Mobile Computing Unit III
Mobile Computing Unit III
ON
PREPARED BY
PRANEETHA TUMMALA
DMS SVH COLLEGE OF ENGINEERING
MACHILIPATNAM
1 PRANEETHA TUMMALA
UNIT III
UNIT III: Wireless LAN: Infrared Vs Radio Transmission, differences between Infrastructure mode and Ad-
hoc Network mode, IEEE 802.11 WLAN- System Architecture, services, HIPERLAN Protocol Architecture,
Bluetooth architecture.
➢ WLAN, a wireless local area network it is used to establish a wireless connection between two or
more devices.
➢ We can use a wireless distributed method within a limited area such as school or office etc.
➢ Popular standard organization support WLAN are IEEE and ETST.
➢ IEEE standards 2.4GHz and 5GHz ETST standards 5GHz.
FEATURES/ADVANTAGES
DISADVANTAGES:
Infrared Transmission
Infrared technology uses diffuse light reflected at walls, furniture etc. or a directed light if a line of sight (LOS) exists
between sender and receiver.
Infrared light is the part of the electromagnetic spectrum, and is an electromagnetic form of radiation. It comes from the
heat and thermal radiation, and it is not visible to the naked eyes.
In infrared transmission, senders can be simple light emitting diodes (LEDs) or laser diodes. Photodiodes act as
receivers. Infrared is used in wireless technology devices or systems that convey data through infrared radiation. Infrared
is electromagnetic energy at a wave length or wave lengths somewhat longer than those of red light.
Infrared wireless is used for medium and short-range communications and control. Infrared technology is used in
instruction detectors; robot control system, medium range line of sight laser communication, cordless microphone,
headsets, modems, and other peripheral devices.
Infrared radiation is used in scientific, industrial, and medical application. Night vision devices using active near infrared
illumination allow people and animals to be observed without the observer being detected. Infrared transmission
technology refers to energy in the region of the electromagnetic radiation spectrum at wavelength longer than those of
visible light but shorter than those of radio waves.
2 PRANEETHA TUMMALA
UNIT III
Infrared technology allows computing devices to communicate via short range wireless signals. With
infrared transmission, computers can transfer files and other digital data bidirectional.
Advantages of infrared:
The main advantage of infrared technology is its simple and extremely cheap senders and receivers which are
integrated into nearly all mobile devices available today.
PDAs, laptops, notebooks, mobile phones etc. have an infrared data association (IrDA) interface.
Disadvantages of Infrared
Disadvantages of infrared transmission are its low bandwidth compared to other LAN technologies.
Limited transfer rates to 115 Kbit/s and we know that even 4 Mbit/s is not a particular high data rate.
Typically, for good transmission quality and high data rates a LOS (Line of site), i.e. direct connection is
needed.
Radio Transmission
Almost all networks use radio waves for data transmission, e.g., GSM at 900, 1800, and 1900 MHz, DECT at
1880 MHz etc.
Radio transmission technologies can be used to set up ad-hoc connections for work groups, to connect, e.g., a
desktop with a printer without a wire, or to support mobility within a small area.
The two main types of radio transmission are AM (Amplitude Modulation) and (FM) Frequency Modulation.
FM minimizes noise and provides greater reliability. Both AM and FM process sounds in patterns that are
always varying of electrical signals.
In an AM transmission the carrier wave has a constant frequency, but the strength of the wave varies. The FM
transmission is just the opposite; the wave has constant amplitude but a varying frequency.
Usually, the radio transmission is used in the transmission of sounds and pictures. Such as, voice, music and
television.
The images and sounds are converted into electrical signals by a microphone or video camera. The signals are
amplified, and transmitted. If the carrier is amplified it can be applied to an antenna.
The antenna converts the electrical signals into electromagnetic waves and sends them out or they can be
received. The antenna consists commonly of a wire or set of wires.
3 PRANEETHA TUMMALA
UNIT III
Advantages of radio transmission include the long-term experiences made with radio transmission for wide
area networks (e.g. microwave links) and mobile cellular phones.
Radio transmission can cover larger areas and can penetrate (thinner) walls, plants, furniture etc. o Additional
coverage is gained by reflection.
Radio typically does not need a LOS (Line of Site) if the frequencies are not too high.
Higher transmission rates (e.g. 54 Mbit/s) than infrared (directed laser links, which offer data rates well above
100 Mbit/s).
Radio transmission can be interfered with other senders, or electrical devices can destroy data transmitted via
radio.
Very limited ranges of license free bands are available worldwide and those that are available are not the same
in all countries.
Uses IR diodes, diffuse light, multiple Typically using the license free ISM band
reflections (Walls, Furniture’s Etc) at 2.4GHz
4 PRANEETHA TUMMALA
UNIT III
The most popular mode used to connect clients like laptops and smart-phones to another network such as
company intranet or internet. This mode is shown below.
In infrastructure mode every client is associated with an Access point which is in turn connected to another
network. The client sends and receives its packet via Access Point.
Ad-Hoc Mode: Collections of computers are associated so that they can directly send frames to each other.
There is no Access Point in Ad hoc, because Internet access is the killer application for wireless. Ad hoc
networks are not very popular.
In this mode, the transmitter and receivers are In the ad hoc mode transmitter and receivers
in direct range of the access point (AP). can communicate directly with each other.
In this mode AP handles all wireless nodes In ad hoc mode there is no need for an access
within the range. point in the range.
In this mode each client's security setting must Since in ad hoc mode there is no AP, the
be configured to match the security setting of network users have to configure what are the
the access point (AP) correct security settings and it must have to
match with each client’s security settings in
the network.
In this mode, a client or a system can only Since ad hoc is peer to peer mode with no
communicate with connected clients in central access point, it also allows internet
managed mode. between any two connected clients.
More widely used. Generally used at airport Most of the IEEE 802.11 transmitter and
lounge, hotel lobby, railway station etc. receivers support the ad hoc mode. Generally
used in the Military arena (for sharing
information among soldiers), local area
networks for communication among a fixed
group of people etc.
5 PRANEETHA TUMMALA
UNIT III
6 PRANEETHA TUMMALA
UNIT III
• Stations (STA) − Stations comprises of all devices and equipment that are connected to the wireless
LAN. A station can be of two types−
o Wireless Access Point (WAP) − WAPs or simply access points (AP) are generally wireless
routers that form the base stations or access.
• Basic Service Set (BSS) − A basic service set is a group of stations communicating at the physical
layer level. BSS can be of two categories depending upon the mode of operation−
o Infrastructure BSS − Here, the devices communicate with other devices through access points.
o Independent BSS − Here, the devices communicate in a peer-to-peer basis in an ad hoc manner.
• Extended Service Set (ESS) − It is a set of all connected BSS.
• Frame Control − It is a 2 bytes starting field composed of 11 subfields. It contains control information of the
frame.
• Duration − It is a 2-byte field that specifies the time period for which the frame and its acknowledgment
occupy the channel.
• Address fields − There are three 6-byte address fields containing addresses of source, immediate destination, and
final endpoint respectively.
UNIT III
• Data − This is a variable-sized field that carries the data from the upper layers. The maximum size of
the data field is 2312 bytes.
It is defines nine services that need to be provided by the wireless LAN to provide functionality
equivalent to that which is inherent to wired LAN’s
8 PRANEETHA TUMMALA
UNIT III
9 PRANEETHA TUMMALA
UNIT III
1. Fig shows the most common scenario: an IEEE 802.11 wireless LAN connected to a switched IEEE
802.3 Ethernet via a bridge.
2. The WLAN behaves like a slow wired LAN. The higher layers (application, TCP,IP) look the same for
wireless nodes as for wired nodes. The upper part of the data link control layer, the logical link control
(LLC), covers the differences of the medium access control layer needed for the different media.
10 PRANEETHA TUMMALA
UNIT III
3.The IEEE 802.11 standard only covers the physical layer PHY and medium access layer MAC.
4 The physical layer is subdivided into the physical layer convergence protocol(PLCP) and the
physical medium dependent sub-layer PMD
5. The basic tasks of the MAC layer comprise medium access, fragmentation of user data, and
encryption.
6. The PLCP sub-layer provides a carrier sense signal, called clear channel assessment (CCA) and
provides a common PHY service access point (SAP) independent of the transmission technology.
7. Finally, the PMD sub-layer handles modulation and encoding/decoding of signals.
8. The MAC management supports the association and re-association of a station to an access point,
and roaming between different access points. It also controls authentication, mechanisms, encryption,
synchronization of a station with regard to an access point, and power management to save battery
power. It also maintains the MAC management information base (MIB).
9. The main tasks of the PHY management include channel tuning and PHY MIB maintenance.
10. Finally, station management interacts with both management layers and is responsible for
additional higher layer functions (eg. , control of bridging and interaction with the distribution system
in the case of an access point).
HIPERLAN
HIPERLAN stands for High Performance Radio Local Area Networks. In 1996, the ETSI
standardized HIPERLAN 1 as a WLAN allowing for node mobility and supporting ad-hoc and infrastructure-
based topologies. HIPERLAN 1 was the original one. Over time, names have changed and the former
HIPERLANs 2, 3, and 4 are now called HiperLAN2, HIPERACCESS, and HIPERLINK.
11 PRANEETHA TUMMALA
UNIT III
Physical Layer: It has three following functions i)Encoding,decoding of signal ii)Adding preamble
for synchronization iii) Bit transmission and receiving.
Channel Access control(CAC): The sub-layer deals with the access request to the channels.
Accomplishing of the request is dependent on the usage of the channel and the priority request.
An innovative feature of HIPERLAN 1, which many other wireless networks do not offer, is its ability to
forward data packets using several relays.
• For power conservation, a node may set up a specific wake-up pattern. These nodes are called p-
savers and need so-called p-supporters that contain information about the wake-up patterns of all the p-
savers they are responsible for.
• Developed by ETSI during 1991 to 1996
• Goal: to achieve higher data rate than IEEE 802.11 data rates: 1~2 Mbps, and to be used in ad hoc
networking of portable devices
• Support asynchronous data transfer, carrier-sense multiple access multiple access with collision
avoidance (CSMA/CA), no QoS guaranteed.
• Data transfer at 23.5 Mbit/s, including forwarding mechanisms, topology discovery, user data
encryption, network identification and power conservation mechanisms.
Operate at 5.1–5.3 GHz with a range of 50 m in buildings at 1 W transmit power.
• Service offered by a HIPERLAN 1 is compatible with the standard MAC services known from
IEEE 802.x LANs.
• Addressing is based on standard 48 bit MAC addresses.
12 PRANEETHA TUMMALA
UNIT III
HIPERLAN 2
Introduction:
Next generation of HiperLAN family: Proposed by ETSI BRAN (Broadband Radio Access Networks)
in 1999, and is still under development This is also written as HIPERLAN/2, HiperLAN/2, H/2;
official name: HIPERLAN Type 2.This wireless network works at 5 GHz.Offers data rates of up to 54
Mbit/s including QoS support and enhanced security features.
Features of HiperLAN2:
High-throughput transmission:
HiperLAN2 not only offers up to 54 Mbit/s at the physical layer but also about 35 Mbit/s at
the network layer.
The overheads introduced by the layers (medium access, packet headers etc.) remain almost
constant over a wide range of user packet sizes and Data rates.
• Connection-oriented:
Prior to data transmission HiperLAN2 networks establish logical connections between a
sender and a receiver
• Quality of service support:
With the help of connections, support of QoS is much simpler. Each connection has its own
set of QoS parameters.
• Dynamic frequency selection:
HiperLAN2 does not require frequency planning.
All access points have built-in support which automatically selects an appropriate frequency
within their coverage area.
• Security support:
o Authentication as well as encryption is supported by HiperLAN2.
• Mobility support:
o Mobile terminals can move around while transmission always takes place between the
terminal and the access point with the best radio signal.
o Handover between access points is performed automatically.
13 PRANEETHA TUMMALA
UNIT III
BLUETOOTH
It is a Wireless Personal Area Network (WPAN) technology and is used for exchanging
data over smaller distances. This technology was invented by Ericson in 1994. It
operates in the unlicensed, industrial, scientific and medical (ISM) band at 2.4 GHz to
2.485 GHz. Maximum devices that can be connected at the same time are 7. Bluetooth
ranges up-to 10 meters. It provides data rates up-to 1 Mbps or 3 Mbps depending upon
the version. The spreading technique which it uses is FHSS (Frequency hopping
spread spectrum). A Bluetooth network is called piconet and a collection of
interconnected piconets is called scatternet.
ADVANTAGES:
✓ Wireless technology
✓ Very simple to form piconet
✓ Cheap technology
✓ Robust
✓ Low Energy consumption.
DISADVANTAGES:
➢ Low in Bandwidth
➢ Data transmission range is constant as it is very less.
Bluetooth Architecture:
The architecture of bluetooth defines two types of networks: 1Piconet 2.Scatternet
14 PRANEETHA TUMMALA
UNIT III
Possible communication is only between the master and slave; Slave- slave
communication is not possible. It also have 255 parked nodes, these are
secondary nodes and cannot take participation in communication unless it get
converted to the active state.
• Within a Piconet, the timing of various devices and the frequency hopping sequence of
individual devices is determined by the clock and unique 48-bit address of master.
• Each device can communicate simultaneously with up to seven other devices within a
single Piconet.
• Piconets are established dynamically and automatically as Bluetooth enabled devices enter
and leave piconets.
• There is no direct connection between the slaves and all the connections are essentially
master-to-slave or slave-to-master.
Slaves are allowed to transmit once these have been polled by the master.
Scatternet:
It is formed by using various piconets. A slave that is present in one piconet
can be act as master or we can say primary in other piconet. This kind of node
can receive message from master in one piconet and deliver the message to its
slave into the other piconet where it is acting as a slave. This type of node is refer
as bridge node. A station cannot be master in two piconets.
15 PRANEETHA TUMMALA
UNIT III
SDP layer: It is short for Service Discovery Protocol. It allows to discover the services
available on another bluetooth enabled device.
RF comm layer: It is short for Radio Front-end Component. It provides serial interface
with WAP and OBEX.
WAP: It is short for Wireless Access Protocol. It is used for internet access.
16 PRANEETHA TUMMALA
UNIT III
MODE 1:
✓ Non secure (No security at all)
✓ By passes authentication and encryption (Easy Hacking)
✓ Doesn't prevent any other bluetooth devices from establishing connection.
✓ Connection is open and many security challenges.
MODE 2:
MODE 3:
✓ Initiates security procedures before physical link is established.
✓ Authentication and Encryption is done.
✓ Uses a separate secrete key link shared by paired devices.
MODE 4:
SECURITY ISSUES:
Blue jacking:
➢ Attempts to eject data into someone phone.
➢ Sends message to other bluetooth users within 1o meters.
Blue Bugging:
➢ Hackers remotely accessing other phone.
➢ Places calls and sends text message.
Car Whispering:
➢ Uses a software allowing hackers to send and receive audio to and from a bluetooth enable car stereo system.
17 PRANEETHA TUMMALA