An Overview of Wireless Network Concepts

Author(s):  
Biju Issac

Wireless networks and the subsequent mobile communication are growing by leaps and bounds in the past years and the demand for connection without cables is certainly high. Nowadays, wireless networks are quite common and can be found on university campuses, corporate offices and in public places like hotels, airports, coffee shops and so forth. Not only are mobile devices getting smaller and cheaper, they are also becoming more efficient and powerful, capable of running applications and network services. This is causing the uncontrollable growth of mobile computing as we are witnessing today. Among the many number of applications and services that are executed by mobile devices, network and data services are in high demand. Brief descriptions of some selective wireless technologies that help mobile computing, like IEEE 802.11 networks (with infrastructure mode and ad-hoc mode), Bluetooth, HomeRF, WiMAX and cellular technologies are given below.

2015 ◽  
Vol 12 (2) ◽  
pp. 445-464 ◽  
Author(s):  
Paulo Pombinho ◽  
Maria Carmo ◽  
Ana Afonso

The evolution of mobile devices and the development of high speed wireless networks have supported a widespread use of these devices with increasingly more complex applications. This reality has fostered the research in the field of information visualization in mobile devices. However, the limited screen space, resource constraints and interaction restrictions impose difficulties to developers and users of these applications. An approach to address these problems is to adapt the visualization to the user context. However, these proposals are normally designed in an ad-hoc fashion and are difficult to generalize. In addition, existing solutions are focused only in some subset of possible characteristics of the user context or only address a very specific domain and related adaptations. The objective of this paper is to present the design of a framework for adaptive mobile visualization (AMV) applications, denominated Chameleon, and the development and evaluation of prototypes that use this conceptual-based framework.


2011 ◽  
pp. 114-129
Author(s):  
Biju Issac ◽  
C. E. Tan

Mobility and computing were two concepts that never met a decade or two ago. But with the advent of new wireless technologies using radio propagation, the impossible is now becoming possible. Though there are many challenges to be overcome in terms of improving the bandwidth and security as with a wired network, the developments are quite encouraging. It would definitely dictate the way we do transactions in future. This chapter briefly explores some popular wireless technologies that aid in mobile computing, like 802.11 networks, Bluetooth networks, and HomeRF networks. Under 802.11 networks, we investigate the details of both infrastructure and ad hoc networks and its operations. The reader is thus made aware of these technologies briefly along with their performance, throughput, and security issues, which finally concludes with user preferences of these technologies.


2011 ◽  
Vol 1 (1) ◽  
Author(s):  
Sébastien Roy ◽  
Philippe Leroux

Many fields of human endeavour, such as biology and the theory of complex systems, are now embracing the concept of self-organization based on local actions leading to a desirable global emergent behavior. While many examples, both natural and artificial, can be found of such self-organized systems, the relationship between the local rules and the global behavior remains elusive and no systematic procedure is known to engineer a specific global result. Given the increasing pervasiveness of wireless networks of all sorts, including ad hoc networks competing within narrow unlicensed bands and wireless sensor networks, self-organization could constitute the next defining paradigm in wireless communications. It can be shown that a set of heuristic principles can be leveraged to engineer a self-organized connection-oriented wireless network with minimal complexity. Such a system requires no centralization of information, yet achieves a nearly optimal global state with only a modest amount of local signaling. It will naturally and jointly balance the many parameters related to radio resource management, exhibiting great adaptability, fault tolerance and scalability.


Author(s):  
M.A. Sánchez-Acevedo ◽  
E. López-Mellado ◽  
F. Ramos-Corchado

Self-organization is a phenomenon in nature which has been studied in several areas, namely biology, thermodynamics, cybernetics, computing modeling, and economics. Systems exhibiting self-organization have well defined characteristics such as robustness, adaptability, and scalability, which make self-organization an attractive field of study for two kinds of applications: a) maintaining the communication among mobile devices in wireless networks, and b) coordination of swarms of mobile robots. In ad hoc networks, there is not necessarily an underlying infrastructure in which the nodes can maintain communicated with other nodes; so due to this feature, it is necessary to provide efficient self-organization algorithms for routing, managing, and reconfiguring the network. Furthermore, self-organization in nature provide clear examples about how complex behaviors can arise from only local interaction between entities, namely the ants colony, feather formation, and flock of birds. Based on the above mentioned examples, several algorithms have been proposed to accomplish robot formations using only local interactions. Due to resource constraints in mobile devices, selforganization requires simple algorithms for maintaining and adapting wireless networks. The use of resources for establishing robot formations can be reduced by improving simple rules to accomplish the formation. This article first presents a brief overview of several works developed in ad hoc networks; then, delves deeper into the key algorithms; and finally, challenges arising in this area are discussed.


Author(s):  
Tonghong Li

Mobile ad hoc networks (MANETs) are becoming popular due to the abundance of mobile devices, the speed and the convenience of deployment, and the independence of network infrastructure (Chin, 2002; Royer, 1999). It is desired that MANETs be interconnected to fixed IP networks so that the Internet services can be offered to MANET nodes. In such scenarios, commonly known as hybrid ad hoc networks, mobile nodes (MNs) are viewed as an easily deployable extension to the existing infrastructure. Gateways (GWs) are installed, which can be used by MNs to communicate with nodes in the fixed network.


Telecom IT ◽  
2021 ◽  
Vol 9 (1) ◽  
pp. 87-98
Author(s):  
M. Kovtsur ◽  
A. Kistruga ◽  
G. Voroshnin ◽  
A. Fedorova

Nowadays, Wi-Fi technology is used everywhere in the world: in the offices of large companies, public places and in simple home premises. However, the use of a public transmission medium leads to the possibility of various attacks. This article discusses attacks such as authentication failure and Address Resolution Protocol inject. The considered attacks have shown high efficiency and danger for wireless networks. In this connection, methods of detection and protection against them were proposed. Methods. At the first stage, the concept of how attacks work, their main idea and purpose, were analyzed. At the subsequent stages, for testing, a laboratory stand was created, on which they were simulated. In the course of the experiments, the effectiveness of attacks was found out, and the main phases of attacks and the elements that contribute to their detection were graphically reflected in the article. Main results. As a result of the work done, it was possible to isolate attack vectors and identify their accompanying anomalies. Based on the research materials, mechanisms for detecting and preventing the attacks under consideration were developed. The practical part. All theoretical and experimental materials collected in the article can be used in detecting and preventing attacks on wireless networks by network administra-tors and information security specialists.


2013 ◽  
Vol 9 (1) ◽  
pp. 64-77 ◽  
Author(s):  
Yonggao Yang ◽  
Xusheng Wang ◽  
Lin Li

Mobile computing devices, such as tablets, smartphones, PDAs, and game remote controllers, become very popular in our daily life. This article discusses how to turn these devices, more specifically smartphones and Nintendo Wii remotes (in short as Wiimote), into computer remote controllers. In the smartphone-based system, a smartphone is extended to be the computer’s wireless keyboard and mouse. The smartphone and the computer talk to each other through either wireless Ad Hoc or Wi-Fi access point network. In the Wiimote-based system, a Wiimote is turned into computer’s mouse, where the user moves the mouse cursor by waving the Wiimote in air, and generates mouse events through Wiimote buttons. The Wiimote communicates with the computer through Bluetooth. These systems can be used in conference rooms, classrooms, project seminar rooms, and even people’s living rooms, where a projector screen or a big-screen TV serves as the computer monitor.


Author(s):  
Kartik Khurana ◽  
Harpreet Kaur ◽  
Ritu Chauhan ◽  
Shalu Chauhan ◽  
Shaveta Bhatia ◽  
...  

Now a day’s mobile communication has become a serious business tool for the users. Mobile devices are mainly used for the applications like banking, e-commerce, internet access, entertainment, etc. for communication. This has become common for the user to exchange and transfer the data. However people are still facing problems to use mobile devices because of its security issue. This paper deals with various security issues in mobile computing. It also covers all the basic points which are useful in mobile security issues such as categorisation of security issues, methods or tactics for success in security issues in mobile computing, security frameworks.


Sign in / Sign up

Export Citation Format

Share Document