactless communication between devices, facilitating mobile payments,
ticketing, and sharing information.
Mobile Computing Applications
Healthcare
• Mobile computing plays a vital role in healthcare with applications such as telemedicine,
remote patient monitoring, and health tracking.
Travel and Navigation
• Mobile navigation apps provide real-time directions, traffic updates, and suggestions for
nearby attractions and services.
E-commerce
• Mobile e-commerce apps offer convenient shopping experiences, secure transactions, and
personalized recommendations.
Education
• Mobile apps and learning platforms enhance education by delivering interactive content,
virtual classrooms, and personalized learning experiences.
Wireless Communication and Mobile Computing
• Wireless communication and mobile computing are revolutionizing the way we connect
with each other and the world around us. In this presentation, we'll explore different types
of services, applications, importance, challenges, and more.
Types of Services
Voice Services: -The most basic form of wireless communication that uses audio signals to
transmit information.
Messaging Services: -Allows users to send and receive text, image, audio, and video messages.
Data Services: -Provides internet access, email, and other web-based services using cellular or
wireless networks
Location-Based Services: -Uses cellular and GPS technology to provide location-based
information and services.
Wireless vs Mobile
Wireless: -Refers to the transfer of information without using cables or wires. Can include data,
voice, and video transmission.
Mobile: -Refers to the ability to use wireless communication while on the go. Requires a portable
device such as a smartphone or tablet.
Applications
Healthcare: -Wireless technology is improving patient care with real-time monitoring, remote
diagnoses, and telemedicine.
Transportation: -Applications using wireless communication, such as navigation, ride-sharing,
and traffic monitoring, have transformed the way we travel.
Retail: -Mobile shopping, mobile payments, and targeted advertising are just a few examples of
how wireless technology is changing the retail industry.
Education: -Wireless technology is making education more accessible, with mobile learning,
remote lectures, and virtual classrooms.
Importance of Wireless Communication and Mobile Computing
Connectivity: -Wireless communication provides a way for people to connect with each other and
the world around them, regardless of location.
Efficiency: -Mobile computing has improved productivity and efficiency in business, education,
healthcare, and many other industries.
Accessibility: -Mobile devices and wireless networks have made technology more accessible to
everyone, including people in remote locations and those with disabilities.
Challenges
Cybersecurity: -Wireless communication and mobile computing have made us more vulnerable
to cyber threats and attacks.
Battery Life: -Mobile devices depend heavily on batteries, which can run out quickly and require
frequent charging.
Network Coverage: -Some areas may have limited or no network coverage, making it difficult to
access wireless communication and mobile computing services.
Conclusion
• Wireless communication and mobile computing have transformed the way we
communicate, connect, and work.
• While there are challenges, the benefits of wireless communication and mobile computing
are undeniable, and will continue to shape the future of technology.
Wireless Local Area Networks (WLANs)
WLAN Overview
Definition: - A wireless local area network (WLAN) is a wireless computer network that links
two or more devices using wireless communication.
Benefits: -WLANs offer mobility, flexibility, scalability, and cost savings compared to traditional
wired networks.
Challenges: -WLANs face interference, security risks, and limited range compared to wired
networks.
IEEE802.11 (WLAN) Standards
802.11a: -Supports up to 54 Mbps on the 5 GHz frequency band.
802.11b: -Supports up to 11 Mbps on the 2.4 GHz frequency band.
802.11g: -Supports up to 54 Mbps on the 2.4 GHz frequency band.
802.11n: -Supports up to 600 Mbps on both the 2.4 GHz and 5 GHz frequency bands.
HiperLAN
Definition: -HiperLAN (High Performance Radio Local Area Network) is a WLAN standard
developed by the European Telecommunications Standards Institute (ETSI).
Benefits: -Supports high data rates, better spectral efficiency, and Quality of Service (QoS)
compared to IEEE802.11.
WPAN Overview
Definition: -A wireless personal area network (WPAN) is a short-range wireless network designed
for personal or business use.
Examples: -Bluetooth, Zigbee, and NFC (Near Field Communication).
Applications: -Wearable devices, home automation, healthcare, and industrial automation.
IEEE 802.15 (WPAN) Standards
802.15.1: -Bluetooth: Supports up to 3 Mbps on the 2.4 GHz frequency band
802.15.4: -ZigBee: Supports up to 250 Kbps on the 2.4 GHz, 900 MHz, and 868 MHz frequency
bands.
802.15.6: -WBAN: Wireless body area network for healthcare applications
Wireless Sensor Networks and Zigbees
Smart Home: -Zigbee is widely used in smart home applications such as lighting, temperature
control, and security systems.
Healthcare: -Wireless sensor networks and Zigbee are used in healthcare to monitor patients and
improve treatments.
Industrial Automation: -Wireless sensor networks and Zigbee are used to monitor production
lines and control machinery in factories.
Pros of Wireless Networks
• Increased mobility and flexibility.
• Cost savings
• Scalability and ease of deployment.
Cons of Wireless Networks
• Interference and security risks.
• Limited range
• Reliable only under certain circumstances.
Wireless Local Area Networks (WLANs)
Key Benefits of WLANs
• Reduced installation and operation costs
• Increased mobility and flexibility
• No more messy cables and wires
Applications of WLANs
• Offices and Business
• Homes and Public Spaces
• Hotels and Airports
Challenges of WLANs
• Security
• Interference
• Range and Coverage
IEEE802.11 (WLAN) Standards
802.11a: -First WLAN standard to use the 5 GHz frequency band and achieve higher data rates up
to 54 Mbps, but had shorter range.
802.11b: -Uses the 2.4 GHz frequency band, has a lower data rate up to 11 Mbps, and a longer
range.
802.11g: -Shares the same frequency band as 802.11b but has higher data rates up to 54 Mbps and
better range. It's backward compatible with 802.11b.
802.11n: -Uses multiple antennas and operates in both frequency bands for higher data rates up to
600 Mbps and extended range.
HiperLAN/2: - HiperLAN is a European standard for WLANs that operates in the 5 GHz
frequency band and supports data rates up to 54 Mbps. It was designed to complement and compete
with the IEEE802.11 family of standards.
Comparison with IEEE802.11: - HiperLAN has better QoS and security features, but a shorter
range than IEEE802.11a. It's not as widely adopted, but has influenced the development of future
WLAN standards.
WPAN Overview
What is a WPAN? - A WPAN (Wireless Personal Area Network) is a short-range wireless
network that connects devices within a person's immediate environment, such as a room or a
personal space.
Examples of WPAN Devices
• Bluetooth devices
• Wireless headphones
• Smartwatches and fitness trackers
WPAN Applications
• Home automation
• Wireless charging
• Smart homes and offices
IEEE 802.15 (WPAN) Standards
802.15.1 (Bluetooth): - Designed for short-range wireless communication up to 100 meters. It
supports data rates up to 3 Mbps and is widely used in WPAN applications.
802.15.4:-Designed for low data rate, low power consumption, and low cost applications. It
operates in the 2.4 GHz and sub-GHz frequency bands and supports data rates up to 250 kbps.
802.15.6:-Designed for wireless body area networks (WBANs) and medical applications. It
operates in the 2.4 GHz and sub-GHz frequency bands and supports data rates up to 10 Mbps.
Wireless Sensor Networks and Zigbees
Wireless Sensor Networks (WSNs) are networks of small and low-powered sensor devices that
collect and transmit data wirelessly. Zigbee is a wireless protocol developed specifically for WSNs
and low-power communication. It operates on the IEEE802.15.4 standard and has a range of up to
100 meters.
Conclusion
Takeaways: -WLANs and WPANs are two major wireless technologies that are widely used in
our daily lives. Understanding their standards and applications can help us make better decisions
in deploying and using them.
Key Challenges: -Security, interference, and range are major challenges that need to be addressed
in wireless communication. Solutions such as encryption, signal filters, and multiple antennas can
help mitigate these challenges.
Cellular Networks
First Generation (1G) Cellular and Paging Networks: - Learn about the origins of cellular
networks with the first-generation (1G) systems that introduced analog voice communication and
basic paging functionality.
Second Generation (2G) Cellular Networks: - Discover the advancements of 2G networks, such
as the introduction of digital voice calls, SMS messaging, and the transition to more efficient
technologies like GSM and CDMA.
The 2.5G Cellular Networks: - Explore the evolution between 2G and 3G networks with the
introduction of 2.5G technologies like GPRS and EDGE, bringing improved data transmission
capabilities and limited internet access.
Third Generation (3G) Cellular Networks: - Dive into the world of 3G networks, which
revolutionized mobile communications by enabling high-speed data transfer, video calls, and
multimedia applications.
Fourth Generation (4G) Cellular Networks: - Uncover the capabilities of 4G networks,
providing ultra-fast internet speeds, seamless multimedia streaming, and enhanced connectivity
for mobile devices.
Overview of Fifth Generation (5G) Cellular Networks: - Get a glimpse of the future with 5G
networks, promising ultra-low latency, massive device connectivity, augmented reality
experiences, and transformative applications in various industries.
Cellular networks have revolutionized the way we communicate over the past few decades. From
1G to 5G, each generation brought significant improvements to mobile communication.
Principles of Cellular Networks
Frequency Reuse: -Cellular networks divide an area into smaller cells and reuse the same
frequencies in different cells to increase the number of conversations that can occur
simultaneously.
Handoff: -Phones are designed to switch between cells as the user moves, without interrupting the
conversation.
Control Channel: -A separate channel is used to control the allocation of channels, to set up and
terminate calls, and to transfer billing information.
First Generation (1G) Cellular and Paging Networks
Analog Technology: -The first cellular networks used analog technology to transmit voice
communication.
Paging Networks: -Pagers were the first wireless devices that allowed people to stay in touch
while on the go.
Second Generation (2G) Cellular Networks
Digital Technology: - 2G networks used digital technology which made scrambling conversations
and encryption possible, improving security and call quality.
GSM Standard: -The Global System for Mobile communication (GSM) was introduced,
guaranteeing interoperability among devices.
SMS: -Short Message Service (SMS) was developed, allowing users to exchange text messages.
The 2.5G Cellular Networks
GPRS: -General Packet Radio Service (GPRS) was introduced, enabling mobile data transfers at
faster speeds.
Multimedia Messaging Service: -Multimedia Messaging Service (MMS) was implemented,
allowing users to send and receive messages containing pictures, video clips, and audio directly
from their mobile devices.
Third Generation (3G) Cellular Networks
Enhanced Data Speeds: -3G networks provided faster data transfer rates and internet
connectivity.
Smartphones: -The introduction of Apple’s iPhone and Google’s Android operating system
revolutionized the mobile industry by adding apps, touchscreens, and a more consumer-oriented
design.
Fourth Generation (4G) Cellular Networks
Higher Data Rates: -4G networks enabled streaming of high-definition video and other
bandwidth-intensive applications.
VoLTE: -Voice over Long-Term Evolution (VoLTE) technology allowed voice calls over 4G data
networks.
WiMAX and LTE: -Worldwide Interoperability for Microwave Access (WiMAX) and Long-
Term Evolution (LTE) became the two standards for 4G mobile networks.
Overview of Fifth Generation (5G) Cellular Networks
Faster Than Ever: -5G networks will offer far faster downloads and uploads, lower latency, and
many more simultaneous connections.
Enabling New Applications: -5G will heavily impact the future of transportation, telemedicine,
education, and other sectors still beyond imagination.
High Demand for Infrastructure:-Due to 5G’s technological requirements, it demands an
increase in infrastructure density, communication towers, and fiber cables.
CHAPTER-ONE
Introduction
Introduction to Wireless Communication and Mobile Computing (WCMC)
 Communication Systems can be Wired or Wireless and the medium used for
communication can be Guided or Unguided.
 In Wired Communication, the medium is a physical path like Co-axial Cables, Twisted
Pair Cables, Optical Fiber Links, etc., which guides the signal to propagate from one
point to another. Such a type of medium is called Guided Medium.
 Wireless Communication does not require any physical medium but propagates the
signal through space.
 Since, space only allows for signal transmission without any guidance, the medium used
in Wireless Communication is called Unguided Medium.
 Even though there are no cables used in wireless communication, the transmission and
reception of signals is accomplished with Antennas.
 Antennas are electrical devices that transform electrical signals into radio signals in the
form of Electromagnetic (EM) Waves and vice versa.
 These Electromagnetic Waves propagate through space. Hence, both transmitter and
receiver consist of an antenna, which are often small, embedded pieces of hardware
within a given device.
 Wireless communication uses radio frequencies (RF) or infrared (IR) waves to
transmit data between devices on a LAN.
 For wireless LANs, a key component is the wireless hub, or access point, used for
signal distribution.
 To receive the signals from the access point, a PC or laptop must install a wireless
adapter card (wireless NIC).
 Wireless signals are electromagnetic waves that can travel through the vacuum of outer
space and through a medium such as air.
Types of Wireless Networks
What is wireless communication?
Wireless communication is a way of sending information between devices without using wires.
It is really popular because it is easy and convenient.
There are four important things that we need for wireless communication to work:
 Transmitter: A transmitter is a device that sends information, like a radio or a
smartphone. It is like a person who talks to you on the phone. They are the ones sending
the message.
 Receiver: A receiver is a device that receives information, like another radio or a
smartphone. It is like a person who listens to you on the phone. They are the ones
getting the message.
 Medium: A medium is a thing that the information travels through, like air, water, or
space. It is like the air that carries the sound waves from a person talking to you on the
phone.
 Signal: A signal is an actual information that is being sent like voice, text, video or data.
It is like the words that a person says to you on the phone.
There are different types of wireless communication that use different things to send and receive
information.
Radio communication: This type of wireless communication uses radio waves to send and
receive information. It is like a walkie-talkie.
Infrared communication: This type of wireless communication uses light waves that we
cannot see to send and receive information. It is like a TV remote control or a sensor that turns
on the lights when you walk into a room.
Bluetooth communication: This type of wireless communication uses short-range radio
waves to connect devices together. It is like when you connect your phone to a wireless speaker
or a pair of headphones.
Wi-Fi communication: This type of wireless communication uses radio waves to send and
receive information over a longer distance than Bluetooth. It is like when you connect your
computer to the internet wirelessly.
Advantages of wireless network
1) Accessibility: Wireless networks do not require any wires or cables, and hence the users
can communicate even when they are moving. It allows users to roam around without getting
disconnected.
2) Easy installation: Installing a wireless network is faster and easier compared to a wired
network. It also reduces the usage of cables that are difficult to set up and imposes the risk of
safety since the user can trip on the wires and fall. If users want to change the network, they
have to update the wireless network to meet the new configurations.
3) Wider reach: Wireless networks have a wider reach than wired networks. They can be
easily extended to places where wires and cables are not accessible.
4) Flexibility: Setting up a wireless network helps the user to do work from home easily. Due
to this network, users can work more productively and have accessibility to customer data.
5) Efficiency: Wireless networks allow improved and better communication of data. With a
wireless network, the transfer of information between users is much faster.
6) Cost-effective: Wireless networks are cost-effective since they are cheaper and easier to
install. Even though their initial investment is high, with time, the overall expenses become
lower.
Disadvantages of wireless network
1 Security: Wireless networks pose significant security threats if not installed or maintained
correctly. They require a wireless adapter, increasing hacking risk. Password protection may
worsen situations, especially if the network is not secure.
2 Limited bandwidth: Wireless networks cannot support VTC or Video Teleconferencing
since they have minimal bandwidth. The bandwidth can also get stolen by neighbors if the
network is not password protected.
3 Speed: Wireless networks have slower speeds compared to wired networks, making file
transfers and sharing slower. The speed also depends on the user’s location, with farther
distances causing slower connections, especially in large spaces or buildings.
4 Costs: Wireless networks are usually inexpensive, but the cost of installation is very high. A
wireless network may require the setting up of specific equipment, which can be costly.
Wireless Vs Mobile computing
1 The terms "mobile" and "wireless" are often used interchangeably but in reality, they are two
very different concepts applied to modern computing and technology.
2 Mobile is a word that is commonly used to describe portable devices. A mobile device is one
that is made to be taken anywhere.
3 Therefore, it needs an internal battery for power, and must be connected to a modern mobile
network that can help it to send and receive data without attaching to a hardware infrastructure.
4 Cellular networks refer to mobile networks and provide high-capacity coverage over a wide
area. Cellular connection is facilitated by cellular towers. Mobile devices use cellular signals
coming from cell towers to connect to the internet as well as communicate with other cell
phones.
5 This type of technology allows the user to make phone calls and maintain internet access
from almost anywhere, if there’s a cellular tower nearby. In addition, in order to have access
to the network, a mobile device needs to be connected through a cellular provider.
Applications of Wireless Communication:
 1 Satellite system
 2 Television remote control
 3 Wi-Fi
 4 Paging system
 5 Wi-Max 6 Security systems
 7 Cellphones
 8 Computer interface devices
 9 Bluetooth
 10 GPS
 11 Accessing the internet etc.

Chapter Two
Mobile Computing
Mobile Computing
Mobile Computing is a technology that allows transmission of data, voice, and video via a
computer or any other wireless-enabled device without having to be connected to a fixed
physical link. The main concept involves
 Mobile communication
 Mobile hardware
 Mobile Software
Mobile communication
The mobile communication in this case, refers to the infrastructure put in place to ensure
that seamless and reliable communication goes on.
These would include devices such as protocols, services, bandwidth, and portals necessary
to facilitate and support the stated services. The data format is also defined at this stage.
This ensures that there is no collision with other existing systems which offer the same
service.
Since the media is unguided/unbounded, the overlaying infrastructure is basically radio
wave-oriented.
That is, the signals are carried over the air to intended devices that are capable of receiving
and sending similar kinds of signals.
Mobile Hardware
1 Mobile hardware includes mobile devices or device components that receive or access
the service of mobility.
2 They would range from portable laptops, smartphones; tablet Pc’s, Personal Digital
Assistants.
These devices will have a receptor medium that is capable of sensing and receiving signals.
These devices are configured to operate in full duplex, whereby they are capable of sending
and receiving signals at the same time. They do not have to wait until one device has
finished communicating for the other device to initiate communications.
Mobile software
Mobile software is the actual program that runs on the mobile hardware. It deals with the
characteristics and requirements of mobile applications. This is the engine of the mobile
device. In other terms, it is the operating system of the appliance. It is the essential
component that operates the mobile device.
Since portability is the main factor, this type of computing ensures that users are not tied
or pinned to a single physical location, but are able to operate from anywhere. It
incorporates all aspects of wireless communications
Mobile devices and mobile operating systems
There are a large number of smartphones and tablets on the market, each having a given
operating system and it is produced by a given manufacturer.
We live in the years when the number of mobile phones overcomes the number of desktop
and laptop computers, and the difference is still growing (Google is reporting that there are
more searches from mobile now than from desktops).
Mobile Computing Issues and Challenges
Mobile computing faces several issues and challenges that can impact its performance, usability,
and security. Here are some common challenges in mobile computing:
1. Limited Resources: Mobile devices have limited processing power, storage capacity, and
battery life compared to traditional computers. This constraint can affect the execution of resource-
intensive applications and limit the overall user experience.
2. Network Connectivity: Mobile devices heavily rely on wireless networks to access data and
services. However, network connectivity can be inconsistent or unavailable in certain areas,
leading to interrupted or slow data transmission. This issue can hinder the real-time functionality
of mobile applications.
3. Device Fragmentation: There is a wide variety of mobile devices with different screen sizes,
resolutions, operating systems, and hardware capabilities. Developing applications that are
compatible with this fragmented ecosystem can be challenging for developers, as they need to
ensure consistent user experience across diverse devices.
4. Security and Privacy: Mobile devices are vulnerable to various security threats, including
malware, data breaches, and unauthorized access. The small form factor and mobility of these
devices make them prone to loss or theft, potentially exposing sensitive information. Protecting
mobile devices and data requires robust security measures, such as encryption, authentication, and
secure app development practices.
5. User Interface Design: Mobile applications need to provide an intuitive and user-friendly
interface given the limited screen size and input options. Designing effective interfaces for mobile
devices can be challenging, as developers must prioritize essential features and optimize the user
experience within the constrained space.
6. Data Synchronization: Mobile users often need access to the same data across multiple
devices, such as smartphones, tablets, and desktops. Ensuring seamless data synchronization and
consistency across various platforms can be complex, especially when dealing with offline data
access and conflicts arising from simultaneous updates.
Mobile computing technologies
Mobile computing technologies encompass a range of hardware and software components that
enable the use of computing devices while on the move. Here are some key mobile computing
technologies:
1. Mobile Devices: Mobile devices, including smartphones, tablets, wearables, and portable
computing devices, are equipped with processors, memory, storage, and sensors, enabling users to
perform various tasks on the go.
2. Operating Systems: Mobile operating systems (OS), like Android, iOS, and Windows Mobile,
are software platforms designed for mobile devices, offering touchscreen features, mobile
connectivity, and app ecosystems.
3. Wireless Communication: Mobile computing relies on wireless communication technologies
like cellular networks, Wi-Fi, Bluetooth, and NFC for connecting devices to networks and the
internet.
4. Mobile Applications: Mobile applications, or apps, are software programs designed for mobile
devices, offering various functionalities like productivity tools, social networking, entertainment,
and e-commerce, available from specific app stores.
5. Mobile Web: Mobile web technologies enable users to access content and services through
mobile browsers, using HTML5, CSS, and JavaScript to design responsive websites.
6. Location-Based Services (LBS): Mobile devices often have GPS or other location
technologies, enabling location-based services to provide location-specific content, navigation,
mapping, and location-aware advertising.
7. Cloud Computing: Cloud computing enhances mobile computing by providing storage,
processing power, and services over the internet, allowing devices to access cloud-based
applications, data storage, and computational resources.
Mobile computing technologies
Mobile computing applications cover a wide range of functionalities and purposes. Here are some
common categories of mobile computing applications:
Communication and Social Networking: Mobile communication apps enable voice and video
calls, text messages, group chats, and social networking, while social networking apps allow users
to connect, share updates, and engage in online communities.
Productivity and Organization: Mobile productivity apps, including calendars, to-do lists, note-
taking tools, email clients, document editors, and project management applications, help users
manage their tasks, schedules, and information effectively.
Entertainment and Media: Mobile devices offer a variety of entertainment and media
applications, including music streaming, gaming, e-book readers, podcast players, and news
aggregators, providing on-demand content access.
Navigation and Mapping: Mobile navigation apps use GPS and mapping technologies to provide
real-time directions, traffic updates, and location-based services, aiding users in finding routes,
discovering nearby points, and navigating unfamiliar areas.
E-commerce and Mobile Payments: Mobile e-commerce applications enable users to shop, shop,
and make purchases from online retailers, while mobile payment apps provide secure and
convenient transactions.
Health and Fitness: Mobile health and fitness apps assist users in tracking physical activities,
monitoring health metrics, providing workout routines, and offering diet and nutrition guidance to
maintain a healthy lifestyle.
Travel and Booking: Mobile travel apps help users plan and book travel arrangements, including
flights, hotels, car rentals, and activities, providing travel information, reviews, and
recommendations to enhance the travel experience.
Education and Learning: Mobile education apps provide access to educational resources, online
courses, language learning tools, and interactive study materials for learning and skill
development.
Augmented Reality (AR) and Virtual Reality (VR): AR and VR applications leverage mobile
devices’ capabilities to overlay digital content onto the real world or create immersive virtual
environments. These apps offer interactive experiences in areas such as gaming, education,
training, and visualization.
Internet of Things (IoT) Control: Mobile apps can serve as interfaces to control and monitor IoT
devices, such as smart home appliances, security systems, wearable devices, and connected
vehicles. These apps enable users to manage and interact with their IoT-enabled devices remotely.
Chapter Three
1. Wireless networks are a type of computer network that allows devices to connect and
communicate without the need for physical wired connections. They use wireless
communication technologies such as radio waves or infrared signals to transmit data
between devices. Here are some fundamental principles of wireless networks:
• Radio Waves: Wireless networks use radio waves to transmit and receive data. Radio
waves are a type of electromagnetic radiation that can travel through the air. Devices in a
wireless network, such as routers and mobile devices, have antennas that send and receive
radio signals.
• Frequency Bands: Wireless networks operate within specific frequency bands allocated
by regulatory bodies. These frequency bands determine the range and capacity of the
wireless network. Common frequency bands used for wireless communication include 2.4
GHz and 5 GHz.
• Access Points: In a wireless network, access points (APs) act as central hubs that enable
devices to connect and communicate. Access points transmit and receive data between
wireless devices and wired networks. They are typically connected to a wired network
infrastructure and provide a bridge between the wired and wireless environments.
• SSID: The Service Set Identifier (SSID) is a unique name given to a wireless network. It
allows devices to identify and connect to a specific wireless network. When connecting to
a wireless network, devices scan for available SSIDs and choose the one they want to
connect to.
• Authentication and Encryption: Wireless networks use authentication and encryption
mechanisms to ensure secure communication. Authentication verifies the identity of
devices attempting to connect to the network, while encryption ensures that data
transmitted over the wireless network is protected from unauthorized access.
• Signal Strength and Range: The performance of a wireless network depends on signal
strength and range. Signal strength refers to the power of the radio signal transmitted by
the access point and received by the devices. Range refers to the distance over which the
wireless signal can effectively reach devices.
• Interference: Wireless networks can be susceptible to interference from other devices or
environmental factors. Interference can degrade the performance and reliability of a
wireless network. Common sources of interference include other wireless networks,
microwave ovens, cordless phones, and physical obstructions.
• Bandwidth and Throughput: Bandwidth refers to the maximum amount of data that can
be transmitted over a wireless network in a given time period. Throughput, on the other
hand, refers to the actual data transfer rate achieved by devices on the network. Factors
such as network congestion, signal quality, and interference can affect the actual
throughput experienced by users.
• Standards: Wireless networks adhere to various standards that define the protocols and
technologies used for wireless communication. Examples of wireless standards include
Wi-Fi (802.11), Bluetooth, and cellular network standards like 3G, 4G/LTE, and 5G.
• Network Topologies: Wireless networks can be deployed in different topologies, such as
point-to-point, point-to-multipoint, or mesh networks. The network topology determines
how devices are connected and how data flows within the network.
Wireless basics
• Wireless technology is used in many types of communication.
• We use it for networking because it is cheaper and more flexible than running cables.
• While wireless networks can be just as fast and powerful as wired networks, they do have
some drawbacks.
• Wireless signals, wireless devices, Wi-Fi modes, Wi-Fi signals, power and receiver
sensitivity and antennas are some of the concepts to be considered in wireless networking.
• Wireless signal- Wireless signals are important because they can transfer information –
audio, video, our voices, data – without the use of wires, and that makes them very useful.
• Wireless signals are electromagnetic waves travelling through the air
• These are formed when electric energy travels through a piece of metal, for example a wire
or antenna and waves are formed around that piece of metal. These waves can travel some
distance depending on the strength of that energy.
Frequency allocation and Regulation
• Frequency allocation is also called spectrum allocation. Spectrum allocation is the process
of regulating the use of the electromagnetic spectrum and dividing it among various and
sometimes competing organizations and interests.
• This ensures that there is little competition when using a specific frequency band, which
can cause interference if the same frequency band is used for different and unregulated
purposes. This regulation is controlled by various governmental and international
organizations.
• Spectrum allocation came to be because of the emerging and convergence of wireless
telecommunications technology which created huge demands on the radio frequency
spectrum for various services such as high-speed data transfer and communication.
Spectrum allocation is done to prevent major interference and chaos in the airwaves, which
would serve no one at all.
• Some standardization organizations working on spectrum allocation and regulation:
o European Conference of Postal and Telecommunications Administrations (CEPT)
o International Telecommunication Union (ITU)
o Inter-American Telecommunication Commission (CITEL)
Types of spectrum allocation
• No one may transmit: -Spectrum band is reserved for a specific use such as radio
astronomy so that there is no interference with radio telescopes.
• Anyone may transmit: -As long as transmission power limits are respected
• Only licensed users/organizations of the specific band may transmit: -Examples are
cellular and television spectrums as well as amateur radio frequency allocations
Antenna
• An antenna an antenna is a device used in the field of telecommunications and radio
technology to transmit and receive electromagnetic waves. It is typically a metallic
structure or arrangement of conductive elements that convert electrical signals into
electromagnetic waves (transmitting antenna) or convert electromagnetic waves into
electrical signals (receiving antenna).
• Antennas are essential components in various communication systems, including radio and
television broadcasting, wireless networks, satellite communication, radar systems, and
mobile devices. They serve the purpose of efficiently radiating or capturing
electromagnetic energy in the form of radio waves, microwaves, or other frequencies
depending on the application.
• Several varying types of antennas exist for Wi-Fi, each with a specific purpose for how
and when they should be used.
• Different types of antennas can be found anywhere from small office settings to outdoor
camping grounds. While there are many types of antennas, all of them have the same
purpose: producing radio waves to send information through the air.
• The three main antenna types are omnidirectional, semi-directional, and highly directional.
Omnidirectional
• 1.Omnidirectional antennas: -An omnidirectional antenna radiates and receives
electromagnetic waves equally in all directions. It provides a 360-degree horizontal
coverage pattern, resembling a doughnut shape. Omnidirectional antennas are commonly
used in applications where signals need to be transmitted or received from multiple
directions, such as in cellular base stations, Wi-Fi routers, and broadcast antennas.
• 2. Semi directional -A semi-directional antenna concentrates its radiation pattern in a
specific range or sector, providing coverage over a limited angular area. It offers a wider
coverage area than a highly directional antenna but with some degree of directionality.
Semi-directional antennas are often used in point-to-point communication links, where the
target devices are located within a particular sector or region.
• 3.Highly-directional: -A highly directional antenna, also known as a high-gain antenna,
concentrates its radiation pattern in a narrow beam, providing focused and long-range
communication. These antennas have a narrow beam width and high gain, allowing for
extended coverage in a specific direction. Highly directional antennas are commonly used
in applications such as long-distance point-to-point communication, satellite
communication, and radar systems.
Signal Propagation
• Signal propagation refers to the way electromagnetic waves, such as radio waves,
propagate or travel through a medium or space. Understanding signal propagation is
essential for designing and optimizing wireless communication systems.
• Here are some key concepts related to signal propagation:
o Line of Sight (LOS): In ideal conditions, when there are no obstacles between the
transmitter and receiver, the signal can travel in a straight line, known as the line of
sight (LOS) path. LOS propagation typically provides the strongest and most
reliable signal strength.
o Obstructions: Obstacles such as buildings, trees, hills, or other physical structures
can obstruct the direct line of sight between the transmitter and receiver. These
obstructions can block or attenuate the signal, resulting in signal loss, reduced
signal strength, and potential signal reflections.
o Reflection: When a signal encounters an obstacle, it can bounce off the surface and
change its direction. This is known as reflection. Reflected signals can reach the
receiver through indirect paths, resulting in multipath propagation. Multipath
propagation can cause interference and signal fading.
o Scattering: Scattering happens when a signal encounters small objects or irregular
surfaces. The signal is scattered in different directions, resulting in multiple signal
paths. Scattering can cause signal fading and affect the overall signal strength and
quality.
o Absorption: Signal absorption occurs when the energy of the signal is absorbed by
the medium or objects it passes through. Different materials and frequencies have
varying levels of absorption. For example, water and human bodies tend to absorb
signals at certain frequencies, such as microwave frequencies.
o Signal Attenuation: Attenuation refers to the reduction of signal strength as it
propagates through a medium or space. Attenuation can occur due to factors like
distance, free space loss, absorption, scattering, and obstacles. The signal strength
decreases with increasing distance from the transmitter.
o Signal Fading: Signal fading refers to the variation or fluctuations in signal
strength that occur over time due to interference, multipath propagation, or other
factors. Fading can cause temporary signal loss or degradation, impacting the
reliability and quality of wireless communication.
o Signal Propagation Models: Mathematical models and algorithms are used to
predict signal propagation characteristics in different environments. Models such
as the free space path loss model, two-ray ground reflection model, and log-distance
path loss model help estimate signal strength, coverage areas, and link budgets for
wireless systems.
o Antenna Characteristics: Antenna properties, such as gain, radiation pattern, and
polarization, can affect signal propagation. The choice of antenna type, placement,
and orientation can influence signal coverage, range, and quality.
o Understanding signal propagation helps in optimizing wireless system
performance, designing network layouts, selecting appropriate frequencies, and
mitigating issues like interference and signal degradation. It is crucial for planning
and deploying wireless communication systems in various environments, such as
urban areas, indoor spaces, or rural settings.
Multiplexing
• Multiplexing is a technique used in telecommunications and data transmission to combine
multiple signals or data streams into a single transmission medium. The purpose of
multiplexing is to efficiently utilize the available bandwidth and maximize the capacity of
the transmission medium.
• Here are some common multiplexing techniques:
o Frequency Division Multiplexing (FDM): FDM divides the available frequency
spectrum into multiple non-overlapping frequency bands. Each input signal is
modulated onto a different carrier frequency within its allocated frequency band.
The modulated signals are then combined for transmission over the same physical
medium. At the receiving end, the individual signals are demodulated and separated
using band pass filters.
o Time Division Multiplexing (TDM): TDM divides the transmission time into
discrete time slots. Each input signal is allocated a specific time slot within a
recurring time frame. The signals are then interleaved and transmitted one after
another. At the receiving end, the signals are de multiplexed by separating them
based on the assigned time slots. TDM is commonly used in applications like digital
telephony.
o Wavelength Division Multiplexing (WDM): WDM is used in optical fiber
communication systems. It combines multiple optical signals, each transmitted
using a different wavelength of light, onto a single optical fiber. WDM enables the
simultaneous transmission of multiple data streams over the same fiber, greatly
increasing the capacity of optical networks. WDM can be further classified into
Dense Wavelength Division Multiplexing (DWDM) and Coarse Wavelength
Division Multiplexing (CWDM) based on the spacing between wavelengths.
o Code Division Multiplexing (CDM): CDM is a multiplexing technique commonly
used in spread spectrum communication systems, such as CDMA (Code Division
Multiple Access). In CDM, each user is assigned a unique code sequence. The
user’s data stream is multiplied by the assigned code sequence, spreading the signal
over a wider bandwidth. Multiple users’ spread signals are then combined and
transmitted simultaneously. At the receiving end, the signals are despread using the
corresponding code sequences to recover the original data streams.
o Orthogonal Frequency Division Multiplexing (OFDM): OFDM is a
multiplexing technique widely used in modern wireless communication systems,
including Wi-Fi, 4G LTE, and 5G. It divides the available frequency spectrum into
multiple narrow subcarriers, which are orthogonal to each other, meaning they do
not interfere with one another. Each subcarrier is modulated with data, and the
modulated subcarriers are combined for transmission. OFDM provides high
spectral efficiency, robustness against channel impairments, and resistance to
multipath fading.
o Multiplexing techniques enable multiple signals or data streams to share the same
transmission medium, increasing efficiency and capacity. Different multiplexing
methods are suitable for different applications, depending on factors such as the
type of medium, available bandwidth, and the nature of the signals being
multiplexed.
Modulation
• Modulation is the process of modifying a carrier signal to encode information or data for
transmission over a communication channel. It involves varying one or more properties of
the carrier signal in response to the input information. Modulation allows the efficient
transmission of data over different types of communication systems, such as wireless
networks, fiber optics, and broadcasting.
• Here are some key concepts related to modulation:
o Carrier Signal: The carrier signal is a high-frequency waveform that carries the
modulated information. It serves as the foundation for transmitting the data. The
carrier signal typically has a fixed frequency and amplitude.
o Modulating Signal: The modulating signal contains the information or data that
needs to be transmitted. It can be an analog signal, such as voice or music, or a
digital signal that represents data bits.
o Amplitude Modulation (AM): In amplitude modulation, the amplitude of the
carrier signal is varied in proportion to the amplitude of the modulating signal. The
modulating signal impacts the height or intensity of the carrier signal, allowing the
encoded information to be transmitted. AM is commonly used in broadcast radio.
o Frequency Modulation (FM): Frequency modulation involves varying the
frequency of the carrier signal in response to the modulating signal. The modulating
signal affects the deviation or change in frequency, resulting in a varying pitch or
tone. FM is widely used in FM radio broadcasting and two-way communication
systems.
o Phase Modulation (PM): Phase modulation involves changing the phase of the
carrier signal based on the modulating signal. The modulating signal affects the
timing or position of the carrier signal’s waveform. Phase modulation is commonly
used in digital communication systems, such as satellite communication and
wireless networks.
o Digital Modulation: In digital modulation, the modulating signal represents
discrete digital data, typically in the form of binary bits. Various modulation
schemes are used to encode the digital information onto the carrier signal, such as
Binary Phase Shift Keying (BPSK), Quadrature Phase Shift Keying (QPSK), and
Quadrature Amplitude Modulation (QAM). Digital modulation is used in
applications like wireless communication, satellite communication, and digital
broadcasting.
o Analog Modulation: Analog modulation is used for transmitting analog signals,
such as voice or music. It encompasses modulation techniques like amplitude
modulation (AM), frequency modulation (FM), and phase modulation (PM).
Analog modulation is commonly used in broadcast radio, television, and analog
telephony.
o Modulation Index: The modulation index is a parameter that describes the extent
of modulation applied to the carrier signal. It indicates the ratio of the maximum
change in the carrier signal’s property (amplitude, frequency, or phase) to the
amplitude of the modulating signal. The modulation index affects the quality and
characteristics of the modulated signal.
o Demodulation: Demodulation is the reverse process of modulation. It involves
extracting the original modulating signal from the modulated carrier signal at the
receiver end. Demodulation techniques are used to recover the encoded
information, enabling the receiver to interpret and reproduce the original data or
signal.
Media Access Control (MAC)
• Media Access Control (MAC) is a sublayer of the data link layer in the OSI model
responsible for managing access to shared communication media, such as Ethernet
networks. The MAC layer provides protocols and mechanisms to control how devices on
a network share the available bandwidth and communicate with each other.
• Here are some key concepts related to MAC:
o MAC Address: Each network interface card (NIC) or Ethernet device is assigned
a unique identifier called a MAC address. It is a globally unique identifier assigned
by the manufacturer. MAC addresses are typically represented as a series of
hexadecimal digits and are used to identify devices on a network.
o Carrier Sense Multiple Access with Collision Detection (CSMA/CD):
CSMA/CD is a protocol used in Ethernet networks to manage access to the shared
communication medium (usually a coaxial or twisted-pair cable). Before
transmitting, a device listens to the medium to check if it is idle. If it detects the
medium is busy, it waits until it is idle before transmitting. If multiple devices
transmit simultaneously and a collision occurs, CSMA/CD detects the collision and
initiates a back off algorithm to resolve it.
o Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA):
CSMA/CA is a protocol used in wireless networks, such as Wi-Fi, to avoid
collisions in the absence of a reliable collision detection mechanism. Before
transmitting, a device performs a clear channel assessment (CCA) to check if the
wireless channel is busy. If the channel is idle, the device waits for a random period
of time before transmitting. CSMA/CA helps reduce collisions by introducing a
mechanism to avoid simultaneous transmissions.
o Token Passing: Token passing is a MAC protocol used in Token Ring networks.
In this protocol, a special control frame called a token is passed sequentially from
one device to another around the network. Only the device possessing the token has
the right to transmit data. After transmitting its data, the device passes the token to
the next device in the ring.
o Medium Access Control Protocols: Various MAC protocols exist to handle media
access in different network environments. Examples include Ethernet (IEEE
802.3), Wi-Fi (IEEE 802.11), Token Ring (IEEE 802.5), and Bluetooth (IEEE
802.15.1). Each protocol has its own set of rules and mechanisms to manage access
to the shared medium efficiently.
o MAC Layer Addressing: The MAC layer addresses devices using their MAC
addresses. In Ethernet networks, the source and destination MAC addresses are
included in the MAC header of the Ethernet frame. Devices use these addresses to
identify the intended recipient of the frame.
o MAC Frame Format: MAC protocols define a specific frame format for data
transmission. The frame typically consists of a preamble, destination and source
MAC addresses, length or type information, data payload, and error checking (e.g.,
CRC). The frame structure ensures proper transmission and reception of data
between devices.
o MAC Layer Services: The MAC layer provides services to the higher layers of the
network stack, such as the network layer. These services include frame transmission
and reception, error detection, flow control, and synchronization with the physical
layer
Classifications of wireless networks
1. Wireless networks can be classified based on various factors such as their coverage area,
network architecture, or the purpose they serve.
Here are some common classifications of wireless networks:
• Personal Area Network (PAN): A PAN is a wireless network designed for
personal use. It typically covers a small area, such as a room or personal workspace.
Bluetooth is a popular technology used for PANs, allowing devices like
smartphones, laptops, and peripherals to connect and communicate wirelessly.
• Local Area Network (LAN): A LAN is a wireless network that covers a relatively
small geographical area, such as a home, office building, or campus. Wireless
LANs (WLANs) are commonly implemented using Wi-Fi technology. WLANs
enable devices to connect to a local network and access shared resources, such as
printers, file servers, and internet connectivity.
• Metropolitan Area Network (MAN): A MAN is a wireless network that covers a
larger geographical area, typically spanning a city or metropolitan region. WiMAX
(Worldwide Interoperability for Microwave Access) is a technology commonly
used for MANs, providing wireless broadband connectivity over extended areas.
• Wide Area Network (WAN): A WAN is a wireless network that covers a wide
geographical area, often spanning multiple cities, regions, or countries. Cellular
networks, such as 3G, 4G LTE, and 5G, are examples of wireless WANs. These
networks provide mobile connectivity, allowing users to access data and services
while on the move.
• Internet of Things (IoT) Network: An IoT network connects a large number of
physical devices, objects, and sensors, allowing them to exchange data and interact
with each other. IoT networks can be based on different wireless technologies,
including Wi-Fi, Bluetooth, Zigbee, and cellular networks. They enable various
applications such as smart homes, industrial automation, healthcare monitoring,
and asset tracking.
• Satellite Network: A satellite network uses satellites in space to provide wireless
connectivity over a large area, including remote or inaccessible locations. Satellite
networks are often used for long-distance communication, global positioning
systems (GPS), satellite television, and internet access in remote areas
CHAPTER-FOUR
Wireless Local Area Networks (WLANs
WLAN Overview
WLAN stands for Wireless Local Area Network.
It is a type of network that allows devices to connect and communicate wirelessly within a limited
geographic area, such as a home, office, or campus.
WLANs are commonly used for providing wireless internet access and enabling device-to-device
communication. Here’s an overview of key aspects and components of a WLAN:
 Wireless Clients: Wireless clients are the devices that connect to the WLAN, such as
laptops, smartphones, tablets, or IoT devices. These devices use wireless network
adapters to communicate with the access points.
 Wireless Standards: WLANs operate based on specific wireless standards, such as the
IEEE 802.11 family of standards. These standards define the protocols and specifications
for wireless communication, including data transfer rates, frequency bands, and security
mechanisms. Notable standards include 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac,
and 802.11ax (also known as Wi-Fi 6).
 Frequency Bands: WLANs operate in different frequency bands, including 2.4 GHz and
5 GHz. The 2.4 GHz band offers broader coverage but may be more susceptible to
interference, while the 5 GHz band provides higher data transfer rates but has shorter
range limitations.
 Security: WLANs employ various security mechanisms to protect the network and the
data transmitted over it. Common security protocols include Wired Equivalent Privacy
(WEP), Wi-Fi Protected Access (WPA), and WPA2/WPA3, which provide encryption
and authentication methods to secure the wireless communication.
 Roaming: Roaming is the ability of a wireless client to maintain connectivity while
moving between different access points in the WLAN. It allows devices to seamlessly
switch from one access point to another without losing network connectivity.
 WLAN Management: WLANs often have management systems or controllers that
oversee the network’s operation, configuration, and security. These systems help monitor
and control access points, enforce security policies, and optimize network performance.
Summary of WLAN Overview
 WLANs have become widely prevalent, providing flexible and convenient wireless
connectivity for various applications. They are commonly used in homes, businesses,
educational institutions, and public spaces to enable wireless internet access, support
mobile devices, and facilitate IoT deployments.
IEEE802.11 (WLAN) Standards
The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of standards
known as IEEE 802.11, which define the specifications for wireless local area networks (WLANs)
and Wi-Fi. Each standard within the 802.11 family provides different capabilities and
improvements over its predecessors.
Here is an overview of some of the key IEEE 802.11 standards:
 802.11a: Released in 1999, 802.11a operates in the 5 GHz frequency band and provides
higher data transfer rates compared to previous standards. It supports a maximum data
rate of up to 54 Mbps but has a shorter range compared to 2.4 GHz standards.
 802.11b: Introduced in 1999, 802.11b operates in the 2.4 GHz frequency band and offers
a maximum data rate of up to 11 Mbps. It has a longer range than 802.11a but provides
slower data transfer speeds.
 802.11g: Released in 2003, 802.11g operates in the 2.4 GHz frequency band and
combines the best features of 802.11a and 802.11b. It offers data rates of up to 54 Mbps
and is backward-compatible with 802.11b devices.
 802.11n: Introduced in 2009, 802.11n operates in both the 2.4 GHz and 5 GHz frequency
bands. It brought significant improvements in data rates, range, and reliability compared
to previous standards. 802.11n supports multiple-input multiple-output (MIMO)
technology, enabling the use of multiple antennas for improved performance. It offers
data rates up to 600 Mbps.
 802.11ac: Released in 2013, 802.11ac operates in the 5 GHz frequency band and is
designed to provide higher speeds and increased capacity compared to 802.11n. It
introduces wider channel bandwidths, advanced modulation techniques, and support for
multi-user MIMO. 802.11ac can achieve data rates exceeding 1 Gbps.
 802.11ax (Wi-Fi 6): Introduced in 2019, 802.11ax operates in both the 2.4 GHz and 5
GHz frequency bands. It is designed to improve network efficiency, performance, and
capacity in high-density environments. 802.11ax supports features like orthogonal
frequency-division multiple access (OFDMA), target wake time (TWT), and improved
multi-user MIMO. It offers higher data rates and reduced latency compared to previous
standards.
These are some of the prominent IEEE 802.11 standards that have been developed over the years.
Each standard builds upon the previous ones, introducing new features and improvements to
enhance wireless network performance, throughput, and reliability.
Hiper LAN
Hiper LAN (High-Performance Radio Local Area Network) is a set of wireless communication
standards developed by the European Telecommunications Standards Institute (ETSI). HiperLAN
standards were created to provide high-speed wireless connectivity for local area networks (LANs)
and were designed to operate in the 5 GHz frequency band.
There are two main versions of HiperLAN:
 HiperLAN/1: This was the first version of the HiperLAN standard, published in 1996.
HiperLAN/1 aimed to provide wireless connectivity with data rates of up to 24 Mbps. It
used frequency-hopping spread spectrum (FHSS) and time-division duplex (TDD)
techniques to enable communication between devices.
 HiperLAN/2: Published in 1999, HiperLAN/2 is an enhanced version of the HiperLAN
standard. It was designed to offer higher data rates and improved performance compared
to HiperLAN/1. HiperLAN/2 supports both frequency-division duplex (FDD) and TDD
modes and utilizes orthogonal frequency-division multiplexing (OFDM) modulation.
It provides data rates of up to 54 Mbps, making it comparable to the IEEE 802.11a and
802.11g standards.
 While HiperLAN/1 and HiperLAN/2 were developed as wireless LAN standards, they
did not gain widespread adoption and were eventually superseded by the IEEE 802.11
standards (such as 802.11a and 802.11g) in many applications.
The IEEE 802.11 standards became more widely adopted globally, offering
interoperability and a broader range of products.
It’s important to note that HiperLAN and HiperLAN/2 are not commonly used today, and
the focus of wireless LAN technology has shifted to the widely adopted IEEE 802.11
standards, such as 802.11n, 802.11ac, and 802.11ax (Wi-Fi 6 and Wi-Fi 6E).
WPAN Overview
WPAN stands for Wireless Personal Area Network. It refers to a type of wireless network that
allows devices to communicate with each other over short distances, typically within a person’s
personal space. WPANs are designed for low-power, low-range communication between devices
such as smartphones, laptops, tablets, wearables, and IoT devices. Here’s an overview of WPAN
technology:
 Zigbee: Zigbee is a low-power wireless communication protocol designed for WPANs. It
operates in the 2.4 GHz frequency band and is commonly used in home automation,
industrial applications, and sensor networks.
Zigbee offers low data rates and is optimized for low-power consumption, making it
suitable for applications that require long battery life and reliable communication.
 Z-Wave: Z-Wave is another wireless communication protocol used in WPANs. It
operates in the sub-GHz frequency range (typically 868 MHz or 908 MHz) and is
designed for home automation and smart devices.
 Near Field Communication (NFC): NFC is a short-range wireless technology used for
contactless communication between devices. It operates at very close proximity (within a
few centimeters) and is commonly used for mobile payment systems, access control, and
data transfer between devices by simply tapping or bringing them close together.
 Wireless USB: Wireless USB is a WPAN technology that enables high-speed wireless
data transfer between devices, similar to traditional wired USB connections. It operates in
the 3.1 to 10.6 GHz frequency range and supports data rates of up to 480 Mbps. Wireless
USB allows devices like printers, external storage, and peripherals to connect wirelessly
to a computer.
 WPANs are typically used for personal and localized communication needs, focusing on
short-range connectivity between devices in close proximity. They provide convenient
wireless connectivity for personal devices, home automation systems, IoT applications,
and other scenarios where low-power, short-range communication is required.
IEEE 802.15 (WPAN) Standards
 The IEEE 802.15 standards family addresses Wireless Personal Area Networks
(WPANs) and includes several specifications for short-range wireless communication.
These standards define protocols and specifications for various applications and devices
within a personal area network. Here is an overview of some key IEEE 802.15 standards:
 IEEE 802.15.1 (Bluetooth): This standard is commonly known as Bluetooth. It specifies
a wireless communication protocol for short-range connectivity between devices.
Bluetooth operates in the 2.4 GHz frequency band and provides reliable and secure
wireless connections for various applications, including data transfer, audio streaming,
and device pairing.
 IEEE 802.15.3 (High-Rate WPAN): This standard defines a high-rate WPAN for
applications that require high-speed data transfer. It operates in the 2.4 GHz frequency
band and supports data rates up to 55 Mbps. IEEE 802.15.3 is suitable for multimedia
streaming, wireless docking, and other applications that require high-bandwidth
communication.
 IEEE 802.15.4 (Low-Rate WPAN): This standard focuses on low-power, low-data-rate
communication for devices with limited energy resources. IEEE 802.15.4 serves as the
foundation for various WPAN protocols, including Zigbee and Wireless HART. It
operates in the 2.4 GHz or sub-GHz frequency bands and provides a range of up to
several tens of meters. IEEE 802.15.4 is commonly used in applications such as home
automation, industrial sensing, and wireless sensor networks (WSNs).
 IEEE 802.15.4a (UWB): This standard utilizes Ultra-Wideband (UWB) technology for
short-range, high-bandwidth communication. It offers precise ranging and positioning
capabilities, making it suitable for applications like real-time location systems (RTLS)
and high-accuracy tracking
 IEEE 802.15.4e (Time-Slotted Channel Hopping): This standard introduces time-
slotted channel hopping (TSCH) to IEEE 802.15.4 networks. TSCH enables deterministic
communication and improved reliability by dividing time into slots and hopping between
channels. It is especially useful in industrial and mission-critical applications that require
predictable and reliable communication.
 IEEE 802.15.4g (Smart Utility Networks): This standard is specifically designed for
smart utility networks, such as smart grid applications. It focuses on reliable and secure
communication in harsh environments and supports long-range communication using
sub-GHz frequency bands.
 These are some of the main IEEE 802.15 standards that define wireless communication
protocols for WPANs. Each standard addresses different requirements and use cases,
enabling various applications and devices to communicate wirelessly within a personal
area network.
Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are networks comprised of numerous small, low-power
sensor nodes that communicate with each other wirelessly.
These networks are designed to monitor and collect data from the surrounding environment, such
as temperature, humidity, pressure, light, and other environmental parameters. WSNs have gained
significant attention and are used in various applications, including environmental monitoring,
industrial automation, healthcare, agriculture, and smart cities.
Here are some key characteristics and components of Wireless Sensor Networks:
 Sensor Nodes: Sensor nodes are the fundamental building blocks of WSNs. Each node
consists of sensing capabilities, processing capabilities, wireless communication
capabilities, and a power source. The nodes are typically small, low-cost, and energy-
constrained devices.
 Wireless Communication: Sensor nodes communicate with each other using wireless
communication protocols, such as IEEE 802.15.4 (based on the IEEE 802.15.4 standard)
or other custom protocols. These protocols enable efficient and reliable communication
between sensor nodes and the base station or other nodes in the network.
 Base Station: The base station acts as a gateway or central node in the WSN. It collects
data from the sensor nodes, performs data processing, and may provide connectivity to
external networks or systems. The base station is responsible for coordinating the
network, managing communication, and aggregating data from the sensor nodes.
 Data Aggregation and Processing: In WSNs, data collected by sensor nodes is often
aggregated and processed locally to reduce energy consumption and network traffic.
Aggregation techniques allow the network to transmit summarized or aggregated data
instead of transmitting raw sensor data, thus optimizing energy efficiency and bandwidth
utilization.
 Energy Efficiency: Energy efficiency is a critical consideration in WSNs since sensor
nodes are typically battery-powered and have limited energy resources. To prolong
network lifetime, various techniques are employed, such as duty cycling (turning off
nodes during idle periods), data aggregation, and energy-aware routing protocols.
 Self-Organization and Adaptability: WSNs are often deployed in dynamic and
changing environments. As a result, self-organization and adaptability are crucial
features. Sensor nodes may need to self-configure, self-optimize, and dynamically adapt
their behavior to changing conditions, network topology, or application requirements.
 Security and Privacy: WSNs may handle sensitive data, making security and privacy
essential considerations. Measures such as encryption, authentication, and secure routing
protocols are employed to protect data confidentiality, integrity, and authenticity.
 Wireless Sensor Networks offer numerous benefits, including scalability, flexibility, and
cost-effectiveness, making them suitable for a wide range of applications. They enable
real-time monitoring, data collection, and analysis, contributing to improved decision-
making, resource optimization, and automation in various domains.
CHAPTER-FIVE
Cellular Networks
Principles of Cellular Networks
Cellular networks are a type of wireless network that divide a geographic area into smaller cells,
each with its own base station. This allows for more efficient use of the radio spectrum and
increased capacity.
The basic principles of cellular networks are as follows:
 Frequency reuse: Different cells are assigned different frequencies, which allows them
to reuse the same frequencies without interfering with each other.
 Handoff: As a mobile user moves from one cell to another, their call is handed off to the
base station of the new cell. This ensures that the call remains uninterrupted.
 Channel coding: Channel coding is used to protect data from errors caused by
interference and other factors.
 Power control: Power control is used to adjust the power of the transmitted signal so that
it is just strong enough to reach the base station, but not so strong that it interferes with
other cells.
 Error correction: Error correction is used to correct errors that occur in the transmitted
data.
These principles allow cellular networks to provide a reliable and efficient way to communicate
over wireless networks.
First Generation (1G) Cellular and Paging Networks
First-generation (1G) cellular networks were the first commercially available mobile phone
networks. They were analog systems that used frequency-division multiple access (FDMA) to
allow multiple users to share the same radio spectrum. 1G networks were introduced in the 1980s
and were widely used until the late 1990s, when they were superseded by second-generation (2G)
digital networks.
Characteristics of 1G Networks
 Analog technology: 1G networks were analog systems, which means that they
transmitted voice signals as continuous waves. This made them susceptible to
interference and noise, and it also limited the amount of data that they could transmit.
 Frequency-division multiple access (FDMA): 1G networks used FDMA to allow
multiple users to share the same radio spectrum. This was done by dividing the spectrum
into a number of channels, and each user was assigned a unique channel to use.
 Limited capacity: 1G networks had a limited capacity due to their analog technology
and their use of FDMA. This meant that they could only support a small number of users,
and they often became congested in areas with a lot of traffic.
 Low data rates: 1G networks could only transmit data at very low rates. For example,
the Advanced Mobile Phone System (AMPS), which was the most widely used 1G
network in the United States, could only transmit data at 2.4 kbps.
 Voice-only service: 1G networks were designed for voice-only service. This means that
they could not be used to transmit data, such as text messages or email.
 Large and expensive handsets: 1G handsets were large and expensive, and they had a
limited battery life.
 Limited security: 1G networks were not very secure, and their calls were susceptible to
eavesdropping.
Limitations of 1G Networks
 Limited capacity due to analog technology
 Poor call quality due to interference
 Limited security
 Lack of data services
Transition to 2G Networks
 1G networks were eventually replaced by 2G digital networks, which offered several
advantages over 1G networks, including:
 Increased capacity due to digital technology
 Improved call quality due to error correction
 Enhanced security
 Ability to support data services
 2G networks ushered in a new era of mobile communications and paved the way for the
development of 3G, 4G, and 5G networks.
Second Generation (2G) Cellular Networks
Second-generation (2G) cellular networks are a group of standards for second-generation mobile
telephony. These standards were developed in the early 1990s and were the first to offer digital
voice and data services. 2G networks are still in use today in many parts of the world, but they are
being phased out in favor of newer technologies such as 3G and 4G.
 The most popular second generation standards include three TDMA standards and one
CDMA standard:
a) Global System Mobile (GSM), which supports eight time slotted users for each
200 kHz radio channel
b) Interim Standard 136 (IS-136), also known as North American Digital Cellular
(NADC), which supports three time slotted users for each 30 kHz radio channel.
c) Pacific Digital Cellular (PDC), a Japanese TDMA standard that is similar to IS-
136 with more than 50 million users;
d) the popular 2G CDMA standard Interim Standard 95 Code Division Multiple
Access (IS-95), also known as cdmaOne, which supports up to 64 users that are
orthogonaly coded and simultaneously transmitted on each 1.25 MHz channel.
2G networks offer a variety of services, including:
 Voice calls
 SMS (Short Message Service) text messaging
 Circuit-switched data services at rates of up to 14.4 kbps
 GPRS (General Packet Radio Service) data services at rates of up to 114 kbps
2G networks are relatively slow and inefficient compared to newer technologies, but they are still
widely used because they are reliable and inexpensive. 2G networks are also well-suited for voice
calls, which are still the most popular mobile phone service.
The 2.5G Cellular Networks
2.5G cellular networks are a collection of technologies that were developed in the late 1990s to
improve the performance of 2G networks. These technologies include:
 High-Speed Circuit Switched Data (HSCSD): This technology allows multiple time
slots to be bundled together, providing data rates of up to 14.4 kbps.
 General Packet Radio Service (GPRS): This technology uses packet-switching to
provide data rates of up to 114 kbps.
 Enhanced Data for GSM Evolution (EDGE): This technology uses a modulation
scheme that can squeeze more data into the same frequency band, providing data rates of
up to 384 kbps.
2.5G networks were a significant improvement over 2G networks, and they provided the
foundation for the development of 3G networks.
However, 2.5G networks are still relatively slow compared to newer technologies, and they are
being phased out in favor of 3G and 4G networks.
Here is a summary of the key differences between 2G, 2.5G, and 3G networks:
 2G networks are the slowest and least advanced type of cellular network. They are still
widely used for voice calls and SMS, but they are being phased out in favor of newer
technologies.
 2.5G networks are an improvement over 2G networks, but they are still relatively slow.
They are also being phased out in favor of newer technologies.
 3G networks are much faster than 2G and 2.5G networks. They offer a wider range of
services, such as video calls and mobile broadband. 3G networks are still in use today,
but they are being phased out in favor of 4G networks.

Third Generation (3G) Cellular Networks


Third-generation (3G) cellular networks are a group of standards for third-generation mobile
telephony, defined by the International Telecommunication Union (ITU) as the IMT-2000
(International Mobile Telecommunications 2000) standard.
3G networks were designed to provide more efficient use of the radio spectrum, higher data rates,
and support for new services such as mobile broadband, video calls, and mobile multimedia.
Key Features of 3G Networks
 Increased Data Rates: 3G networks offer peak data rates of up to 2 Mbps, compared to
14.4 kbps for 2G networks. This allows for faster data transmission and download speeds.
 Improved Spectrum Efficiency: 3G networks use a technique called Wideband Code
Division Multiple Access (WCDMA) to divide the radio spectrum into multiple channels,
allowing more users to share the same frequency band without interfering with each
other.
 Support for New Services: 3G networks support a wider range of services than 2G
networks, including mobile broadband, video calls, and mobile multimedia.

Common 3G Standards
 Universal Mobile Telecommunications System (UMTS): UMTS is the most widely
used 3G standard in Europe and Asia.
 CDMA2000 1xEV-DO(Code Division Multiple Access 2000 1x Evolution-Data
Optimized): CDMA2000 1xEV-DO is a popular 3G standard in the United States.
 WCDMA(Wideband Code Division Multiple Access): WCDMA is a 3G standard that
is used in some parts of the world, including Japan.
Deployment of 3G Networks
 3G networks have been deployed in most parts of the world, and they are still in use
today. However, 3G networks are being phased out in favor of 4G and 5G networks,
which offer even faster data rates and more advanced features.
Here is a table that summarizes the key features of 3G networks:

Applications of 3G Networks
 Mobile Broadband: 3G networks are commonly used for mobile broadband, providing
internet access to mobile devices such as smartphones and tablets.
 Video Calls: 3G networks can support video calls, allowing users to see each other while
talking on the phone.
 Mobile Multimedia: 3G networks can support mobile multimedia, including
downloading music, videos, and games to mobile devices.
Deployment of 3G Networks 3G networks have been deployed in most parts of the world, and they
are still in use today. However, 3G networks are being phased out in favor of 4G and 5G networks,
which offer even faster data rates and more advanced features.
Fourth Generation (4G) Cellular Networks
Fourth-generation (4G) cellular networks are a group of standards for fourth-generation mobile
telecommunications, defined by the International Telecommunication Union (ITU) as the IMT-
Advanced (International Mobile Telecommunications Advanced) standard. 4G networks were
designed to provide even faster data rates, lower latency, and support for more users than 3G
networks.
Key Features of 4G Networks
 Increased Data Rates: 4G networks offer peak data rates of up to 100 Mbps, compared
to 2 Mbps for 3G networks. This allows for even faster data transmission and download
speeds.
 Reduced Latency: 4G networks have lower latency than 3G networks, meaning that
there is less of a delay between when data is sent and when it is received. This is
important for real-time applications such as video conferencing and online gaming.
 Support for More Users: 4G networks can support more users than 3G networks,
without sacrificing performance. This is due to the use of more advanced technologies
such as MIMO (Multiple-Input Multiple-Output) and OFDM (Orthogonal Frequency-
Division Multiplexing).
Common 4G Standards
 Long Term Evolution (LTE): LTE is the most widely used 4G standard in the world.
 WiMAX(Worldwide Interoperability for Microwave Access): WiMAX is another
popular 4G standard, but it is less widely used than LTE.
 HSPA+(Evolved High-Speed Packet Access or HSPA Evolution): HSPA+ is a 3G
standard that can achieve 4G-like data rates.
Applications of 4G Networks
 Mobile Broadband: 4G networks are commonly used for mobile broadband, providing
internet access to mobile devices such as smartphones and tablets.
 Video Streaming: 4G networks can support high-quality video streaming, allowing users
to watch videos on their mobile devices without buffering or interruptions.
 Mobile Cloud Computing: 4G networks can support mobile cloud computing, allowing
users to access cloud-based applications and data from their mobile devices.
 Internet of Things (IoT): 4G networks can support the Internet of Things (IoT),
allowing smart devices to connect to the internet and exchange data

Deployment of 4G Networks
4G networks have been deployed in most parts of the world, and they are the most widely used
type of cellular network today.
However, 4G networks are being phased out in favor of 5G networks, which offer even faster data
rates and more advanced features.
Here is a table that summarizes the key features of 4G networks:

Overview of Fifth Generation (5G) Cellular Networks


Fifth Generation (5G) cellular networks are the latest and most advanced iteration of mobile
telecommunications technology, offering a significant leap forward in speed, capacity, latency,
and overall network performance. These networks are designed to provide a truly transformative
experience, enabling a wide range of new applications, services, and advancements that were
previously not possible.

Key Features of 5G Networks


5G networks distinguish themselves from previous generations of cellular networks through
several key features:
 Ultra-High Data Rates: 5G networks boast peak data rates of up to 20 gigabits per
second (Gbps), a substantial improvement over the 1 Gbps peak rates of 4G networks.
This means users can download large files, stream high-definition video content, and
access data-intensive applications in a matter of seconds.
 Low Latency: 5G networks exhibit remarkably low latency, with round-trip times of less
than 1 millisecond (ms), a significant improvement over the 50-100 ms latency of 4G
networks. This low latency is crucial for real-time applications such as video
conferencing, online gaming, virtual reality, and autonomous vehicle.
 Increased Capacity: 5G networks can accommodate up to 1 million devices per square
kilometer, a 100-fold increase over 4G networks. This enhanced capacity allows 5G
networks to handle the growing demand for data and connectivity from a burgeoning
number of devices.
 Network Slicing: 5G networks can be divided into multiple virtual networks, each with
its own characteristics and performance guarantees. This feature enables network
operators to tailor the network to meet the specific needs of different applications,
services, and users. Y
 Massive MIMO: 5G networks utilize Massive Multiple-Input Multiple-Output (MIMO)
antenna technology, which significantly increases the number of antennas used for data
transmission and reception. This leads to improved signal coverage, increased data rates,
and reduced interference.

Applications of 5G Networks
5G networks have the potential to enable a wide range of new applications and services,
transforming various industries and aspects of our lives:
 Enhanced Mobile Broadband: 5G will provide the necessary bandwidth and latency to
support truly ubiquitous mobile broadband, enabling users to access high-speed data and
internet services from anywhere, anytime.
 Internet of Things (IoT): 5G will connect billions of devices to the internet, paving the
way for new applications in smart cities, connected cars, industrial automation, and
various other fields.
 Augmented Reality (AR) and Virtual Reality (VR): 5G’s low latency and high
bandwidth will enable immersive AR and VR experiences, revolutionizing gaming,
entertainment, education, and various other sectors.
 Ultra-Reliable Low-Latency Communications (URLLC): 5G will facilitate
applications that demand extremely low latency and high reliability, such as autonomous
vehicles, remote surgery, and industrial control systems.

Deployment of 5G Networks
5G networks are still in the early stages of deployment, but they are rapidly gaining traction
worldwide. Major telecom operators around the globe are investing heavily in 5G infrastructure,
and 5G-compatible devices are becoming increasingly affordable.
It is expected that 5G networks will be widely available by 2025, becoming the dominant cellular
technology in the coming years.
Here is a summary table of 5G network characteristics:

A comparison of 1G, 2G, 2.5G, 3G, 4G, and 5G cellular

You might also like