Page 30 - DCAP311_DCAP607_WIRELESS_NETWORKS
P. 30

Wireless Networks




                    Notes          2.1 Wireless System Components

                                   Although each protocol has different specifications and criteria, there are general characteristics
                                   and goals that each protocol tries to achieve. Several of these protocols are discussed in this
                                   survey paper as well. Below are some general guidelines these protocols try to follow:

                                   z z  Unlimited roaming and range: The location of the user with the portable device is irrelevant.
                                       No matter how far or how near a user is from the base provider, data can still be sent and
                                       received.

                                   z z  Guarantee of Delivery: All messages and data is guaranteed to be delivered regardless of
                                       where a user is located or the user’s status. Even if the portable device is turned off, when
                                       it is turned on again, the user will see a new message.
                                   z z  Dependability of Delivery: All messages are guaranteed of accurate and full transmission.
                                   z z  Notification: Notifies the user that there is data that has been sent and needs to be looked
                                       at.
                                   z z  Connectivity Options: Sender and receiver are given a wide range of options not only
                                       in hardware for the portable device, but also are given options in receiving messages
                                       (choosing a type of connection for instance).
                                   z z  Millions of Users: Ability to engage millions of users.
                                   z z  Priority  Alerts: Able to distinguish between  messages and data that are of higher
                                       importance than others. Able to control high-priority data traffic and do so correctly and
                                       rapidly.
                                   z z  Communication: The ability to communicate between one user to another through one
                                       portable device to another where each portable device holds reliable and user-friendly
                                       software applications.

                                   z z  Host  Reconfiguration:  The  ability  to  reconfigure  when  changing  environments.  For
                                       example, Person A is carrying a Palm Pilot that uses Bluetooth. Person A enters the office
                                       where there is an entire Bluetooth network set-up and Person A’s Palm Pilot configures to
                                       the settings of the office network. The end of the day comes, and Person A starts driving
                                       home. Person A gets home and walks inside where Person A’s home is set up with an
                                       entirely different Bluetooth network. Person A brings the Palm Pilot out and the Palm Pilot
                                       automatically reconfigures itself to the settings of the Bluetooth network in Person A’s
                                       home. Therefore, whether the Palm Pilot works in one environment and can detect when it
                                       has been moved to another environment and can set itself up wherever it is located.

                                   z z  Host Mobility: One host contains its settings on a network – its IP address, Subnet Mask,
                                       Gateway Address, and so on. Now this one host decides to move somewhere else, this
                                       means that the host will have to change its settings all over again, but has to let others
                                       know that it has moved. Flexible mobility allows the host to come and go as it pleases and
                                       not even needing to alert others of its move. Communication with the host is still possible
                                       even if it has moved.

                                   z z  Dynamic Encapsulation: The need to register a mobile host with its base agent, perhaps
                                       using a login and logout request and alerts of activation and inactivation. This will prevent
                                       forged logins and having one’s precious date to be re-routed somewhere it should not be.
                                   2.1.1 Wireless System Networking Equipment


                                   What  sort  of  hardware  is  required  to  build  a  wireless  network  is  dependent  on  the  type  of
                                   network you intend to build.





          24                               LOVELY PROFESSIONAL UNIVERSITY
   25   26   27   28   29   30   31   32   33   34   35