Wireless Network Computer Architecture Chapter:6

 Wireless Network Computer Architecture

Wireless networking is an all-encompassing concept that has revolutionized the way we live. 

we do things. led to a complete overhaul of the entire connection 

 computer. At the beginning of this book, we discussed the various components used. 

To facilitate wired networks. Similar components are also required. 

wireless network. Of the entire computer network infrastructure, 

 Around the world, wireless networks are only part of this. independent from 

No matter how limited this infrastructure is, care must be taken to ensure this. 

Functionality is guaranteed. 

Goodlinkcommunication


In this chapter, we will take a closer look at the various components of. 

Wireless communication. Also consider wireless applications 

The protocol, its model, and its architecture. We will investigate this further 

Architecture of Bluetooth, MOBITEX, CDPD, I-MODE. Keep reading. 

wireless communication components 

Wireless communication has become an integral part of our relationship 

with other people. This is due to rapid development and is important 

Innovations of the past few decades. A world where it's not needed 

A wire that supports the transmission of data from one point to another. 

Wireless communication has made it much easier to exchange data and information 

 Keep it as simple as possible. There are several types: 

Broadcast, infrared, satellite, microwave, Bluetooth. Among them are 

 will be explained in the next chapter. 

The components that make up the basic infrastructure of are: 

wireless communication network.


USER


This is the most important part of a wireless communication network. of 

Factors do not necessarily imply human entities. "Users" simply means "Everyone." 

An entity that uses a wireless network directly. Of course most of them 

A common user type is a person. But as mentioned earlier, being a user is not being a user 

limited to this range. User can also be a robot to receive it 

Instructions directly from central computer via wireless network 

Manage the manufacturing process. Fundamentally, wireless networks are meant to provide services. 

Therefore, the main beneficiary of a wireless network is the user. 

Therefore, it is very important from a wireless communication point of view. 

Communication network. 

Users have the option to start and stop using the WLAN. 

Therefore, it is safe to refer to users as "end users." Anyone 

Operate computers designed to run a variety of applications 

It is the user who uses the wireless network as an interface to complete specific tasks. 

Users of a computer network can be either fixed users or mobile users. ability 

One reason is that you can use your wireless network on the go. 

Very popular. This is a limitation on the wired network side. very 

Individuals can use the school's WiFi while on the go 

Through the campus. 

You may also be able to operate your computer wirelessly. 

 Network indefinitely. This can also happen in the office 

or a location with a faster internet connection


The Computer Devices


This is another important part of your wireless network. these are 

A so-called client that exists within a wireless network. Via WiFi 

Networks have different computing devices based on their capabilities. 

Run on the network. There are also things that are basically aimed at end users. 

 On the other hand, some are end systems. Computer devices can do this 

They communicate with each other over the same wireless network. The various end systems within a wireless network include servers, databases, and more. 

website. These end systems are containers with information stores. 

This can be displayed to end users in different locations. On the user side 

You can customize each device and use it to access the information you need. 

For example, users can purchase and install wireless network interface cards. 

(NIC) into my laptop. Once this installation is complete, you will be able to use 

With certain wireless network types. Various computing devices always come with an operating system 

they are different. There are many different operating systems (OS). 

Including; Windows, LINUX, Mac OS. The main features of 

The operating system is intended to control the software used in the implementation. 

network application.


Nic 

This is known and discussed as a network interface card. 

 At the beginning of this book. is a very important part of wireless communication 

The network is similar to a wired network. These devices are mainly 

connected to a computer system, but in some cases this can also be 

It remains as an external device. 

Air medium 

Air, or the atmosphere, has more than just a function. 

life. In recent decades, it has served as a medium for this. 

Maintains the propagation of wireless communication signals. of 

Propagation is a key element of wireless networks. it is, 

Transfer information between your computer and other devices 

wireless network. 

Information and data in mobile communications are 

It is subject to the various limiting factors mentioned above. quality of 

Transmission always depends on aerial obstacles and range 

Where the signal needs to pass. 

 Wireless application protocols 

Wireless application protocols are specifications specifically designed for: 

Categories of communication protocols used in standardization 

How wireless devices are used to access the Internet. device of 

In this case, we are talking about mobile phones and radios. 

Internet access is a ubiquitous feature that is enabled by using 

various technologies. The idea of ​​a wireless application network is 

Designed by 4 companies. Ericsson, Motorola, Nokia, 

An unwired planet.


There are four main layers in a wireless application network. 

Wireless Application Environment (WAE): This is 

device specifications and 

Content development programming languages ​​such as WML. 

Wireless Session Protocol (WSP): This represents a session. 

Layers for quick connections and pauses 

And reconnect. 

Wireless Transport Layer Security (WTLS): This is 

a security layer that provides data integrity to the system; 

Data protection and authentication. 

Wireless Transport Layer (WTP): Transaction Layer 

Runs on user datagram protocol. one of the most important 

Its function is to provide transactional support. Wireless Datagram Protocol: This is the transport layer; 

represents a consistent data format. 

WAP model 

The WAP model is very simple. user opens browser 

mobile device. Enter the URL of the website you want to visit 

browser. The URL is encrypted and sent to the network using: 

WAP protocol via WAP gateway. When the data reaches the WAP gateway, the request is converted into the following format: 

Traditional HTTP URL requests are sent via: 

internet. When the request finally reaches the destination web server, it looks like this: 

processed and the response is sent back to the device via the WAP gateway. 

The response will be sent in the form of her WML file that only one person can view. 

micro browser. 

WAP architecture 

What's special about the WAP model is that it exists. 

different layers. These layers are arranged in a special architecture 

Facilitate the realization of the intended task. Basically WAP is designed 

In layered form. Due to the layers, it is very stretchy. 

 And be flexible. Another element that defines the WAP framework 

What makes this special is that it's scalable. In the above paragraph, I have given a superficial view, 

look at the different layers 

These layers form the actual foundation on which WAP runs. 

Bluetooth architecture 

The term Bluetooth probably isn't new to you, and it shouldn't be. with 

Bluetooth was used when using mobile phones and PCs 

It is ubiquitous because it is one of the earliest forms of wireless file sharing 

Communication network. Thanks to Bluetooth, you don't need a USB cable 

Transfer files. A simple tap and connection is all you need. However, we do 

It does not explain the various features of Bluetooth and its capabilities. 

You can do something with it. 

Bluetooth is a wireless connectivity concept that remains in many people's minds. 

dark from. The Bluetooth framework consists of both hardware and hardware aspects. 

Software side. In fact, Bluetooth is a hardware-based radio system. 

Just like it's the software stack that establishes the connection between the two. 

Architectural layer. 

The most important thing in the Bluetooth architecture is the protocol stack. it is 

The protocol stack that truly defines how Bluetooth works. of 

A stack is a set of layered programs, similar to WAP. each layer 

Communicate with layers above and below. 

That is, the Bluetooth protocol stack consists of two layers. the most important 

 The layers are a lower level hardware radio system and an upper level hardware radio system. 

software stack. The higher-level software stack makes the linking decisions. 

between the two layers. 

bottom stack layer 

These are the basics of Bluetooth framework functionality. basics 

 The term "layer" refers to the radio layer, also called module. 

This layer describes the physical characteristics of the transceiver. the most important 

 The function of this layer is to transmit and receive radio frequencies. 

over the 2.4 GHz band. This is called physical WiFi 

 Connection. This works by dividing the transmit band into 79 parts. 

This ultimately allows for fast frequency hopping. That is 

Made for safety. 

On top of this layer are the baseband and link controller protocols. 

Do not confuse. Baseband has proper formatting capabilities. 

data, that is, data that is sent to and received from the radio. that's something 

Triggers timing, framing, packet and flow definitions 

A control that exists on the link. 

The link manager then handles the host controller conversion. 

Interface (HCI) commands begin at the top stack level, 

Then keep it connected.

Top stack layer 

This layer of the Bluetooth framework focuses on building devices 

are designed to communicate with each other using 

Core technology. 

The interface between the system's software and hardware is the host. 

controller interface. 

Then there are protocols for controlling and coordinating logical connections. This is easy. 

One level above HCI in the top stack. Main features of this protocol 

The purpose of Bluetooth is to facilitate communication between two layers. 

stack. It also performs source and destination monitoring functions. 

Number of data packets. This is the most important part of the Bluetooth framework. 

Immediately above the logical connection control and adaptation protocol layer is the 

Protocol stacks are not linearly ordered. However, there are protocol layers 

 It is called a service discovery protocol and has an independent function. 

Existence. Inherits the functions of the interface between link controllers. 

In addition to providing interoperability between two Bluetooth devices, 

device. 

Mobitex 

Have you ever heard the word MOBITEX and wondered what it means? Well, if you're a maniac, you should know more. 

The term means: Just like there's WAP and Bluetooth architecture out there. 

It is also a MOBITEX architecture. wireless network architecture 

He promotes a framework of fixed devices that are required to operate with one wireless terminal. 

A packet-switched, radio-based communication system. 

The MOBITEX framework consists of three main components. These are; wireless 

Base stations, MX switches, and Network Management Centers (NCCs). This framework was first developed by Elitel in 1984. 

A subsidiary of Ericsson. 

Radio base stations have the task of transmitting for each individual cell. 

Distance up to 30km. Then the base station establishes coverage 

Determining area and network capacity. this is the basics 

 Communication via mobile phone. the phone is connected to 

His MOBITEX source near you is compatible and there are no connection problems 

when changing locations. This technology is more cost-effective than circuit-switched technology. 

The data limit for MOBITEX packages is 512 bytes. all packages 

The message sent includes information about the source and destination. 

The efficiency when using packet switching technology is 

In fact, cargo can be transported in any direction and in any order. 

Then, once all the packages reach their destination, they are sorted. 

 Please put them in the correct order. The MX switch is another component of the MOBITEX framework. 

Mainly controls the communication route with the base. 

solution. Also controls communication between WiFi and landline 

device. You can rearrange various switches hierarchically into groups. 

By region or area. 

CDPD 

This is an abbreviation and specification for Cellular Digital Packet Data. 

 This is also used to support wireless connections to the Internet 

Other public packet-switched networks. various mobile phones and 

Modems that provide CDPD support connect to the Internet 

19.2kbps speed. CDPD is a strict open specification. 

Compliant with the Open Systems Interconnection Model framework. of 

It is also possible to expand our supply operations in the future. 

CDPD as a framework can support: Internet 

protocols, ISO connectionless network protocols, and IP multicast services. 

Using a multicast framework, 

Sales and service area of ​​the organization. This framework is 

Used when delivering updates to news subscription recipients 

service. 

For mobile users, this can be avoided due to the presence of permanent links. 

Support for packet switching with CDPD. In this way, a specific broadcast 

Channels can be used by different users at the same time. If so 

 Once the connection is established, the user's modem can decrypt and accept the message. 

A package intended for this purpose. For example, if you receive an email, it will look like this 

Aimed directly at the user without the need for circuitry 

Connection. CDPD architecture coexists with AMPS networks. 

This allows it to support both data and voice communications.

Characteristics of CDPD technology 

Communication with the base station is 

M-ES is full duplex 

That frame is currently using the 30 kHz channel 

AMPS/GSM networks that can transmit data simultaneously 

19.2kbps speed 

Uses the same frequency as AMPS 

DSMA technology is also used 

This framework provides support for a large number of services, 

Connect to the Internet backbone. 

CDPD architecture 

There are three main interfaces in a CDPD network: E-interface, I-interface, and A-interface. Basically it's an E-interface 

 Known to exist between CDPD and outside landline 

 CDPD. I interfaces are known to exist between CDPDs; 

network and another CDPD network. For the A interface, 

Connection between BS and MS. The A interface is also referred to as: 

air interface. 

CDPD architecture uses various elements 

M-ES: The functions of M-ES are also 

A subscriber or mobile unit using each cellular system. 

For M-ES to work, you need a SIM card that can run it 

Included in your laptop, mobile phone, or PDA. Comes with a serving function 

Used as an interface between wireless devices at a speed of 19.2 kbps. 

Different M-ESs have their own unique NEI (Network Equipment). 

identifier) ​​assigned to the home MD-IS. MDBS: The functionality of this element is 

 base station. fulfills the main function of broadcasting 

 Channels available on M-ES. This element also 

 channel allocation, usage, 

 etc 

 MD-IS: The main functions of this element are: 

 Connection between the Internet and PSDN. You can do that too 

 As a frame relay switch and packet router. buffering of 

 Various packages are realized through M-ES. This element allows 

 Roaming management is also supported. 

 Contains the registry directory. 

 Advantages and disadvantages of CDPD 

 There are several advantages and disadvantages to using CDPD. 

 advantage 

 The biggest advantage is that you can reuse existing items. 

 A channel that is on the AMPS network. it's so easy 

 Install and use. This architecture is similar to that of mobile communications, which leads to this. 

 Supports large capacity. That's why we can provide so much support. 

 Easy to upgrade. 

 This is not the case even if you need to establish a data call 

delay. Since the CDPD phone is already present, the delay is eliminated. 

Registered on the CDPD network. 

Cons 

CDPD networks do not have mesh connectivity. For this reason, 

 There is no direct communication between the two M-ESs. 

CDPD cell size also has a limit of approximately 10. 

Miles. 

I mode 

Have you heard about the so-called I-MODE? it was 

It's like a miniature internet run directly from Japan. service 

It is provided by Docomo and is convenient because it can be accessed directly from the menu. 

Available on I-mode compatible terminals. It uses packet-switched Docomo technology to ensure "always-on" network access. 

Subscriber billing is always based on the amount of data sent. 

Unlike other frameworks that charge based on time spent 

Access to Services. 

Understanding I-mode technology is very important. That's not it 

Again, just because it's common doesn't mean it's difficult. For web developers, HTML is 

Everything you need to upload. Only a few are needed for compatibility 

Minor changes to the website. This means it will fit the screen of. 

mobile phone. 

One of the changes required is that the safety frame and grease frame are 

The website must be removed. When distributing the framework, Docomo did the following: 

Partner company for web developer production and information orientation 

I-mode format site. 

The I-mode framework works by sending information in the following format: 

A small package that provides excellent service to customers.


Chapter 4

Windows Download 

Comments

Popular posts from this blog

VPN Inf - Security Fast VPN v7.6.706 Premium Cracked APK

WORDS OF WONDERS