Wireless Wide Area Networks: Trends and Issues Wireless Wide Area Networks: Trends and Issues

Total Page:16

File Type:pdf, Size:1020Kb

Wireless Wide Area Networks: Trends and Issues Wireless Wide Area Networks: Trends and Issues Wireless Wide Area Networks: Trends and Issues Wireless Wide Area Networks: Trends and Issues Mobile computing devices are getting smaller and · Specialized equipment and custom applications more powerful, while the amount of information is were needed for deployment over these propri- growing astronomically. As the demand for con- etary wireless systems. necting these devices to content-rich networks · Often the wireless infrastructures themselves rises, WWAN technology seems like the perfect were difficult to deploy. answer. But today's wireless WANs have some lim- itations. This white paper discusses those limita- · Only a small percentage of the working popula- tions and how NetMotion™ overcomes them. tion was mobile, so corporations considered wireless data deployment a significant invest- Historic Trends ment with little return. Wireless wide area data networking is not a new Why the resurgence of interest in wireless data net- phenomenon. The technology has been around for working technologies now? In the late twentieth over 100 years and was used to send information century, a few interesting social and technological well in advance of voice systems. But as radio tech- developments took place. In the late 1990's, busi- nology progressed, the use of radio transmissions nesses began seeing the economic benefit of having for voice became dominant. It was a natural inter- employees who work away from their campuses. face for people to use, and—temporarily—wireless These remote (and sometimes nomadic) workers data transmission became less important. needed access to everyday corporate information to do their jobs. Providing workers with remote In the twentieth century, voice transmission took a connectivity became a growing challenge for the big step with the birth of the cellular concept at information staff. Handheld and pocket-sized Bell Labs in 1947. Not until 1979 were the first computers became powerful enough to be useful. direct dial analog cellular systems deployed in The convergence of Internet networking technolo- Japan. The Nordic countries followed by 1981. Two gies made IP the de facto standard. New standards years later, the U.S. installed the first commercial such as General Packet Radio Services (GPRS) Advanced Mobile Phone Service (AMPS) wireless were being adopted to provide wireless network cellular system in Chicago. Soon it was apparent services. With the development of such technology, that higher capacity, more reliable, and lower cost the promise of faster access speeds from new wide wireless systems were needed to meet growing area wireless interconnects began to approach (or consumer demand. Over the past decade or so, sig- in some cases exceed) standard connections over nificant efforts were made to increase the capacity landlines. These factors created the environment and robustness of these voice systems, thus the for the anytime, anywhere connected worker. development of the digital standards. Wireless WAN Definition It would seem that technology for wireless data communication over radio signals was left behind. A wireless Wide Area Network (WWAN) is a com- But there were many successful efforts over the puter data network that may extend over a large years to provide "wireless" connectivity, including geographical area. Characteristically, a WWAN IBM and Motorola's ARDIS network, Ericsson's receives and transmits data using radio signals Mobitex, and cellular digital packet data (CDPD). over the initial interconnect with the mobile com- These technologies and others continue to provide puter system. At the switching center, WWAN seg- connectivity for many specialized applications ments then connect to either a specialized public or today. private network via telephone or other high-speed There are many reasons why these technologies communication links. These back-haul intercon- did not have broad commercial appeal and why nects then link to an organization's existing LAN/ the time wasn't right: WAN infrastructure. Recent developments now · While computers grew smaller, most were still allow direct connections to generic public net- too bulky to carry around. works, like the Internet, further reducing the cost of deployment. 2 Unlike wireless local area networks (WLANs), the or slower. The average access time may be slower coverage area for WWANs is normally measured than a 28.8 modem connection. Wireless networks in miles rather than feet. Data throughput rates for in general are also more susceptible to environ- WWANs are a great deal slower than they are for mental factors, like weather and terrain, than local area network connections. They are typically wired networks. measured in tens of thousands of bytes per second Figure 1—Components of a wireless WAN Wireless WAN Limitations Wireless WAN Benefits Mobile computing devices are getting smaller, cheaper and more powerful. At the same time the Whether they are in the office or traveling, today's amount of information available today is growing professionals need access to the corporate data and astronomically. The demand for connecting mobile applications that keep them connected to their devices to content- organization's processes. Wireless WAN connectiv- ity means hospitals can track patients and their rich networks is also rising quickly, and it would charts remotely. Sales staff have access to the latest seem that WWAN technology is the perfect product information for customer presentations. answer. But today's wireless WANs have limita- Managers can get the latest data to make decisions tions in several areas, including: when they are away from their offices. Or public · safety officials can access data that they need from Security the field. · Performance It is access to data communications connections · Application persistence wherever and whenever they are needed that is · Roaming driving the market. Dataquest Inc., the San Jose- based research firm, projects that the wireless data · Off-the-shelf solutions market will grow from 3 million subscribers this · Central management year to 36 million in 2003. Cahners In-Stat's num- bers, while lower (2 million users in 1999 growing to 25 million in 2003), echo similar growth. Both agree that in the near term, it is corporate users who will drive this growth. This business demand will eventually lower future wireless access costs and open the doors to the consumer market. 3 To overcome these limitations, organizations usu- area. They may also choose to suspend operations ally have to increase their already steep IT work- to extend battery life. Such normal communication load by developing point solutions. What follows interruptions can wreak havoc with existing trans- is a more detailed look at these problem areas. port protocol implementations and cause user applications to either lock up or terminate. Security: In modern network topologies, physical boundaries between public and private networks To minimize such interruptions, most wireless are blurring. Unless care is taken, when a company solutions require customizing both the applica- decides to add wireless connectivity to this mix, tions and the network. As a result, most current their information security can be compromised. solutions are limited in scope and restricted to a Wireless systems in general broadcast data over specific set of applications. The radio waves into the ether. The security implica- mission-critical applications are still relegated to tions are obvious—what companies broadcast goes stationary or desktop systems. When a company everywhere. One of the first concerns that the IT tries to deploy these applications to their mobile department has is whether the information cross- devices, mobile users spend a lot of time getting ing the wireless network boundary is secure, back on the network after losing their connections. because it is susceptible to eavesdropping. Sec- They must re-login, re-authenticate, possibly navi- ondly, they must feel confident that a user has the gate through multiple screens to find the point necessary network permissions to access informa- where they left off, and then re-enter any lost data. tion, since they cannot rely on the mobile device's In the end, users become frustrated and feel unpro- physical location to tell them. Wirelessly connected ductive, which costs the company precious time devices can easily breech two of the most funda- and money. mental network security policies: authentication and confidentiality. Roaming: Over the past several years, network Performance: Things never encountered in wired installations have been segmented for manage- infrastructures affect wireless connections: envi- ment and security reasons. To aid network seg- ronmental factors, such as user movement, har- mentation deployment, the networking industry monics, terrain, and weather, can easily affect has worked hard to allow dynamic configuration throughput and performance. Today's standard of systems when they attach to a particular seg- network topologies and protocol implementations ment. However, once application sessions are were designed for communications between sta- established over existing protocols, the network tionary systems. In general, when a mobile device assumes that a device remains attached to that seg- communicates with a stationary device, the sta- ment for the duration of the session. But mobile tionary system uses the same algorithms to com- devices can wander to different areas and the com- municate with its mobile peer. It is not aware that munications pipe
Recommended publications
  • Wireless WAN Branches Rely on LTE & 5G First
    Wireless WAN Branches Rely on LTE & 5G First In branch stores and offices, wired connectivity isn’t agile enough. Enterprises that can’t function without access to laptops, printers, IoT devices, and cloud applications have been embracing a cellular-driven approach to maximize connection reliability and flexibility. The new standard is the Wireless WAN Branch, which puts LTE and 5G first and is delivered through all-in-one, cloud-managed wireless edge routers. of organizations are investigating business cases and defining use cases or service portfolios based on 5G. — Infosys The Requirements of Today’s Connection-Reliant Branches Integrated Our financial planning offices require flexible WAN capabilities, as well as the ability to protect sensitive client information with a small IT Security team. We require an all-in-one solution that provides the security features we need to comply with wide-ranging regulations. During emergencies, we must be ready to set up a temporary Hybrid WAN command center at a moment’s notice. Pop-up cellular solutions allow us to focus on protecting the community and our officers Flexibility instead of worrying about where the nearest cable plug-in is located. Management With restaurants in every state, it’s impossible to send an IT specialist to address every issue. To troubleshoot, push out security updates, or From change a configuration, we use a cloud-based network management Anywhere system. We monitor locations nationwide from easy-to-read dashboards. It’s the only way to manage such a large network. Our clinics must have excellent Wi-Fi coverage for doctors and High- nurses to use technologies and access patient data anywhere in the building.
    [Show full text]
  • Iot Systems Overview
    IoT systems overview CoE Training on Traffic engineering and advanced wireless network planning Sami TABBANE 30 September -03 October 2019 Bangkok, Thailand 1 Objectives •Present the different IoT systems and their classifications 2 Summary I. Introduction II. IoT Technologies A. Fixed & Short Range B. Long Range technologies 1. Non 3GPP Standards (LPWAN) 2. 3GPP Standards IoT Specificities versus Cellular IoT communications are or should be: Low cost , Low power , Long battery duration , High number of connections , Low bitrate , Long range , Low processing capacity , Low storage capacity , Small size devices , Relaxed latency , Simple network architecture and protocols . IoT Main Characteristics Low power , Low cost (network and end devices), Short range (first type of technologies) or Long range (second type of technologies), Low bit rate (≠ broadband!), Long battery duration (years), Located in any area (deep indoor, desert, urban areas, moving vehicles …) Low cost 3GPP Rel.8 Cost 75% 3GPP Rel.8 CAT-4 20% 3GPP Rel.13 CAT-1 10% 3GPP Rel.13 CAT-M1 NB IoT Complexity Extended coverage +20dB +15 dB GPRS CAT-M1 NB-IoT IoT Specificities IoT Specificities and Impacts on Network planning and design Characteristics Impact • High sensitivity (Gateways and end-devices with a typical sensitivity around -150 dBm/-125 dBm with Bluetooth/-95 dBm in 2G/3G/4G) Low power and • Low frequencies strong signal penetration Wide Range • Narrow band carriers far greater range of reception • +14 dBm (ETSI in Europe) with the exception of the G3 band with +27 dBm, +30 dBm but for most devices +20 dBm is sufficient (USA) • Low gateways cost Low deployment • Wide range Extended coverage + strong signal penetration and Operational (deep indoor, Rural) Costs • Low numbers of gateways Link budget: UL: 155 dB (or better), DL: Link budget: 153 dB (or better) • Low Power Long Battery life • Idle mode most of the time.
    [Show full text]
  • AT&T and Cradlepoint Deliver One of the First and the Most
    AT&T and Cradlepoint Deliver One of the First and the Most Comprehensive Portfolio of Enterprise-Tailored 5G Solutions in the U.S. Expanding Current Offerings with IT-Focused 5G Enterprise Solutions for Branch and Mobile Dallas, Texas, and Boise, Idaho – April 27, 2021 – AT&T (NYSE:T) and Cradlepoint are expanding their joint network offerings with one of the first and the most comprehensive portfolio of 5G solutions in the U.S. using AT&T Wireless Broadband – the first nationwide business-focused broadband network with 5G coverage to over 230 million people in 14,000 cities and towns. The new solutions combine clean-slate-designed Cradlepoint 5G wideband adapters and routers, and its NetCloud Service, with AT&T's nationwide wireless broadband network, data plans, and an AT&T management option for Cradlepoint devices. Together with AT&T Wireless Broadband, these comprehensive, enterprise-tailored 5G solutions give businesses the flexibility to choose the solution, speed, quality of service, and management structure that fits their needs, with no overage charges. Built for 5G, Built for I.T. When it comes to 5G wireless wide-area network (Wireless WAN) connectivity, enterprises want more than just a simple work-from-home solution and one-size-fits-all data plans. They want to support a broad set of branch and mobile use cases. They need increased end-to-end security and the tools to manage the entire Wireless WAN lifecycle – from deployment to daily operations – or to use an AT&T-managed service to do it for them. Together, AT&T and Cradlepoint offer a comprehensive portfolio of end-to-end 5G solutions in the U.S.
    [Show full text]
  • Mesh Wide Area Network 4300 Series
    Mesh Wide Area Network 4300 Series Doubles the Flexibility of Municipal WiFi and Enterprise Networks The Mesh Wide Area Network (MWAN) 4300 solution is a powerful, next- generation, two radio meshed network. Part of Motorola’s leading-edge wireless broadband portfolio of products, it’s designed to give providers of high-speed public access and public safety networks the flexibility needed to meet performance, capacity and ROI goals. Meet Your Business Case by Increasing Your Capacity, Throughput and Profitability Motorola’s mesh networking technology enables users Compact Size. to wirelessly access broadband applications seamlessly - Weighing less than five pounds, the compact virtually any time and anywhere. Whether providing wireless MWAN 4300 system nodes deliver mounting access to a campus, municipality or residential neighborhood, location possibilities that other larger units can’t Motorola’s MWAN 4300 solution delivers real-time data to match. MWAN 4300 nodes can be installed in a employees, customers or constituents. Mesh networking wide range of locations, including light and utility technology significantly reduces the backhaul costs of wide poles, traffic signals, buildings and more. Slim, scale networks and leverages millions of WiFi enabled aesthetically pleasing designs and low profiles devices already deployed globally. The high performance also help gain community acceptance. MWAN 4300 solution is designed to meet strict cost per Support for Standards- square mile and ROI (return on investment) targets. Easy to Deploy. Based Voice and Video The lightweight and small form factor means Applications. Mesh Wide Area Networks MWAN 4300 networks are designed for the demanding mesh wide area nodes are easy to handle.
    [Show full text]
  • FROM Cable Advisory Committee TO: Truro BOS and Town Administration January 2011 Municipal Area Network and Open Cape in Truro
    FROM Cable Advisory Committee TO: Truro BOS and Town Administration January 2011 Municipal Area Network and Open Cape in Truro: Background information, Definitions, Questions Introduction: This document was prepared by Mike Forgione of the Cable Committee to provide background to town officials and to begin to frame the issues as we prepare for Open Cape’s bringing additional high-speed Internet connections to Truro. Executive Summary During the past year we have heard about the technical terms of Municipal Area Network, I-nets, the Internet and World Wide Web. Along the way, we heard Comcast Broadband service and Open Cape. To make things worse, we heard about Dial-up Service, Digital Subscriber Lines (DSL), Cable Modem Internet, Satellite Internet, Broadband over Power Line, Wireless Networks and 3G/4G wireless. What are these things? Why and when do I need them? What do they do? Below is our attempt to address this very complex and technical topic. Our goal in this document is NOT to make a decision on what Truro needs. Our goals are: 1. To provide an understanding of Networks and the Internet. This understanding will assist us in our decision of a Municipal Area Network for Truro. 2. To begin the discussion of how we can effectively utilize Open Cape to lower the operation cost of Truro’s Information needs. Based on current plans, Open Cape will be fully deployed within the next 3 to 5 years. How will it change Truro? To help simplify these concepts, we will use the example of road system. The US road system, with its local roads, Intrastate highway and Interstate highway offer a good ―real-life‖ example of networks.
    [Show full text]
  • WWAN Device Management with Wavelink Avalanche Manage Your Mobile Devices Both Inside and Outside the Four Walls
    WWAN Device Management with Wavelink Avalanche Manage Your Mobile Devices Both Inside and Outside the Four Walls Wavelink Avalanche® is the industry’s leading solution for automated wireless device management. A comprehensive, vendor-independent management solution for the wireless enterprise, Avalanche eases the configuration, deployment and management of wireless networks, while offering extensive flexibility by supporting a wide range of mobile devices and infrastructure. With Avalanche you are able to bring all your mobile devices under the control of a management system that provides provisioning, maintenance and security. The power of Avalanche can reach well beyond the four-walls of an enterprise. Avalanche is designed to work seamlessly across networks, whether they are on a managed WLAN, using Wi-Fi or over more diverse wireless WAN connections such as cellular networks. Delivering success over the Wireless Wide Area Network Unlike dealing with a wireless LAN which is under your total control, a wireless WAN presents new challenges as coverage cannot be assumed. As a result, these challenges require a management solution that is robust enough to operate over any kind of network that carriers operate. Avalanche provides device management support regardless of the medium available. Whether the connection is via Wi-Fi or WWAN, Avalanche allows administrators to seamlessly carry out their duties without ever inhibiting end-user productivity. Avalanche is also built to be sensitive to the characteristics of a WWAN connection, allowing for limited bandwidth and variable latency. Security Management of any kind over a network should be secure, but encryption over a public medium such as the Internet or over a wide area connection is critical.
    [Show full text]
  • DSL Digital Subscriber Line Technologies, Commonly Known As
    DSL Digital subscriber line technologies, commonly known as DSL, represent a family of broadband technologies that use a greater range of frequencies over existing telephone lines than traditional telephone services. This provides greater bandwidth to send and receive information. DSL speeds range from 128 Kbps to 52 Mbps depending upon the particular DSL standard and the distance between the central office and the subscriber. These data rates allow local exchange carriers to provide, and end users to receive, a wide range of new broadband services. DSL technology has a number of standards or line codes used worldwide. We support all standards-based line codes, such as asymmetric DSL, or ADSL, ADSL2, ADSL2+ and very-high-speed DSL, or VDSL, including the standard Annexes used in North America, Europe, Japan and China. In addition, we provide end-to-end technology, with solutions designed for both customer premises equipment, or CPE, and central office applications. Our DSL technologies enable local exchange carriers and enterprise networking vendors to deliver bundled broadband services, such as digital video, high-speed Internet access, VoIP, video teleconferencing and IP data business services, over existing telephone lines. DSL Modem and Residential Gateway Solutions. For DSL CPE applications, we provide products that address the wide variety of local area network, or LAN, connectivity options, including Ethernet, USB-powered solutions, VoIP-enabled access devices and IEEE 802.11 wireless access points with multiple Ethernet ports. These solutions also provide a fully scalable architecture to address emerging value-added services such as in-home voice and video distribution. Wide area network connectivity is provided using integrated, standards-compliant PHY technology.
    [Show full text]
  • Wide Area Network
    Wide area network A wide area network (WAN) is a telecommunications network or computer network that extends over a large geographical distance. Wide area networks are often established with leased telecommunication circuits.[1] Business, education and government entities use wide area networks to relay data to staff, students, clients, buyers, and suppliers from various locations across the world. In essence, this mode of telecommunication allows a business to effectively carry out its daily function regardless of location. The Internet may be considered a WAN.[2] Related terms for other types of networks are personal area networks (PANs), local area networks (LANs), campus area networks (CANs), or metropolitan area networks (MANs) which are usually limited to a room, building, campus or specific metropolitan area respectively. Contents Design options Connection technology List of WAN types See also References External links Design options The textbook definition of a WAN is a computer network spanning regions, countries, or even the world.[3] However, in terms of the application of computer networking protocols and concepts, it may be best to view WANs as computer networking technologies used to transmit data over long distances, and between different LANs, MANs and other localised computer networking architectures. This distinction stems from the fact that common LAN technologies operating at lower layers of the OSI model (such as the forms of Ethernet or Wi-Fi) are often designed for physically proximal networks, and thus cannot transmit data over tens, hundreds or even thousands of miles or kilometres. WANs do not just necessarily connect physically disparate LANs. A CAN, for example, may have a localized backbone of a WAN technology, which connects different LANs within a campus.
    [Show full text]
  • Understanding Wide Area Networks
    Understanding Wide Area Networks Module 7 Objectives Skills/Concepts Objective Domain Objective Domain Description Number Understanding routing Understanding routers 2.2 Defining common WAN Understanding wide area 1.3 technologies and networks (wan’s) connections Routing • Routing is the process of managing the flow of data between network segments and between hosts or routers • Data is sent along a path according to the IP networks and individual IP addresses of the hosts • A router is a network device that maintains tables of information about other routers on the network or internetwork Static and Dynamic Routing • A static route is a path that is manually configured and remains constant throughout the router’s operation • A dynamic route is a path that is generated dynamically by using special routing protocols Static Dynamic Dynamic Routing • Dynamic routing method has two conceptual parts: • Routing protocol used to convey information about the network environment • Routing Algorithm that determines paths through the network • Common Dynamic routing protocols: • Distance vector routing protocols: Advertise the number of hops to a network destination (distance) and the direction a packet can reach a network destination (vector). Sends updates at regularly scheduled intervals, and can take time for route changes to be updated • Link state routing protocols: Provide updates only when a network link changes state • Distance Vector Routing • Routing Information Protocol (RIP) • Link State Routing • Open Shortest Path First (OSPF) Interior
    [Show full text]
  • The Future of Personal Area Networks in a Ubiquitous Computing World
    Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and private study only. The thesis may not be reproduced elsewhere without the permission of the Author. The Future of Personal Area Networks in a Ubiquitous Computing World A thesis presented in partial fulfillment of the requirements for the degree of Master of Information Sciences in Information Systems at Massey University, Auckland New Zealand Fei Zhao 2008 ABSTRACT In the future world of ubiquitous computing, wireless devices will be everywhere. Personal area networks (PANs), networks that facilitate communications between devices within a short range, will be used to send and receive data and commands that fulfill an individual’s needs. This research determines the future prospects of PANs by examining success criteria, application areas and barriers/challenges. An initial set of issues in each of these three areas is identified from the literature. The Delphi Method is used to determine what experts believe what are the most important success criteria, application areas and barriers/challenges. Critical success factors that will determine the future of personal area networks include reliability of connections, interoperability, and usability. Key application areas include monitoring, healthcare, and smart things. Important barriers and challenges facing the deployment of PAN are security, interference and coexistence, and regulation and standards. i ACKNOWLEDGEMENTS Firstly, I would like to take this opportunity to express my sincere gratitude to my supervisor – Associate Professor Dennis Viehland, for all his support and guidance during this research. Without his advice and knowledge, I would not have completed this research.
    [Show full text]
  • Wide Area Network (WAN)
    Office of Information Technology Services Service Level Agreement Wide Area Network (WAN) January 16, 2014 v2.2 Service Description Wide Area Network (WAN) Service Description The Wide Area Network (WAN) service offers statewide Internet Protocol (IP) data communications connectivity at commercially available rates to any authorized government entity. The managed WAN service connects the customer’s Local Area Network (LAN) to other customer locations, other state agencies (including ITS), and to the Internet using the state network. ITS will provide consultation to aid in the selection of data services. Service Types: Guaranteed – Symmetrical guaranteed bandwidth tiers Best Effort – Asymmetrical no guaranteed bandwidth tiers Service components include: Redundant core network infrastructure Redundant high capacity access to the Internet Last mile transport o Symmetrical – (Fiber, Ethernet, and Frame Relay) o Asymmetrical – (DSL, Cable, and Cellular 4G) All equipment required to interface service with customer LAN IP addresses for each device Domain Name Service Enterprise Services Access Point - which is a centrally managed secure access for all ingress/egress traffic to/from agency virtual networking private routing domain(s). Service Commitments The general areas of support (such as Incident and Change Management) applicable to every ITS service, are specified in the ITS Global Service Levels document. WAN Service is defined as: network connectivity associated with each individual remote customer premise location (site) subscribing to service. WAN Service metrics are measured monthly and site specific, but reports are aggregated at the agency level. WAN service follows the response and resolution times described in the Global Service Levels document, with the exception of Best Effort services delivered via asymmetrical broadband technologies.
    [Show full text]
  • Wireless Networks DCAP607/DCAP311
    Wireless Networks DCAP607/DCAP311 Edited by: Dr. Manmohan Sharma WIRELESS NETWORKS Edited By Dr. Manmohan Sharma Printed by EXCEL BOOKS PRIVATE LIMITED A-45, Naraina, Phase-I, New Delhi-110028 for Lovely Professional University Phagwara SYLLABUS Wireless Networks Objectives: Sr. No. Topics 1. Introduction to Wireless Networks. IEEE Standards for Wireless Networks. Wireless Networks Applications. Types of Wireless Networks. Benefits of Wireless Networks. 2. Wireless System Architecture: Wireless System Components, Network Architecture. Information Signals. Radio Frequency and Light Signal Fundamentals: Wireless Transceivers, understanding RF Signals, Working of Light Signals 3. Types of Wireless Networks: WPAN, WLAN, WMAN Wireless PAN: Components: User Devices, Radio NIC, USB Adapters, Wireless Routers, Bluetooth Dongles etc. Wireless PAN Systems: SOHO Equipments, Printing, Accessing Internet, Accessing PDA’s, Mobile Phones Wireless PAN Technologies: IEEE 802.15. Bluetooth Version 1 and Version 2. 4. Wireless LAN: Meaning, Components: User Devices, Radio NIC’s, Access Points, Routers, Repeaters, And Antennae. SOHO Applications: Internet Access, Printing, Remote Accessing. Public Wireless LAN’s, and AdHoc Wireless LAN’s 5. Wireless MAN: Meaning and Components: Bridges, Bridges Vs. Access Points, Ethernet to Wireless Bridges, Workgroup Bridges 6. Wireless MAN Systems: Point to Point Systems, Point to Multi Point, Packet Radio Systems. 7. Wireless WAN: WAN User Devices, Base Stations, Antennae. Wireless WAN Systems: Cellular-Based Wireless WANs, First-Generation Cellular, Second-Generation Cellular, Third-Generation Cellular. 8. Space-Based Wireless WANs: Satellites, Meteor Burst Communications 9. Wireless Networks Security: Security Threats, Unauthorized Access, Middle Attacks, DoS Attack (Denial of Service). Sr. No. Topics 1. Introduction to Wireless Networks. IEEE Standards for Wireless Networks.
    [Show full text]