Software Advance Wireless Communication

Software Advance Wireless Communication

SOFTWARE ADVANCE WIRELESS COMMUNICATION A.Sivasankari.1, S.Kalaiyarasi2, V.Satheeshwari3 1Assistant Professor, Dept of Computer Applications, Dhanalakshmi Srinivasan College of Arts and Science, for Women, Perambalur (India) 2,3Dept of Computer Applications Dhanalakshmi Srinivasan College of Arts and Science for Women, Perambalur (India) ABSTRACT This paper provides a systematic analysis of the key issues upon which the deployment 3G infrastructure is contingent. Its overall purpose is to help elevate the understanding of the issues at stake and of the available options and trade-offs. Given the nascent state of the UMTS industry, a multi-pronged approach was pursued combining a series of expert interviews with players in the Dutch market and a systematic review of the available empirical evidence. Preliminary conclusions suggest the coincidence of the launch of this investment project with a general downturn in the technology sector has left mobile operators in a precarious position. the commitments required by spectrum auctions, both financial and in terms of network rollout, limit the flexibility of firms in making investment decisions and have exacerbated the consequences of the economic.Wireless communication is among technology’s biggest contributions to mankind. Wireless communication involves the transmission of information over a distance without help of wires, cables or any other forms of electrical conductors. The transmitted distance can be anywhere between a few meters (for example, a television’s remote control) and thousands of kilometres (for example, radio communication). Wireless communication 33 | P a g e Keywords: Wireless local area networks power control land mobile radio data communications personal communication. I. INTRODUCTION Introduction Radio or wireless–there must be a big difference; they are spelled a little different. Wireless does not mean sparks, noise, or a lot of switches. Wireless means communication without the use of wires other than the antenna, the ether, and ground taking the place of wires. Radio means exactly the same thing: it is the same process. Communications by wireless waves may consist of an SOS or other messages from a ship at sea or the communication may be simply the reception of today‟s top 10 music artists, or connecting to the Internet to check your email. It does not become something different in either spelling or meaning. II. ABOUT THE TECHNOLOGY 2.1 Wireless Communication History The history of modem wireless communications started in1896 with Marconi, who demonstrated wireless telegraphy by sending and receiving Morse code, based on long-wave (>> 1 kmwave length) radiation, using high-power transmitters. In 1907, the first commercial trans-Atlantic wireless service was initiated, using huge ground stations and 30 m x 100 m antenna masts. World War I saw the rapid development of communication intelligence, intercept technology, cryptography, and other technologies that later became critical to the advent of a modem wireless system. In 1920, Marconi discovered shortwave ( < 100 m wavelength)transmission. Such waves undergo reflections, refractions, absorption, and bounce off the ionosphere, making for much more efficient transmission. 2.2 Why Need Wireless Wireless is increasingly taking place of where there used to be cables in communications. Considering reasons of this trend, there are several features of wireless as below: Mobility. Wireless communications are better connected without cables covering everywhere. Furthermore, devices can be much more mobilized within the certain area. Take ZigBee for example, the distance can be far as 1600m. Simplicity. It is much easier and faster to get devices communicated without cables. When under some a point the commuting devices should be relocated, wireless makes it a simple matter. Besides, there would be no additional cost caused by rewiring or excessive downtime or else. Never the less, there would be no disruption to the remainder of the system when additional devices need to be added in or some devices need to be removed from the system. Flexibility. Wireless can be used into communication where cables are not suitable, like some historical buildings and coaches. Cost-saving. The cost of running and maintaining a radio based communications solution is minimal compared to wired ones. 34 | P a g e 2.3 Why Zig Bee Generally speaking, Zig Bee contains lots of merits, such as: support for multiple network topologies, such as point to point, point to multiple and mesh networks. low duty cycle, which means long battery life. low latency direct sequence spread spectrum up to 65000 nodes per network 128-bit AES encryption for secure data connection Top of Form In a world of increasing mobility, there is a growing need for people to communicate with each other and have timely access to information regardless of the location of the individuals or the information. A phone call placed from a commuter train may close a business deal, remote access to medical records by a paramedic may save a life, or a request for reconnaissance updates by a soldier with a handheld device may affect the outcome of a battle. Each of these instances of mobile communications poses an engineering challenge that can be met only with an efficient, reliable, wireless communication network. The demand for wireless communication systems of increasing sophistication and ubiquity has led to the need for a better understanding of fundamental issues in communication theory and electro magnetics and their implications for the design of highly-capable wireless systems. III. COMPARISON When using a wireless access point or routerit is important to remember that if you can send information from one device and receive it at another, anyone else within range might also be able to receive it. When protecting data send via wireless, security and protection is offered through encryption schemes that come with your wireless hardware you can enable. 3.1 Wireless Encryption Protocol (WEP) Explained Short for Wired Equivalent Privacy (or Wireless Encryption Protocol), WEP is part of the IEEE 802.11 wireless networking standard and was designed to provide the same level of security as that of a wired LAN. Because wireless networks broadcast messages using radio, they are susceptible to eavesdropping. WEP provides security by encrypting data over radio waves so that it is protected as it is transmitted from one end point to another. 3.2 WEP's Major Weakness WEP's major weakness is its use of static encryption keys. When you set up a router with a WEP encryption key, that one key is used by every device on your network to encrypt every packet that's transmitted. But the fact that packets are encrypted doesn't prevent them from being intercepted, and due to some esoteric technical flaws it's entirely possible for an eavesdropper to intercept enough WEP-encrypted packets to eventually deduce what the key is. This problem used to be something you could mitigate by periodically changing the WEP key (which is why routers generally allow you to store up to four keys). But few bother to do this because changing WEP 35 | P a g e keys is inconvenient and time-consuming because it has to be done not just on the router, but on every device that connects to it. As a result, most people just set up a single key and then continue using it ad infinitum. IV. .IMPROVEMENTS OVER WEP Improved data encryption through the temporal key integrity protocol (TKIP). TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven't been tampered with. User authentication, which is generally missing in WEP, through the extensible authentication protocol (EAP). WEP regulates access to a wireless network based on a computer's hardware-specific MAC address, which is relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key encryption system to ensure that only authorized network users can access the network.WPA has been a mainstream technology for years now, but WEP remains a standard feature on virtually every wireless router on store shelves today. Although it's mainly there for backward compatibility with the oldest hardware, if reports and studies are accurate, a significant percentage of WLANs operating today (especially those used in homes) are still using outdated and insecure WEP for their encryption. 4.1Network Encryption Using WPA Personal/PSK To encrypt a network with WPA Personal/PSK you provide your router not with an encryption key, but rather with a plain-English passphrase between 8 and 63 characters long. Using a technology called TKIP (for Temporal Key Integrity Protocol), that passphrase, along with the network SSID, is used to generate unique encryption keys for each wireless client. And those encryption keys are constantly changed. (Although WEP also supports passphrases, it does so only as a way to more easily create static keys, which are usually comprised of the hex characters 0-9 and A-F). V. ISSUE/CHALLENGS The challenges for UMTS are also created by issues of market co-ordination, uncertainty surrounding the marketability of UMTS-based services, and competition from other technologies. Although technology for UMTS is quite new, there was a high level of confidence among the interviewed experts that solutions to any implementation problem scan be found. The question thus becomes how long will it take to develop these solutions? One aspect of market co-ordination is that delay in the technical implementation of networks and terminals will impede the roll-out of services. One can see this happen with the rollout of 2.5G networks like GPRS. Network facilities have been in place and ready for almost a year, however due to the lack of terminals in production quantities no large scale service rollout is possible. Consequently, revenue I snot generated allowing the possibilities for other technologies to catch up and take over market opportunities.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us