Unit - 1 Wireless Network Definition - What Does Wireless Network Mean?
Unit - 1 Wireless Network Definition - What Does Wireless Network Mean?
Wireless Network
A wireless local area network (WLAN) links two or more devices over a
short distance using a wireless distribution method, usually providing a connection
through an access point for internet access. The use of spread-
spectrum or OFDM technologies may allow users to move around within a local
coverage area, and still remain connected to the network.
Products using the IEEE 802.11 WLAN standards are marketed under
the Wi-Fi brand name . Fixed wireless technology implements point-to-point links
between computers or networks at two distant locations, often using
dedicated microwave or modulated laser light beams over line of sight paths. It is
often used in cities to connect networks in two or more buildings without installing
a wired link. To connect to Wi-Fi, sometimes are used devices like a router or
connecting HotSpot using mobile smartphones.
3. Wireless ad hoc network
A wireless ad hoc network, also known as a wireless mesh
network or mobile ad hoc network (MANET), is a wireless network made up of
radio nodes organized in a mesh topology. Each node forwards messages on behalf
of the other nodes and each node performs routing. Ad hoc networks can "self-
heal", automatically re-routing around a node that has lost power. Various network
layer protocols are needed to realize ad hoc mobile networks, such as Distance
Sequenced Distance Vector routing, Associativity-Based Routing, Ad hoc on-
demand Distance Vector routing, and Dynamic source routing.
4. Wireless MAN
Wireless metropolitan area networks are a type of wireless network that
connects several wireless LANs.
WiMAX is a type of Wireless MAN and is described by the IEEE
802.16 standard.
5. Wireless WAN
Wireless wide area networks are wireless networks that typically cover large
areas, such as between neighbouring towns and cities, or city and suburb. These
networks can be used to connect branch offices of business or as a public Internet
access system. The wireless connections between access points are usually point to
point microwave links using parabolic dishes on the 2.4 GHz and 5.8Ghz band,
rather than omnidirectional antennas used with smaller networks. A typical system
contains base station gateways, access points and wireless bridging relays. Other
configurations are mesh systems where each access point acts as a relay also.
When combined with renewable energy systems such as photovoltaic solar panels
or wind systems they can be stand alone systems.
6. Global area network
A global area network (GAN) is a network used for supporting mobile
across an arbitrary number of wireless LANs, satellite coverage areas, etc. The key
challenge in mobile communications is handing off user communications from one
local coverage area to the next. In IEEE Project 802, this involves a succession of
terrestrial wireless LANs.
7. Space network
Space networks are networks used for communication between spacecraft,
usually in the vicinity of the Earth. The example of this is NASA's Space Network.
Uses
Some examples of usage include cellular phones which are part of everyday
wireless networks, allowing easy personal communications. Another example,
Intercontinental network systems, use radio satellites to communicate across the
world. Emergency services such as the police utilize wireless networks to
communicate effectively as well. Individuals and businesses use wireless networks
to send and share data rapidly, whether it be in a small office building or across the
world.
LiFi (Light Fidelity)
LiFi (Light Fidelity) an extension to Visible Light Communication is an
emerging paradigm in the list of latest, emerging wireless technologies. Their
speed, usability, flexibility and other advantages make them an excellent one. LiFi,
Light Fidelity offers wireless communication using the visible light. It includes
range of frequencies and wavelengths starting from the infrared to the ultraviolet.
Just by using the light from the LED, LiFi as a wireless technology helps to
transmit the data efficiently and securely. This wireless technology in its way is
surely said to replace the WiFi routers thereby becoming the internet at the speed
of light. It can use speeds upto 3.5Gbit/s per color.
Gigabit Wireless (GiFi)
Gigabit Wireless also known popularly by the names GiFi or Gi-Fi is a
wireless communication providing a data rate of gigabits per second. Some
features of GiFi – the latest, emerging wireless technologies are :
Low power consumption.
Better transfer rates.
Cost efficient.
Secure.
ZigBee
ZigBee works in 2.4 GHz frequency. Basically it uses mesh, star and cluster
topologies. They are inexpensive, general purpose, self-organizing and a robust
wireless technology. Usually, ZigBee networks need a host and a coordinator for
its operation. ZigBee is based on IEEE 802.15.4 standard. To achieve low power
consumption, transmission distance is limited to 10-100m distance. Also to
transmit the data over long distances, we normally pass the data through mesh
network of intermediate devices. Commonly ZigBee is used in applications that
have long battery life and network security. Some of the characteristics of ZigBee
include:
Various transmission options.
Security mechanism.
Operation in 2.4GHz frequency.
Operates in the 915 MHz (Americas) and 868 MHz (Europe).
Power saving mechanisms.
Pairing mechanism with full application confirmation.
Multiple star topology and personal area network (PAN).
Operating over 16 channels.
WiMAX (Worldwide Interoperability for Microwave Access)
WiMAX is one of the hottest broadband wireless technologies around
today. WiMAX systems are expected to deliver broadband access services to
residential and enterprise customers in an economical way.
Mobile IP
Working:
Correspondent node sends the data to the mobile node. Data packets contains
correspondent node’s address (Source) and home address (Destination). Packets
reaches to the home agent. But now mobile mode is not in the home network, it has
moved into the foreign network. Foreign agent sends the care-of-address to the
home agent to which all the packets should be sent. Now, a tunnel will be
established between the home agent and the foreign agent by the process of
tunneling.
Tunneling establishes a virtual pipe for the packets available between a
tunnel entry and an endpoint. It is the process of sending a packet via a tunnel and
it is achieved by a mechanism called encapsulation.
Now, home agent encapsulates the data packets into new packets in which
the source address is the home address and destination is the care-of-address and
sends it through the tunnel to the foreign agent. Foreign agent, on other side of the
tunnel receives the data packets, decapsulates them and sends them to the mobile
node. Mobile node in response to the data packets received, sends a reply in
response to foreign agent. Foreign agent directly sends the reply to the
correspondent node.
Key Mechanisms in Mobile IP:
1. Agent Discovery: Agents advertise their presence by periodically
broadcasting their agent advertisement messages. The mobile node receiving
the agent advertisement messages observes whether the message is from its
own home agent and determines whether it is in the home network or foreign
network.
2. Agent Registration: Mobile node after discovering the foreign agent, sends
registration request (RREQ) to the foreign agent. Foreign agent in turn, sends
the registration request to the home agent with the care-of-address. Home
agent sends registration reply (RREP) to the foreign agent. Then it forwards
the registration reply to the mobile node and completes the process of
registration.
3. Tunneling:
It establishes a virtual pipe for the packets available between a tunnel entry
and an endpoint. It is the process of sending a packet via a tunnel and it is
achieved by a mechanism called encapsulation. It takes place to forward an IP
datagram from the home agent to the care-of-address. Whenever home agent
receives a packet from correspondent node, it encapsulates the packet with
source address as home address and destination as care-of-address.
Route Optimization in Mobile IP:
The route optimization adds a conceptual data structure, the binding cache,
to the correspondent node. The binding cache contains bindings for mobile node’s
home address and its current care-of-address. Every time the home agent receives a
IP datagram that is destined to a mobile node currently away from the home
network, it sends a binding update to the correspondent node to update the
information in the correspondent node’s binding cache. After this the
correspondent node can directly tunnel packets to the mobile node.
The Internet model makes it possible for a client to reach services on a large
number of origin servers, each addressed by a unique Uniform Resource
Locator (URL).
The content stored on the servers is of various formats, but HTML is the
predominant. HTML provides the content developer with a means to describe the
appearance of a service in a flat document structure. If more advanced features
like procedural logic are needed, then scripting languages such as JavaScript or
VB Script may be utilised.
The figure below shows how a WWW client request a resource stored on a
web server. On the Internet standard communication protocols, like HTTP and
Transmission Control Protocol/Internet Protocol (TCP/IP) are used.
The content available at the web server may be static or dynamic. Static
content is produced once and not changed or updated very often; for example, a
company presentation. Dynamic content is needed when the information provided
by the service changes more often; for example, timetables, news, stock quotes,
and account information. Technologies such as Active Server Pages (ASP),
Common Gateway Interface (CGI), and Servlets allow content to be generated
dynamically.
The WAP Model
The figure below shows the WAP programming model. Note, the
similarities with the Internet model. Without the WAP Gateway/Proxy, the two
models would have been practically identical.
WAP Gateway/Proxy is the entity that connects the wireless domain with
the Internet. You should make a note that the request that is sent from the wireless
client to the WAP Gateway/Proxy uses the Wireless Session Protocol (WSP). In
its essence, WSP is a binary version of HTTP.
A markup language − the Wireless Markup Language (WML) has been
adapted to develop optimized WAP applications. In order to save valuable
bandwidth in the wireless network, WML can be encoded into a compact binary
format. Encoding WML is one of the tasks performed by the WAP
Gateway/Proxy.
How WAP Model Works?
When it comes to actual use, WAP works as follows −
The user selects an option on their mobile device that has a URL with
Wireless Markup language (WML) content assigned to it.
The phone sends the URL request via the phone network to a WAP gateway
using the binary encoded WAP protocol.
The gateway translates this WAP request into a conventional HTTP request
for the specified URL and sends it on to the Internet.
The appropriate Web server picks up the HTTP request.
The server processes the request just as it would any other request. If the
URL refers to a static WML file, the server delivers it. If a CGI script is
requested, it is processed and the content returned as usual.
The Web server adds the HTTP header to the WML content and returns it to
the gateway.
The WAP gateway compiles the WML into binary form.
The gateway then sends the WML response back to the phone.
The phone receives the WML via the WAP protocol.
The micro-browser processes the WML and displays the content on the
screen.
WAP - Architecture
WAP is designed in a layered fashion, so that it can be extensible, flexible,
and scalable. As a result, the WAP protocol stack is divided into five layers −
Layers of WAP Protocol
Application Layer
Wireless Application Environment (WAE). This layer is of most interest to
content developers because it contains among other things, device specifications,
and the content development programming languages, WML, and WMLScript.
Session Layer
Wireless Session Protocol (WSP). Unlike HTTP, WSP has been designed
by the WAP Forum to provide fast connection suspension and reconnection.
Transaction Layer
Wireless Transaction Protocol (WTP). The WTP runs on top of a datagram
service, such as User Datagram Protocol (UDP) and is part of the standard suite of
TCP/IP protocols used to provide a simplified protocol suitable for low bandwidth
wireless stations.
Security Layer
Wireless Transport Layer Security (WTLS). WTLS incorporates security
features that are based upon the established Transport Layer Security (TLS)
protocol standard. It includes data integrity checks, privacy, service denial, and
authentication services.
Transport Layer
Wireless Datagram Protocol (WDP). The WDP allows WAP to be bearer-
independent by adapting the transport layer of the underlying bearer. The WDP
presents a consistent data format to the higher layers of the WAP protocol stack,
thereby offering the advantage of bearer independence to application developers.
Each of these layers provides a well-defined interface to the layer above it.
This means that the internal workings of any layer are transparent or invisible to
the layers above it. The layered architecture allows other applications and services
to utilise the features provided by the WAP-stack as well. This makes it possible
to use the WAP-stack for services and applications that currently are not specified
by WAP.
The WAP protocol architecture is shown below alongside a typical Internet
Protocol stack.
Note that the mobile network bearers in the lower part of the figure above
are not part of the WAP protocol stack.
WML
The topmost layer in the WAP (Wireless Application Protocol) architecture is
made up of WAE (Wireless Application Environment), which consists of WML
and WML scripting language.
WML stands for Wireless Markup Language
WML is an application of XML, which is defined in a document-type definition.
WML is based on HDML and is modified so that it can be compared with
HTML.
WML takes care of the small screen and the low bandwidth of transmission.
WML is the markup language defined in the WAP specification.
WAP sites are written in WML, while web sites are written in HTML.
WML is very similar to HTML. Both of them use tags and are written in plain
text format.
WML files have the extension ".wml". The MIME type of WML is
"text/vnd.wap.wml".
WML supports client-side scripting. The scripting language supported is called
WML Script.
WMLScript (Wireless Markup Language Script) is the client-side scripting
language of WML (Wireless Markup Language). A scripting language is similar
to a programming language, but is of lighter weight. With WMLScript, the
wireless device can do some of the processing and computation. This reduces the
number of requests and responses to/from the server.
This chapter will give brief description of all the important WML Script
components.
WML Script Components
WML Script is very similar to Java Script. WML Script components have
almost similar meaning as they have in Java Script. The WML Script program
components are summarized here.
WML Script Operators
WML Script supports following type of operators.
Arithmetic Operators
Comparison Operators
Logical (or Relational) Operators
Assignment Operators
Conditional (or ternary) Operators
Check for complete detail of The WML Operators.
WML Script Control Statements
Control statements are used for controlling the sequence and iterations in a
program.
Statement Description