Wireless Network Computer Architecture Chapter:6
Wireless Network Computer Architecture
Wireless networking is an all-encompassing concept that has revolutionized the way we live.
we do things. led to a complete overhaul of the entire connection
computer. At the beginning of this book, we discussed the various components used.
To facilitate wired networks. Similar components are also required.
wireless network. Of the entire computer network infrastructure,
Around the world, wireless networks are only part of this. independent from
No matter how limited this infrastructure is, care must be taken to ensure this.
Functionality is guaranteed.
In this chapter, we will take a closer look at the various components of.
Wireless communication. Also consider wireless applications
The protocol, its model, and its architecture. We will investigate this further
Architecture of Bluetooth, MOBITEX, CDPD, I-MODE. Keep reading.
wireless communication components
Wireless communication has become an integral part of our relationship
with other people. This is due to rapid development and is important
Innovations of the past few decades. A world where it's not needed
A wire that supports the transmission of data from one point to another.
Wireless communication has made it much easier to exchange data and information
Keep it as simple as possible. There are several types:
Broadcast, infrared, satellite, microwave, Bluetooth. Among them are
will be explained in the next chapter.
The components that make up the basic infrastructure of are:
wireless communication network.
USER
This is the most important part of a wireless communication network. of
Factors do not necessarily imply human entities. "Users" simply means "Everyone."
An entity that uses a wireless network directly. Of course most of them
A common user type is a person. But as mentioned earlier, being a user is not being a user
limited to this range. User can also be a robot to receive it
Instructions directly from central computer via wireless network
Manage the manufacturing process. Fundamentally, wireless networks are meant to provide services.
Therefore, the main beneficiary of a wireless network is the user.
Therefore, it is very important from a wireless communication point of view.
Communication network.
Users have the option to start and stop using the WLAN.
Therefore, it is safe to refer to users as "end users." Anyone
Operate computers designed to run a variety of applications
It is the user who uses the wireless network as an interface to complete specific tasks.
Users of a computer network can be either fixed users or mobile users. ability
One reason is that you can use your wireless network on the go.
Very popular. This is a limitation on the wired network side. very
Individuals can use the school's WiFi while on the go
Through the campus.
You may also be able to operate your computer wirelessly.
Network indefinitely. This can also happen in the office
or a location with a faster internet connection
The Computer Devices
This is another important part of your wireless network. these are
A so-called client that exists within a wireless network. Via WiFi
Networks have different computing devices based on their capabilities.
Run on the network. There are also things that are basically aimed at end users.
On the other hand, some are end systems. Computer devices can do this
They communicate with each other over the same wireless network. The various end systems within a wireless network include servers, databases, and more.
website. These end systems are containers with information stores.
This can be displayed to end users in different locations. On the user side
You can customize each device and use it to access the information you need.
For example, users can purchase and install wireless network interface cards.
(NIC) into my laptop. Once this installation is complete, you will be able to use
With certain wireless network types. Various computing devices always come with an operating system
they are different. There are many different operating systems (OS).
Including; Windows, LINUX, Mac OS. The main features of
The operating system is intended to control the software used in the implementation.
network application.
Nic
This is known and discussed as a network interface card.
At the beginning of this book. is a very important part of wireless communication
The network is similar to a wired network. These devices are mainly
connected to a computer system, but in some cases this can also be
It remains as an external device.
Air medium
Air, or the atmosphere, has more than just a function.
life. In recent decades, it has served as a medium for this.
Maintains the propagation of wireless communication signals. of
Propagation is a key element of wireless networks. it is,
Transfer information between your computer and other devices
wireless network.
Information and data in mobile communications are
It is subject to the various limiting factors mentioned above. quality of
Transmission always depends on aerial obstacles and range
Where the signal needs to pass.
Wireless application protocols
Wireless application protocols are specifications specifically designed for:
Categories of communication protocols used in standardization
How wireless devices are used to access the Internet. device of
In this case, we are talking about mobile phones and radios.
Internet access is a ubiquitous feature that is enabled by using
various technologies. The idea of a wireless application network is
Designed by 4 companies. Ericsson, Motorola, Nokia,
An unwired planet.
There are four main layers in a wireless application network.
Wireless Application Environment (WAE): This is
device specifications and
Content development programming languages such as WML.
Wireless Session Protocol (WSP): This represents a session.
Layers for quick connections and pauses
And reconnect.
Wireless Transport Layer Security (WTLS): This is
a security layer that provides data integrity to the system;
Data protection and authentication.
Wireless Transport Layer (WTP): Transaction Layer
Runs on user datagram protocol. one of the most important
Its function is to provide transactional support. Wireless Datagram Protocol: This is the transport layer;
represents a consistent data format.
WAP model
The WAP model is very simple. user opens browser
mobile device. Enter the URL of the website you want to visit
browser. The URL is encrypted and sent to the network using:
WAP protocol via WAP gateway. When the data reaches the WAP gateway, the request is converted into the following format:
Traditional HTTP URL requests are sent via:
internet. When the request finally reaches the destination web server, it looks like this:
processed and the response is sent back to the device via the WAP gateway.
The response will be sent in the form of her WML file that only one person can view.
micro browser.
WAP architecture
What's special about the WAP model is that it exists.
different layers. These layers are arranged in a special architecture
Facilitate the realization of the intended task. Basically WAP is designed
In layered form. Due to the layers, it is very stretchy.
And be flexible. Another element that defines the WAP framework
What makes this special is that it's scalable. In the above paragraph, I have given a superficial view,
look at the different layers
These layers form the actual foundation on which WAP runs.
Bluetooth architecture
The term Bluetooth probably isn't new to you, and it shouldn't be. with
Bluetooth was used when using mobile phones and PCs
It is ubiquitous because it is one of the earliest forms of wireless file sharing
Communication network. Thanks to Bluetooth, you don't need a USB cable
Transfer files. A simple tap and connection is all you need. However, we do
It does not explain the various features of Bluetooth and its capabilities.
You can do something with it.
Bluetooth is a wireless connectivity concept that remains in many people's minds.
dark from. The Bluetooth framework consists of both hardware and hardware aspects.
Software side. In fact, Bluetooth is a hardware-based radio system.
Just like it's the software stack that establishes the connection between the two.
Architectural layer.
The most important thing in the Bluetooth architecture is the protocol stack. it is
The protocol stack that truly defines how Bluetooth works. of
A stack is a set of layered programs, similar to WAP. each layer
Communicate with layers above and below.
That is, the Bluetooth protocol stack consists of two layers. the most important
The layers are a lower level hardware radio system and an upper level hardware radio system.
software stack. The higher-level software stack makes the linking decisions.
between the two layers.
bottom stack layer
These are the basics of Bluetooth framework functionality. basics
The term "layer" refers to the radio layer, also called module.
This layer describes the physical characteristics of the transceiver. the most important
The function of this layer is to transmit and receive radio frequencies.
over the 2.4 GHz band. This is called physical WiFi
Connection. This works by dividing the transmit band into 79 parts.
This ultimately allows for fast frequency hopping. That is
Made for safety.
On top of this layer are the baseband and link controller protocols.
Do not confuse. Baseband has proper formatting capabilities.
data, that is, data that is sent to and received from the radio. that's something
Triggers timing, framing, packet and flow definitions
A control that exists on the link.
The link manager then handles the host controller conversion.
Interface (HCI) commands begin at the top stack level,
Then keep it connected.
Top stack layer
This layer of the Bluetooth framework focuses on building devices
are designed to communicate with each other using
Core technology.
The interface between the system's software and hardware is the host.
controller interface.
Then there are protocols for controlling and coordinating logical connections. This is easy.
One level above HCI in the top stack. Main features of this protocol
The purpose of Bluetooth is to facilitate communication between two layers.
stack. It also performs source and destination monitoring functions.
Number of data packets. This is the most important part of the Bluetooth framework.
Immediately above the logical connection control and adaptation protocol layer is the
Protocol stacks are not linearly ordered. However, there are protocol layers
It is called a service discovery protocol and has an independent function.
Existence. Inherits the functions of the interface between link controllers.
In addition to providing interoperability between two Bluetooth devices,
device.
Mobitex
Have you ever heard the word MOBITEX and wondered what it means? Well, if you're a maniac, you should know more.
The term means: Just like there's WAP and Bluetooth architecture out there.
It is also a MOBITEX architecture. wireless network architecture
He promotes a framework of fixed devices that are required to operate with one wireless terminal.
A packet-switched, radio-based communication system.
The MOBITEX framework consists of three main components. These are; wireless
Base stations, MX switches, and Network Management Centers (NCCs). This framework was first developed by Elitel in 1984.
A subsidiary of Ericsson.
Radio base stations have the task of transmitting for each individual cell.
Distance up to 30km. Then the base station establishes coverage
Determining area and network capacity. this is the basics
Communication via mobile phone. the phone is connected to
His MOBITEX source near you is compatible and there are no connection problems
when changing locations. This technology is more cost-effective than circuit-switched technology.
The data limit for MOBITEX packages is 512 bytes. all packages
The message sent includes information about the source and destination.
The efficiency when using packet switching technology is
In fact, cargo can be transported in any direction and in any order.
Then, once all the packages reach their destination, they are sorted.
Please put them in the correct order. The MX switch is another component of the MOBITEX framework.
Mainly controls the communication route with the base.
solution. Also controls communication between WiFi and landline
device. You can rearrange various switches hierarchically into groups.
By region or area.
CDPD
This is an abbreviation and specification for Cellular Digital Packet Data.
This is also used to support wireless connections to the Internet
Other public packet-switched networks. various mobile phones and
Modems that provide CDPD support connect to the Internet
19.2kbps speed. CDPD is a strict open specification.
Compliant with the Open Systems Interconnection Model framework. of
It is also possible to expand our supply operations in the future.
CDPD as a framework can support: Internet
protocols, ISO connectionless network protocols, and IP multicast services.
Using a multicast framework,
Sales and service area of the organization. This framework is
Used when delivering updates to news subscription recipients
service.
For mobile users, this can be avoided due to the presence of permanent links.
Support for packet switching with CDPD. In this way, a specific broadcast
Channels can be used by different users at the same time. If so
Once the connection is established, the user's modem can decrypt and accept the message.
A package intended for this purpose. For example, if you receive an email, it will look like this
Aimed directly at the user without the need for circuitry
Connection. CDPD architecture coexists with AMPS networks.
This allows it to support both data and voice communications.
Characteristics of CDPD technology
Communication with the base station is
M-ES is full duplex
That frame is currently using the 30 kHz channel
AMPS/GSM networks that can transmit data simultaneously
19.2kbps speed
Uses the same frequency as AMPS
DSMA technology is also used
This framework provides support for a large number of services,
Connect to the Internet backbone.
CDPD architecture
There are three main interfaces in a CDPD network: E-interface, I-interface, and A-interface. Basically it's an E-interface
Known to exist between CDPD and outside landline
CDPD. I interfaces are known to exist between CDPDs;
network and another CDPD network. For the A interface,
Connection between BS and MS. The A interface is also referred to as:
air interface.
CDPD architecture uses various elements
M-ES: The functions of M-ES are also
A subscriber or mobile unit using each cellular system.
For M-ES to work, you need a SIM card that can run it
Included in your laptop, mobile phone, or PDA. Comes with a serving function
Used as an interface between wireless devices at a speed of 19.2 kbps.
Different M-ESs have their own unique NEI (Network Equipment).
identifier) assigned to the home MD-IS. MDBS: The functionality of this element is
base station. fulfills the main function of broadcasting
Channels available on M-ES. This element also
channel allocation, usage,
etc
MD-IS: The main functions of this element are:
Connection between the Internet and PSDN. You can do that too
As a frame relay switch and packet router. buffering of
Various packages are realized through M-ES. This element allows
Roaming management is also supported.
Contains the registry directory.
Advantages and disadvantages of CDPD
There are several advantages and disadvantages to using CDPD.
advantage
The biggest advantage is that you can reuse existing items.
A channel that is on the AMPS network. it's so easy
Install and use. This architecture is similar to that of mobile communications, which leads to this.
Supports large capacity. That's why we can provide so much support.
Easy to upgrade.
This is not the case even if you need to establish a data call
delay. Since the CDPD phone is already present, the delay is eliminated.
Registered on the CDPD network.
Cons
CDPD networks do not have mesh connectivity. For this reason,
There is no direct communication between the two M-ESs.
CDPD cell size also has a limit of approximately 10.
Miles.
I mode
Have you heard about the so-called I-MODE? it was
It's like a miniature internet run directly from Japan. service
It is provided by Docomo and is convenient because it can be accessed directly from the menu.
Available on I-mode compatible terminals. It uses packet-switched Docomo technology to ensure "always-on" network access.
Subscriber billing is always based on the amount of data sent.
Unlike other frameworks that charge based on time spent
Access to Services.
Understanding I-mode technology is very important. That's not it
Again, just because it's common doesn't mean it's difficult. For web developers, HTML is
Everything you need to upload. Only a few are needed for compatibility
Minor changes to the website. This means it will fit the screen of.
mobile phone.
One of the changes required is that the safety frame and grease frame are
The website must be removed. When distributing the framework, Docomo did the following:
Partner company for web developer production and information orientation
I-mode format site.
The I-mode framework works by sending information in the following format:
A small package that provides excellent service to customers.
Comments
Post a Comment