Beruflich Dokumente
Kultur Dokumente
There has also been a recent effort defining common standards for providing
data services on hand-held devices. WAP (Wireless Application Protocol) and
KVM (Kilobyte Virtual Machine) deserve a mention here. WAP is a protocol
suite that comprises of protocols tailored for small devices. WAP has been
developed by the WAP Forum [ www.wapforum.org] and runs over an
underlying bearer protocol like IP or SMS. In the WAP model, a service
provider operates a WAP gateway to convert Internet content to a
miniaturized subset of HTML that is displayed by a mini-browser on the
mobile device. Companies like Nokia, Ericsson and Motorola have already
developed WAP enabled phones. As of now, these phones are available and
functional mostly in Europe.
HTML, the de-facto Internet language, is not optimized for these devices.
Handheld devices are characterized by small display sizes, limited input
capabilities and limited bandwidth. The HTML document model consisting of
headers, titles, paragraphs, etc, does not work well for a 10 row by 15
character wide screen. Keeping in mind the memory constraints of the
mobile device, the browser should not be heavy (i.e. the markup language
should not be too detailed). Alternative markup languages that have been
proposed include HDML (Handheld Device Markup Language -- a prevalent
standard), WML (Wireless Markup Language -- WAP brainchild) and
Compact HTML . Details about these standards can be obtained from w3c
site . Curious readers can also subscribe to the mailing list www-
mobile@w3.org. The popular mini-browser in the market right now is
UP.browser from phone.com [www.phone.com]. The browser has been
licensed to many cellular phone manufacturers like Motorola, Ericsson, Sony
and Toshiba.
The data link layer is the second layer in the OSI (open systems
interconnection) seven-layer reference model. It responds to service
requests from the network layer above it and issues service requests to the
physical layer below it.
The data link layer is responsible for encoding bits into packets prior to
transmission and then decoding the packets back into bits at the destination.
Bits are the most basic unit of information in computing and
communications. Packets are the fundamental unit of information transport
in all modern computer networks, and increasingly in other communications
networks as well.
The data link layer is also responsible for logical link control, media access
control, hardware addressing, error detection and handling and defining
physical layer standards. It provides reliable data transfer by transmitting
packets with the necessary synchronization, error control and flow control.
The data link layer is divided into two sublayers: the media access control
(MAC) layer and the logical link control (LLC) layer. The former controls how
computers on the network gain access to the data and obtain permission to
transmit it; the latter controls packet synchronization, flow control and error
checking.
The data link layer is where most LAN (local area network) and wireless LAN
technologies are defined. Among the most popular technologies and
protocols generally associated with this layer are Ethernet, Token Ring, FDDI
(fiber distributed data interface), ATM (asynchronous transfer mode), SLIP
(serial line Internet protocol), PPP (point-to-point protocol), HDLC (high level
data link control) and ADCCP (advanced data communication control
procedures).
Data link layer processing is faster than network layer processing because
less analysis of the packet is required.
The third category of channel allocation methods includes all systems that
are hybrids of fixed and dynamic channel allocation systems. Several
methods have been presented that fall within this category and in addition, a
great deal of comparison has been made with corresponding simulations and
analyses [Cox, Elnoubi, Jiang, Katzela, Yue, Zhang]. We will present several
of the more developed hybrid methods below.
Channel Borrowing is one of the most straightforward hybrid allocation
schemes. Here, channels are assigned to cells just as in fixed allocation
schemes. If a cell needs a channel in excess of the channels previously
assigned to it, that cell may borrow a channel from one of its neighboring
cells given that a channel is available and use of this channel won't violate
frequency reuse requirements. Note that since every channel has a
predetermined relationship with a specific cell, channel borrowing (without
the extensions mentioned below) is often categorized as a subclass of fixed
allocation schemes. The major problem with channel borrowing is that when
a cell borrows a channel from a neighboring cell, other nearby cells are
prohibited from using the borrowed channel because of co-channel
interference. This can lead to increased call blocking over time. To reduce
this call blocking penalty, algorithms are necessary to ensure that the
channels are borrowed from the most available neighboring cells; i.e., the
neighboring cells with the most unassigned channels.
With respect to uniform offered traffic, their results showed that BDCL had
the lowest blocking probability followed by BCO, LODA and FCA. With non-
uniform offered traffic, the relative performance of the four methods was the
same with the exception that in this case, LODA performed better than BCO.
It makes sense that the ordering for BDCL, BCO and FCA was as found.
Indeed, BDCL was specifically designed as an improvement over BCO and
BCO was designed as an improvement over FCA [Zhang, Elnoubi]. The fact
that the performance of LODA varies under uniform versus non-uniform
traffic is rather interesting however. The reason behind this phenomenon is
that LODA provides optimal channel allocation only in local regions. Given
non-uniform traffic which consists of dense regions in certain local areas,
LODA will accommodate these regions of high traffic offering. However, in a
global sense, the LODA algorithm will not necessarily provide the optimal
allocation. With uniform offered traffic, LODA does not have any regions with
peak traffic to optimize; i.e., no local regions within which the benefits of
LODA can be realized. Furthermore, with respect to the entire region, the
optimization is generally not optimal in a global sense. The result is that with
uniform traffic, LODA does not have any advantage to offer over BCO. From
the previous discussion we see that one general result of all of the
comparisons is that dynamic channel allocation outperforms fixed channel
allocation for low blocking rates (below 10% in most cases). Blocking rates
above 1% or 2% are generally not tolerated. This is generally an accepted
guideline throughout the telecommunications industry and we will adhere to
this design constraint as well.
eless Lan
For the home user, wireless has become popular due to ease of installation,
and location freedom with the gaining popularity of laptops. Public
businesses such as coffee shops or malls have begun to offer wireless access
to their customers; some are even provided as a free service. Large wireless
network projects are being put up in many major cities. Google is even
providing a free service to Mountain View, California and has entered a bid
to do the same for San Francisco. New York City has also begun a pilot
program to cover all five boroughs of the city with wireless Internet access.
History Of Wireless Lan
"In 1979, F.R. Gfeller and U. Bapst published a paper in the IEEE
Proceedings reporting an experimental wireless local area network using
diffused infrared communications. Shortly thereafter, in 1980, P. Ferrert
reported on an experimental application of a single code spread spectrum
radio for wireless terminal communications in the IEEE National
Telecommunications Conference. In 1984, a comparison between Infrared
and CDMA spread spectrum communications for wireless office information
networks was published by Kaveh Pahlavan in IEEE Computer Networking
Symposium which appeared later in the IEEE Communication Society
Magazine. In May 1985, the efforts of Marcus led the FCC to announce
experimental ISM bands for commercial application of spread spectrum
technology. Later on, M. Kavehrad reported on an experimental wireless PBX
system using code division multiple access. These efforts prompted
significant industrial activities in the development of a new generation of
wireless local area networks and it updated several old discussions in the
portable and mobile radio industry.
The first generation of wireless data modems was developed in the early
1980's by amateur radio operators. They added a voice band data
communication modem, with data rates below 9600 bit/s, to an existing
short distance radio system, typically in the two meter amateur band. The
second generation of wireless modems was developed immediately after the
FCC announcement in the experimental bands for non-military use of the
spread spectrum technology. These modems provided data rates on the
order of hundreds of kbit/s. The third generation of wireless modem [then]
aimed at compatibility with the existing LANs with data rates on the order of
Mbit/s. Several companies [developed] the third generation products with
data rates above 1 Mbit/s and a couple of products [had] already been
announced [by the time of the first IEEE Workshop on Wireless LANs]."
"The first of the IEEE Workshops on Wireless LAN was held in 1991. At that
time early wireless LAN products had just appeared in the market and the
IEEE 802.11 committee had just started its activities to develop a standard
for wireless LANs. The focus of that first workshop was evaluation of the
alternative technologies. [By 1996], the technology [was] relatively mature,
a variety of applications [had] been identified and addressed and
technologies that enable these applications [were] well understood. Chip
sets aimed at wireless LAN implementations and applications, a key enabling
technology for rapid market growth, [were] emerging in the market.
Wireless LANs [were being] used in hospitals, stock exchanges, and other in
building and campus settings for nomadic access, point-to-point LAN
bridges, ad-hoc networking, and even larger applications through
internetworking. The IEEE 802.11 standard and variants and alternatives,
such as the wireless LAN interoperability forum and the European HIPERLAN
specification [had] made rapid progress, and the unlicensed PCS
[ Unlicensed Personal Communications Services ] and the proposed
SUPERNet, later on renamed as U-NII, bands also presented new
opportunities."
On July 21, 1999, AirPort debuted at the Macworld Expo in New York City
with Steve Jobs picking up an iBook supposedly to give the cameraman a
better shot as he surfed the Web. Applause quickly built as people realized
there were no wires. This was the first time Wireless LAN became publicly
available at consumer pricing and easily available for home use. Before the
release of the Airport, Wireless LAN was too expensive for consumer use and
used exclusively in large corporate settings.
All components that can connect into a wireless medium in a network are referred to as
stations. All stations are equipped with wireless network interface cards (WNICs). Wireless
stations fall into one of two categories: access points and clients.
Access points
Access points (APs) are base stations for the wireless network. They transmit and
receive radio frequencies for wireless enabled devices to communicate with.
Clients
Wireless clients can be mobile devices such as laptops, personal digital assistants, IP
phones, or fixed devices such as desktops and workstations that are equipped with a
wireless network interface.
Basic service set
The basic service set (BSS) is a set of all stations that can communicate with each other.
There are two types of BSS: independent BSS and infrastructure BSS. Every BSS has an
identification (ID) called the BSSID, which is the MAC address of the access point
servicing the BSS.
An infrastructure BSS can communicate with other stations not in the same basic
service set by communicating through access points.
An extended service set (ESS) is a set of connected BSSes. Access points in an ESS are
connected by a distribution system. Each ESS has an ID called the SSID which is a 32-byte
(maximum) character string. For example, "linksys" is the default SSID for Linksys routers.
Types Of Wireless Lan
Peer-to-peer
Bridge
Uses
It has to be noted that in most cases the effective range of class 2 devices is
extended if they connect to a class 1 transceiver, compared to pure class 2
network. This is accomplished by higher sensitivity and transmitter power of
the Class 1 device. The higher transmitter power of Class 1 device allows
higher power to be received by the Class 2 device. Furthermore, higher
sensitivity of Class 1 device allows reception of much lower transmitted
power of the Class 2 devices. Thus, allowing operation of Class 2 devices at
much higher distances. Devices that use a power amplifier on the transmit,
have improved receive sensitivity, and highly optimized antennas are
available that routinely achieve ranges of 1km within the Bluetooth Class 1
standard.
Data Rate
Version
WiMedia Alliance
53 - 480 Mbit/
(proposed)
Bluetooth differs from Wi-Fi in that the latter provides higher throughput and
covers greater distances, but requires more expensive hardware and higher
power consumption. They use the same frequency range, but employ
different multiplexing schemes. While Bluetooth is a cable replacement for a
variety of applications, Wi-Fi is a cable replacement only for local area
network access. Bluetooth is often thought of as wireless USB, whereas Wi-
Fi is wireless Ethernet, both operating at much lower bandwidth than the
cable systems they are trying to replace. However, this analogy is not
entirely accurate since any Bluetooth device can, in theory, host any other
Bluetooth device—something that is not universal to USB devices, therefore
it would resemble more a wireless FireWire.
Bluetooth
Wi-Fi
Computer requirements
Unlike its predecessor, IrDA, which requires a separate adapter for each
device, Bluetooth allows multiple devices to communicate with a computer
over a single adapter.