Quick viewing(Text Mode)

Software Advance Wireless Communication

Software Advance Wireless Communication

SOFTWARE ADVANCE WIRELESS COMMUNICATION A.Sivasankari.1, S.Kalaiyarasi2, V.Satheeshwari3 1Assistant Professor, Dept of Computer Applications, Dhanalakshmi Srinivasan College of Arts and Science, for Women, Perambalur (India) 2,3Dept of Computer Applications Dhanalakshmi Srinivasan College of Arts and Science for Women, Perambalur (India)

ABSTRACT This paper provides a systematic analysis of the key issues upon which the deployment 3G infrastructure is contingent. Its overall purpose is to help elevate the understanding of the issues at stake and of the available options and trade-offs. Given the nascent state of the UMTS industry, a multi-pronged approach was pursued combining a series of expert interviews with players in the Dutch market and a systematic review of the available empirical evidence. Preliminary conclusions suggest the coincidence of the launch of this investment project with a general downturn in the technology sector has left mobile operators in a precarious position. the commitments required by spectrum auctions, both financial and in terms of network rollout, limit the flexibility of firms in making investment decisions and have exacerbated the consequences of the economic.Wireless communication is among technology’s biggest contributions to mankind. Wireless communication involves the transmission of information over a distance without help of wires, cables or any other forms of electrical conductors. The transmitted distance can be anywhere between a few meters (for example, a television’s remote control) and thousands of kilometres (for example, radio communication).

Wireless communication

33 | P a g e

Keywords: Wireless local area networks power control land mobile radio data communications personal communication.

I. INTRODUCTION

Introduction Radio or wireless–there must be a big difference; they are spelled a little different. Wireless does not mean sparks, noise, or a lot of switches. Wireless means communication without the use of wires other than the antenna, the ether, and ground taking the place of wires. Radio means exactly the same thing: it is the same process. Communications by wireless waves may consist of an SOS or other messages from a ship at sea or the communication may be simply the reception of today‟s top 10 music artists, or connecting to the Internet to check your email. It does not become something different in either spelling or meaning.

II. ABOUT THE TECHNOLOGY 2.1 Wireless Communication History The history of modem wireless communications started in1896 with Marconi, who demonstrated wireless telegraphy by sending and receiving Morse code, based on long-wave (>> 1 kmwave length) radiation, using high-power transmitters. In 1907, the first commercial trans-Atlantic wireless service was initiated, using huge ground stations and 30 m x 100 m antenna masts. World War I saw the rapid development of communication intelligence, intercept technology, cryptography, and other technologies that later became critical to the advent of a modem wireless system. In 1920, Marconi discovered shortwave ( < 100 m wavelength)transmission. Such waves undergo reflections, refractions, absorption, and bounce off the ionosphere, making for much more efficient transmission.

2.2 Why Need Wireless Wireless is increasingly taking place of where there used to be cables in communications. Considering reasons of this trend, there are several features of wireless as below:  Mobility. Wireless communications are better connected without cables covering everywhere. Furthermore, devices can be much more mobilized within the certain area. Take ZigBee for example, the distance can be far as 1600m.  Simplicity. It is much easier and faster to get devices communicated without cables. When under some a point the commuting devices should be relocated, wireless makes it a simple matter. Besides, there would be no additional cost caused by rewiring or excessive downtime or else. Never the less, there would be no disruption to the remainder of the system when additional devices need to be added in or some devices need to be removed from the system.  Flexibility. Wireless can be used into communication where cables are not suitable, like some historical buildings and coaches.  Cost-saving. The cost of running and maintaining a radio based communications solution is minimal compared to wired ones.

34 | P a g e

2.3 Why Zig Bee Generally speaking, Zig Bee contains lots of merits, such as: support for multiple network topologies, such as point to point, point to multiple and mesh networks.  low duty cycle, which means long battery life.  low latency  direct sequence  up to 65000 nodes per network  128-bit AES encryption for secure data connection  Top of Form In a world of increasing mobility, there is a growing need for people to communicate with each other and have timely access to information regardless of the location of the individuals or the information. A phone call placed from a commuter train may close a business deal, remote access to medical records by a paramedic may save a life, or a request for reconnaissance updates by a soldier with a handheld device may affect the outcome of a battle. Each of these instances of mobile communications poses an engineering challenge that can be met only with an efficient, reliable, wireless communication network. The demand for wireless communication systems of increasing sophistication and ubiquity has led to the need for a better understanding of fundamental issues in communication theory and electro magnetics and their implications for the design of highly-capable wireless systems.

III. COMPARISON

When using a or routerit is important to remember that if you can send information from one device and receive it at another, anyone else within range might also be able to receive it. When protecting data send via wireless, security and protection is offered through encryption schemes that come with your wireless hardware you can enable.

3.1 Wireless Encryption Protocol (WEP) Explained Short for (or Wireless Encryption Protocol), WEP is part of the IEEE 802.11 wireless networking standard and was designed to provide the same level of security as that of a wired LAN. Because wireless networks broadcast messages using radio, they are susceptible to eavesdropping. WEP provides security by encrypting data over radio waves so that it is protected as it is transmitted from one end point to another.

3.2 WEP's Major Weakness WEP's major weakness is its use of static encryption keys. When you set up a router with a WEP encryption key, that one key is used by every device on your network to encrypt every packet that's transmitted. But the fact that packets are encrypted doesn't prevent them from being intercepted, and due to some esoteric technical flaws it's entirely possible for an eavesdropper to intercept enough WEP-encrypted packets to eventually deduce what the key is. This problem used to be something you could mitigate by periodically changing the WEP key (which is why routers generally allow you to store up to four keys). But few bother to do this because changing WEP

35 | P a g e

keys is inconvenient and time-consuming because it has to be done not just on the router, but on every device that connects to it. As a result, most people just set up a single key and then continue using it ad infinitum.

IV. .IMPROVEMENTS OVER WEP

 Improved data encryption through the temporal key integrity protocol (TKIP). TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven't been tampered with.  User authentication, which is generally missing in WEP, through the extensible authentication protocol (EAP). WEP regulates access to a based on a computer's hardware-specific MAC address, which is relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key encryption system to ensure that only authorized network users can access the network.WPA has been a mainstream technology for years now, but WEP remains a standard feature on virtually every wireless router on store shelves today. Although it's mainly there for backward compatibility with the oldest hardware, if reports and studies are accurate, a significant percentage of WLANs operating today (especially those used in homes) are still using outdated and insecure WEP for their encryption.

4.1Network Encryption Using WPA Personal/PSK To encrypt a network with WPA Personal/PSK you provide your router not with an encryption key, but rather with a plain-English passphrase between 8 and 63 characters long. Using a technology called TKIP (for Temporal Key Integrity Protocol), that passphrase, along with the network SSID, is used to generate unique encryption keys for each wireless client. And those encryption keys are constantly changed. (Although WEP also supports passphrases, it does so only as a way to more easily create static keys, which are usually comprised of the hex characters 0-9 and A-F).

V. ISSUE/CHALLENGS

The challenges for UMTS are also created by issues of market co-ordination, uncertainty surrounding the marketability of UMTS-based services, and competition from other technologies. Although technology for UMTS is quite new, there was a high level of confidence among the interviewed experts that solutions to any implementation problem scan be found. The question thus becomes how long will it take to develop these solutions? One aspect of market co-ordination is that delay in the technical implementation of networks and terminals will impede the roll-out of services. One can see this happen with the rollout of 2. networks like GPRS. Network facilities have been in place and ready for almost a year, however due to the lack of terminals in production quantities no large scale service rollout is possible. Consequently, revenue I snot generated allowing the possibilities for other technologies to catch up and take over market opportunities. Finally, UMTS will also face challenges from other technologies. While rollout of 3Gnetworks is on its way, other technologies for wireless access to high-speed data networks are developing quickly. In particular wireless (W-LAN)technology has been standardised (IEEE 802.11b, WiFi) and products are coming to

36 | P a g e

market (BWCS, 2001). Also short range radio connectivity through -enabled devices is being introduced in a greater number of product new uses for Bluetooth in indoor real time positioning systems. The new low power version of Bluetooth (Bluetooth Smart) should mean that it is left running more of the time and so becomes useful for location services using Bluetooth. Bluetooth beacons also have potential to push information to proximate 'potential' customers for marketing, although this is unlikely to be popular with those receiving them. Real time location services are already extremely important, so establishing and tracking indoor location where GPS does not work well could easily become very important for Bluetooth. However, other technologies with different characteristics (e.g. WiFi, ZigBee, DASH7) are bound to be strong competitors for real time location services, especially when they too are embedded in mobile personal devices like smart phones and tablets.  Interaxon Inc. is developing a 'brainwave-controlled-interface' called Muse that connects to smart phones via Bluetooth. A range of apps are planned for "productivity, creativity, and fun". Interaxon are using crowd-funding to bring the product to market.  Apigy Inc. has a battery powered door lock called Lockitron that connects using WiFi. It can unlock when it detects recognised phones equipped with Bluetooth and send a notification that the phone was seen.

5.1 Wi-Fi Direct Wi-Fi Direct was developed by the Wi-Fi Alliance to enable ad hoc communication between paired WiFi enabled devices using either the 2.4GHz or 5Ghz bands. It makes use of WPA2 implementation of the 802.11i amendment, and the Wi-Fi Alliance's own Wi-Fi Multimedia (WMM) interoperability certification - which provides '' features and was based on the based on the IEEE 802.11e amendment. The Wi-Fi Alliance say of WiFi Direct: "The specification underlying the Wi-Fi Direct certification program was developed within the Wi-Fi Alliance by member companies. It operates on 802.11 devices but is not linked to any specific IEEE 802.11 amendment." Nonetheless, Wi-Fi Direct is obviously substantially based on standards developed by the IEEE.

5.2 Fast Roaming and WiFi Passpoint Pass point is a relatively new program developed by the Wi-Fi Alliance based on the earlier Hotspot 2.0 initiative. It enables moving devices to seamlessly handover wireless data transfer between wireless network infrastructure, behaviour already defined in the fast roaming standard. Pass point also allows equpment to move between networks, even those owned by different service providers.

37 | P a g e

An Aruba Networks press release notes that the combination of their Aruba 3600 Mobility Controller and AP- 105 Access Point has been certified for interoperability with by the Wi-Fi Alliance's 'Wi-Fi CERTIFIED Passpoint Program'.

5.3Voice and Multimedia The recent Wi-Fi Alliance 'Wi-Fi CERTIFIED Voice-Enterprise' program is concerned with enterprise-grade support for voice applications over WiFi networks. It specifies voice quality, mobility, power saving and security and is based on the 'Wi-Fi Voice-Personal' certification program. It also uses previous work on the Wi- Fi Multimedia (WMM), WMM-Power Save, and WMM-Admission Control certification programs for quality of service, along with security provided by Wi-Fi Protected Access 2 (WPA2) Enterprise.

5.4 DASH7 DASH7 technology is based on the ISO/IEC 18000-7 open standard. It works at a lower frequency than even the lowest frequency used by Zig Bee so it is particularly useful to communicate through materials that strongly attenuate radio frequency

5.5 Ocean The En Ocean Alliance promotes self-powered wireless monitoring and control systems. Energy is collected from a number of environmental opportunities, such as heat, light, motion, and electromagnetic energy. This technology is primarily aimed at equipment embedded in buildings, such as switches, sensors, and controllers.

5.6 Cognitive radio Cognitive radio is an example of wideband with dynamic spectrum management. It attempts to make the best use of the available spectrum by detecting areas of it that are unused and rapidly switching to use them. Rapid switching is important because spectrum may be used intermittently. Acceptance of this kind of equipment depends on it demonstrating that it will not interfere with frequency assigned services and so gaining approval from regulatory authorities. This is a complex solution to a lack of available radio

5.7 Li-Fi

38 | P a g e

The Li-Fi Consortium is a non-profit organization promoting the use of light as a data carrier i.e. optical wireless communication (OWC). High data densities are easier to achieve with light than radio waves, so low cost high throughput is easier too. There is obviously big potential for LiFi as it extends the capabilities of existing technology which is ubiquitous. It could be useful in the concept of Myrmidon APs. A company called pure LiFi is attempting commercialise Li- Fi. They are a spin-out from research into visible light communication at the University of Edinburgh.

5.8 Laser Extremely short pulse laser light has been developed and is capable of carrying large amounts of information. A characteristic of light is of course that it does not penetrate solid objects, but is reflected. Reflection can be used to reach around obstacles. In an interesting recent development different arrival times of short laser light pulses reflected from surfaces were used to calculate the position of multiple surfaces and so to build up a spatial representation of them so they can be used to image an interior.

VI. CONCLUSION

Wireless technology is becoming more and more popular because of its low cost and ease-of-use. In many cases wireless has become cheaper than the wired alternative. This technology allows us a faster and more convenient access to the world. XBee technology provides the world with a variety of wireless applications. The direct interfacing of analog sensors and digital io, makes Xbee widely acceptable in variety of areas. From a simple domestic application of temperature control to the more complex mesh sensor networks that analyze volcano, XBee devices are gradually becoming an industry standardin wireless communication.

REFERENCES

1. IEEE 802 Group Web site: http://grouper.ieee.org/groups/802. 2. IEEE 802.11 Group Web site: http://grouper.ieee.org/groups/802. /11. 3. IEEE 802.15 Group Web site: http://grouper.ieee.org/groups/802115. 4. T. S. Rappa port, Wireless Communications: Principles andPractice, Upper Saddle River, New Jersey, Prentice Hall, 2002. 5. A. J. Viterbi, CDMA Principles of Spread Spectrum Communication,Reading, MA, Addison-Wesley, 1995. 6. V. K. Garg, Wireless Network Evolution: 2G to 3G, Upper SaddleRiver, New Jersey, Prentice Hall, 2002. 7. Bluetooth SIG Web site: http://www.bluetooth.org. 8. HiperLAN2 Global Forum Web site: http://www.hiperlan2.com 9. Home RF Web site: http://www.homerf.org. 10. W. C. Y. Lee, Mobile Cellular Telecommunications Systems,New York, McGraw Hill, 1989. 11. M. Yacoub, Foundations of Mobile Radio Engineering, CRC Press, 1993. 12. IEEE, Wireless Media Access Control (MAC) and Physical Layer (PHY) Specification, P802.11D6.2, July 1998.

39 | P a g e

13. Aly ElOsery, Autonomous Power Control in CDMA Cellular „Systems, PhD dissertation, EECE Department, University of New Mexico, 2001. 14. P. Gupta and P. Kumar, “The Capacity of Wireless Networks,” IEEE Transactions on Information Theory, IT-46, May 2000. 15. A. B. MacKenzie and S. B. Wicker, “Game Theory and the Design of Self-Configuring, Adaptive Wireless Networks,”IEEE Communications Magazine, 39, 11, November 2001, pp. 126-131. 16. R. Ziemer, R. Peterson, and D. Borth, Introduction to Spread Spectrum Communications, Upper Saddle River, New Jersey, Prentice-Hall, 1995. 17. W. C. Y. Lee,Digital Communications, 4th Edition, New York, McGraw Hill, 2000. 18. J. W. Norenberg, “Bridging Wireless Protocols,”IEEE Communications Magazine, 39, 1 1 ,November 2001, pp. 90-97.

BIBLIOGRAPHY NOTE Mrs. A.Sivasankari - Received M.C.A., M.Phil., Degree in Computer Science. She has 9 years of Teaching Experience. She had presented 5 papers in International Conference and also she presented 4 papers in National Conference.She is currently working as Assistant Professor in Department of Computer Applications in Dhanalakshmi Srinivasan College of Arts and Science for Women, Perambalur, Tamil Nadu, India.

Ms.S.KALAIYARASI., PG scholar, [Department of CA] ,Pursuing M.C.A Computer Applications in Dhanalakshmi Srinivasan College of Arts & science for women, Perambalur-621212, TamilNadu, (India)

Ms.V.satheeshwari ., PG scholar, [Department of CA] ,Pursuing M.C.A Computer Applications in Dhanalakshmi Srinivasan College of Arts & science for women, Perambalur-621212, TamilNadu, (India)

40 | P a g e