Resource Guide.ppt

Embed Size (px)

Citation preview

  • 7/27/2019 Resource Guide.ppt

    1/42

    SUMMER INDUSTRIAL TRAINING REPORT

    Vivekanand Institute of Technology and Science

    SUBMITTED BYPANKAJ YADAV

    ROLL.NO 1022331068

    RANCH: ELECTRONICS AND ECOMMUNICATION

  • 7/27/2019 Resource Guide.ppt

    2/42

    2

    Contents

    B.S.N.L. An Introduction

    DIGITALSWITCHING

    MODULATION:

    MULTIPLEXING:

    POWER PLANT

    Microprocessor

    .S.D.N (Integrated service digital network)-

    Electronic Exchange

    GSM

    CDMA

    Fiber-optic communication

    Wi-Fi

  • 7/27/2019 Resource Guide.ppt

    3/42

    3

    B.S.N.L. AnIntroductionharat Sanchar Nigam Limited (known as BSNL, India

    ommunications Corporation Limited) is a state-owned

    lecommunication

    ompany in India.

    SNL is the sixth largest cellular service provider, with over 57.22illion customers as of December 2009 and the largest land line

    lephone provider in India.

    s headquarters are at Bharat Sanchar Bhawan, Harish Chandra

    athur Lane, Janpath, New Delhi. It has the status of Mini Ratna, a

    tatus assigned to reputed public sector companies in India.

    SNL is India's oldest and largest Communication Service Provider

    CSP). Currently has a customer base of 90 million as of June 2008.has footprints throughout India except for the metropolitan cities

    f Mumbai and New Delhi which are managed by MTNL.

    s on March 31, 2008 BSNL commanded a customer base of 31.55

    illion Wireline, 4.58 million CDMA-WLL and 54.21 million GSM

    ervices.

  • 7/27/2019 Resource Guide.ppt

    4/42

    4

    1 B.S.N.L. AnIntroduction

    harat Sanchar Nigam Limited (known as BSNL, India Communications Corporatio

    mited) is a state-owned telecommunication

    SNL is the sixth largest cellular service provider, with over 57.22 million customers as

    ecember 2009 and the largest land line telephone provider in India.

    headquarters are at Bharat Sanchar Bhawan, Harish Chandra Mathur Lane, Janpath, Ne

    elhi. It has the status of Mini Ratna, a status assigned to reputed public sector companie

    BSNL is India's oldest and largest Communication Service Provider (CSP). Currently ha

    customer base of 90 million as of June 2008. It has footprints throughout India except fo

    e metropolitan cities of Mumbai and New Delhi which are managed by MTN

    s on March 31, 2008 BSNL commanded a customer base of 31.55 million Wireline, 4.5

    llion CDMA-WLL and 54.21 million GSM services.

  • 7/27/2019 Resource Guide.ppt

    5/42

    5

  • 7/27/2019 Resource Guide.ppt

    6/42

    6

    DIGITALSWITCHING:

    Digital switching has become a synonym for timeivision multiplex. In digital switching system,igital signals are switched in two nodes, timewitching and space switching. Time switchingasically involves rearrangement of channel

    equence in the same PCM from whereas spacewitching involves interconnection of samehannels of a different PCM high way. In aractical digital switching both time and spacewitching stage is employed to increase the

    raffic handling capacity of the switch at minimumost. Among the various possible combinations

    TST structure is most commonly used.Synchronization of various exchange clocks in aigital network is essential to provide requiredervices. Causing a slip due to mismatchetween the clocks will result in multination of

    nformation and description of services. Hence,lip has to be controlled using plesiochronous

    nd synchronous approaches. D

  • 7/27/2019 Resource Guide.ppt

    7/42

    7

    MODULATION:

    Often the message signal is notsuitable for transmission overhe medium in its original forms.

    Therefore, the message signal isocated in a carrier wave, whichs more suited for transmissionover the medium. This process

    s called modulation of thecarrier wave. At the receivingend station the message signal

    eceived back from the incomingmodulated carrier wave by aprocess is called demodulation

    which is inverse of modulation.

  • 7/27/2019 Resource Guide.ppt

    8/42

    6

    MULTIPLEXING:

    Modulation enables multiple messageignals to be simultaneously transmittedover the same medium without interferingeach other. Transmission of multiple

    message signals simultaneously over amedium is called multiplexing.Modulation is essentially a process ofelocation of a message signal in a carrier

    wave, which is more suitable forransmission for transmission over themedium than the message signal itself.Three types of modulation can occur-

    . Amplitude modulation2. Frequency modulation3. Pulse modulation

  • 7/27/2019 Resource Guide.ppt

    9/42

    9

    POWER PLANT

    One of the primary requirements ofany computer system is that servicewill be available to the subscriber atany time. In the vast majority of

    exchanges the electrical energyequired for signaling, switching,

    speed transmission mains. Theexchange power system is designedo provide continuous anduninterrupted telephone service evenwhen the public electric fails. We can

    divide power plant in three majorblocks such as

    FLOAT RECTIFIERBATTERY CHARGERSWITCHING CUBICAL

  • 7/27/2019 Resource Guide.ppt

    10/42

    10

    Microprocessor

    A microprocessor is a complexelectronic processor on a singlesilicon chip (Large-scale integrated

    circuit). It is capable of performingarithmetic and logical functionsunder the control of program.Functional units of microprocessor-

    . Arithmetic and logic unit2. Registers (Temporary memory)3. Timing and control unit

    Functions

    . FETCH

    2. DECODE

  • 7/27/2019 Resource Guide.ppt

    11/42

    11

    S.D.N (Integrated service digital network)-

    Presently, there is a multiplicity of services suchs telephoning, telex, data cable television etc.

    hat are provided by separate dedicated networkor each of them. These non-integrated servicesequire separate switching system. Specialubscribers access plants, individual trunketworks and separate operations and

    maintenance staff. These services are costly tohe subscriber as well as to department. InS.D.N, these services are provided by one

    ntegrated network, which can be accessed by

    ifferent customer premises equipment.n I.S.D.N, subscriber loop from the localxchange will be terminated at the networkerminal (N.T). From N.T the signal will beistributed to the information sockets. These

    nformation sockets will be distributed in theremises just like power sockets are distributedor providing on the information sockets, differenterminals for voice and nonvoice services can beonnected.

  • 7/27/2019 Resource Guide.ppt

    12/42

    12

    Electronic Exchange

    These are entirely computerized and

    electronic devices, which work on storeprogramme control. Electronic logicomponent can do ten thousand times

    operation during signal in the comparison

    of electromechanical exchange.

    n an electronic exchange a single controlevice simultaneously process a number

    of calls on time-sharing basis. Suchentralization is more economical, but it isisadvantageous in making switchingystem more vulnerable to system failure.

    This, however, can be overcome atandby control devices.These electronic exchanges havepowerful processing unit. Part of control

    equipment capacity utilize for functionother than for processing.

  • 7/27/2019 Resource Guide.ppt

    13/42

    13

    GSM (Global System for MobileCommunications, originally Groupe Spcial

    Mobi le), is a standard set developed by the

    European Telecommunications Standardsnstitute (ETSI) to describe protocols for secondeneration (2G) digital cellular networks used by

    mobile phones. It became the de facto global

    tandard for mobile communications with over0% market share.

    The GSM standard was developed as aeplacement for first generation (1G) analogellular networks, and originally described a

    igital, circuit-switched network optimized forfulluplex voice telephony. This was expanded overme to include data communications, first byircuit-switched transport, then packet dataransport via GPRS (General Packet Radio

    Services) and EDGE (Enhanced Data rates forGSM Evolution or EGPRS).

    urther improvements were made when theGPP developed third generation (3G) UMTS

    tandards followed by fourth generation (4G) LTEAdvanced standards.

    GSM

    http://en.wikipedia.org/wiki/LTE_Advancedhttp://en.wikipedia.org/wiki/European_Telecommunications_Standards_Institutehttp://en.wikipedia.org/wiki/European_Telecommunications_Standards_Institutehttp://en.wikipedia.org/wiki/2Ghttp://en.wikipedia.org/wiki/Cellular_networkhttp://en.wikipedia.org/wiki/Mobile_phonehttp://en.wikipedia.org/wiki/Comparison_of_mobile_phone_standardshttp://en.wikipedia.org/wiki/Comparison_of_mobile_phone_standardshttp://en.wikipedia.org/wiki/1Ghttp://en.wikipedia.org/wiki/Duplex_%28telecommunications%29http://en.wikipedia.org/wiki/Duplex_%28telecommunications%29http://en.wikipedia.org/wiki/Telephonyhttp://en.wikipedia.org/wiki/Network_packethttp://en.wikipedia.org/wiki/GPRShttp://en.wikipedia.org/wiki/EDGEhttp://en.wikipedia.org/wiki/3GPPhttp://en.wikipedia.org/wiki/3Ghttp://en.wikipedia.org/wiki/UMTShttp://en.wikipedia.org/wiki/4Ghttp://en.wikipedia.org/wiki/LTE_Advancedhttp://en.wikipedia.org/wiki/LTE_Advancedhttp://en.wikipedia.org/wiki/LTE_Advancedhttp://en.wikipedia.org/wiki/LTE_Advancedhttp://en.wikipedia.org/wiki/4Ghttp://en.wikipedia.org/wiki/UMTShttp://en.wikipedia.org/wiki/3Ghttp://en.wikipedia.org/wiki/3GPPhttp://en.wikipedia.org/wiki/EDGEhttp://en.wikipedia.org/wiki/GPRShttp://en.wikipedia.org/wiki/Network_packethttp://en.wikipedia.org/wiki/Telephonyhttp://en.wikipedia.org/wiki/Duplex_%28telecommunications%29http://en.wikipedia.org/wiki/Duplex_%28telecommunications%29http://en.wikipedia.org/wiki/1Ghttp://en.wikipedia.org/wiki/Comparison_of_mobile_phone_standardshttp://en.wikipedia.org/wiki/Comparison_of_mobile_phone_standardshttp://en.wikipedia.org/wiki/Mobile_phonehttp://en.wikipedia.org/wiki/Cellular_networkhttp://en.wikipedia.org/wiki/2Ghttp://en.wikipedia.org/wiki/European_Telecommunications_Standards_Institutehttp://en.wikipedia.org/wiki/European_Telecommunications_Standards_Institute
  • 7/27/2019 Resource Guide.ppt

    14/42

    14

    n 1981, work began to develop a European standard forigital cellular voice telephony when the European

    onference of Postal and Telecommunicationsdministrations (CEPT) created the Groupe Spcial

    Mobile committee and later provided a permanentechnical support group based in Paris. Five years later,n 1987, 15 representatives from 13 European countriesgned a memorandum of understanding in Copenhagen

    o develop and deploy a common cellular telephoneystem across Europe, and EU rules were passed to

    make GSM a mandatory standard.The decision toevelop a continental standard eventually resulted in anified, open, standard-based network which was larger

    han that in the United States In 1989, the Groupepcial Mobile committee was transferred from CEPT tohe European Telecommunications Standards InstituteETSI).n 1987 Europe produced the very first agreed GSMechnical Specification in February). Ministers from the

    our big EU countries cemented their political support forGSM with the Bonn Declaration on Global Information

    etworks in May and the GSM MoU was tabled forgnature in September. The MoU drew-in mobileperators from across Europe to pledge to invest in new

    GSM networks to an ambitious common date. It gotGSM up and running fast.

    History

    http://en.wikipedia.org/wiki/European_Conference_of_Postal_and_Telecommunications_Administrationshttp://en.wikipedia.org/wiki/European_Conference_of_Postal_and_Telecommunications_Administrationshttp://en.wikipedia.org/wiki/European_Conference_of_Postal_and_Telecommunications_Administrationshttp://en.wikipedia.org/wiki/Parishttp://en.wikipedia.org/wiki/Memorandum_of_understandinghttp://en.wikipedia.org/wiki/Copenhagenhttp://en.wikipedia.org/wiki/European_Telecommunications_Standards_Institutehttp://en.wikipedia.org/wiki/European_Telecommunications_Standards_Institutehttp://en.wikipedia.org/wiki/Copenhagenhttp://en.wikipedia.org/wiki/Memorandum_of_understandinghttp://en.wikipedia.org/wiki/Parishttp://en.wikipedia.org/wiki/European_Conference_of_Postal_and_Telecommunications_Administrationshttp://en.wikipedia.org/wiki/European_Conference_of_Postal_and_Telecommunications_Administrationshttp://en.wikipedia.org/wiki/European_Conference_of_Postal_and_Telecommunications_Administrations
  • 7/27/2019 Resource Guide.ppt

    15/42

    15

    GSM is a cellular network, which meanshat cell phones connect to it by searching

    or cells in the immediate vicinity. There areve different cell sizes in a GSM networkmacro, micro, pico, femto, and umbrellaells. The coverage area of each cell variesccording to the implementation

    nvironment. Macro cells can be regardeds cells where the base stationantenna is

    nstalled on a mast or a building aboveverage rooftop level. Micro cells are cells

    whose antenna height is under average

    ooftop level; they are typically used inrban areas. Picocells are small cells

    whose coverage diameter is a few dozenmetres; they are mainly used indoors.

    emtocells are cells designed for use inesidential or small business environmentsnd connect to the service providers

    etwork via a broadband internetonnection. Umbrella cells are used to

    over shadowed regions of smaller cells

    Base Station subsystem

    http://en.wikipedia.org/wiki/Cellular_networkhttp://en.wikipedia.org/wiki/Cell_phonehttp://en.wikipedia.org/wiki/Macrocellhttp://en.wikipedia.org/wiki/Microcellhttp://en.wikipedia.org/wiki/Picocellhttp://en.wikipedia.org/wiki/Femtocellhttp://en.wikipedia.org/w/index.php?title=Umbrella_cells&action=edit&redlink=1http://en.wikipedia.org/w/index.php?title=Umbrella_cells&action=edit&redlink=1http://en.wikipedia.org/wiki/Base_stationhttp://en.wikipedia.org/wiki/Antenna_%28electronics%29http://en.wikipedia.org/wiki/Antenna_%28electronics%29http://en.wikipedia.org/wiki/Base_stationhttp://en.wikipedia.org/w/index.php?title=Umbrella_cells&action=edit&redlink=1http://en.wikipedia.org/w/index.php?title=Umbrella_cells&action=edit&redlink=1http://en.wikipedia.org/wiki/Femtocellhttp://en.wikipedia.org/wiki/Picocellhttp://en.wikipedia.org/wiki/Microcellhttp://en.wikipedia.org/wiki/Macrocellhttp://en.wikipedia.org/wiki/Cell_phonehttp://en.wikipedia.org/wiki/Cellular_network
  • 7/27/2019 Resource Guide.ppt

    16/42

    16

    GSM networks operate in a number of different carrierequency ranges (separated into GSM frequency ranges

    or 2G and UMTS frequency bands for 3G), with most 2GGSM networks operating in the 900 MHz or 1800 MHzands. Where these bands were already allocated, the50 MHz and 1900 MHz bands were used instead (for

    xample in Canada and the United States). In rare caseshe 400 and 450 MHz frequency bands are assigned inome countries because they were previously used forrst-generation systems.

    Most 3G networks in Europe operate in the 2100 MHzequency band. For more information on worldwide GSM

    equency usage, see GSM frequency bands.Regardless of the frequency selected by an operator, it isivided into timeslots for individual phones. This allowsight full-rate or sixteen half-rate speech channels peradio frequency. These eight radio timeslots (orburst

    eriods) are grouped into a TDMA frame. Half-ratehannels use alternate frames in the same timeslot. Thehannel data rate for all 8 channels is 270.833 kbit/s, andhe frame duration is 4.615 ms.he transmission power in the handset is limited to a

    maximum of 2 watts in GSM 850/900 and 1 watt in GSM

    800/1900.

    GSM carrier frequencies

    http://en.wikipedia.org/wiki/GSM_frequency_rangeshttp://en.wikipedia.org/wiki/UMTS_frequency_bandshttp://en.wikipedia.org/wiki/2Ghttp://en.wikipedia.org/wiki/3Ghttp://en.wikipedia.org/wiki/GSM_frequency_bandshttp://en.wikipedia.org/wiki/Time_division_multiplexinghttp://en.wikipedia.org/wiki/Radio_frequencyhttp://en.wikipedia.org/wiki/Burst_transmissionhttp://en.wikipedia.org/wiki/Time_division_multiple_accesshttp://en.wikipedia.org/wiki/Time_division_multiple_accesshttp://en.wikipedia.org/wiki/Burst_transmissionhttp://en.wikipedia.org/wiki/Radio_frequencyhttp://en.wikipedia.org/wiki/Time_division_multiplexinghttp://en.wikipedia.org/wiki/GSM_frequency_bandshttp://en.wikipedia.org/wiki/3Ghttp://en.wikipedia.org/wiki/2Ghttp://en.wikipedia.org/wiki/UMTS_frequency_bandshttp://en.wikipedia.org/wiki/GSM_frequency_ranges
  • 7/27/2019 Resource Guide.ppt

    17/42

    17

    GSM was designed with a moderate level

    of service security. The system wasesigned to authenticate the subscribersing a pre-shared key and challenge-esponse. Communications between the

    ubscriber and the base station can beencrypted. The development ofUMTSntroduces an optional UniversalSubscriber Identity Module (USIM), that

    ses a longer authentication key to givereater security, as well as mutually

    authenticating the network and the user,whereas GSM only authenticates the user

    o the network (and not vice versa). Theecurity model therefore offersonfidentiality and authentication, butmited authorization capabilities, and no

    on-repudiation.

    GSM service security

    http://en.wikipedia.org/wiki/Pre-shared_keyhttp://en.wikipedia.org/wiki/Challenge-response_authenticationhttp://en.wikipedia.org/wiki/Challenge-response_authenticationhttp://en.wikipedia.org/wiki/Universal_Mobile_Telecommunications_Systemhttp://en.wikipedia.org/wiki/Universal_Subscriber_Identity_Modulehttp://en.wikipedia.org/wiki/Universal_Subscriber_Identity_Modulehttp://en.wikipedia.org/wiki/Non-repudiationhttp://en.wikipedia.org/wiki/Non-repudiationhttp://en.wikipedia.org/wiki/Non-repudiationhttp://en.wikipedia.org/wiki/Non-repudiationhttp://en.wikipedia.org/wiki/Universal_Subscriber_Identity_Modulehttp://en.wikipedia.org/wiki/Universal_Subscriber_Identity_Modulehttp://en.wikipedia.org/wiki/Universal_Mobile_Telecommunications_Systemhttp://en.wikipedia.org/wiki/Challenge-response_authenticationhttp://en.wikipedia.org/wiki/Challenge-response_authenticationhttp://en.wikipedia.org/wiki/Challenge-response_authenticationhttp://en.wikipedia.org/wiki/Pre-shared_keyhttp://en.wikipedia.org/wiki/Pre-shared_keyhttp://en.wikipedia.org/wiki/Pre-shared_key
  • 7/27/2019 Resource Guide.ppt

    18/42

    18

  • 7/27/2019 Resource Guide.ppt

    19/42

    19

    The network is structured into a

    number of discrete sections:Base Station Subsystem thebase stations and their controllers

    Network and SwitchingSubsystem the part of thenetwork most similar to a fixednetwork, sometimes just called the

    core network"GPRS Core Network theoptional part which allows packet-

    based Internet connectionsOperations support system (OSS) network maintenance

    Network structure

    http://en.wikipedia.org/wiki/Base_Station_Subsystemhttp://en.wikipedia.org/wiki/Network_and_Switching_Subsystemhttp://en.wikipedia.org/wiki/Network_and_Switching_Subsystemhttp://en.wikipedia.org/wiki/GPRS_Core_Networkhttp://en.wikipedia.org/wiki/Operations_support_systemhttp://en.wikipedia.org/wiki/Operations_support_systemhttp://en.wikipedia.org/wiki/GPRS_Core_Networkhttp://en.wikipedia.org/wiki/Network_and_Switching_Subsystemhttp://en.wikipedia.org/wiki/Network_and_Switching_Subsystemhttp://en.wikipedia.org/wiki/Base_Station_Subsystem
  • 7/27/2019 Resource Guide.ppt

    20/42

    20

    Code division multiple access (CDMA) is ahannel access method used by various radioommunication technologies.

    CDMA is an example ofmultiple access, whichs where several transmitters can sendnformation simultaneously over a singleommunication channel. This allows severalsers to share a band of frequencies (seeandwidth). To permit this to be achieved

    without undue interference between the usersCDMA employs spread-spectrum technologynd a special coding scheme (where eachransmitter is assigned a code).

    CDMA is used as the access method in many

    mobile phone standards such as cdmaOne,CDMA2000 (the 3G evolution of cdmaOne),nd WCDMA (the 3G standard used by GSMarriers), which are often referred to as simply

    CDMA.

    Code division multiple access

    http://en.wikipedia.org/wiki/Channel_access_methodhttp://en.wikipedia.org/wiki/Radiohttp://en.wikipedia.org/wiki/Multiple_accesshttp://en.wikipedia.org/wiki/Bandwidth_%28signal_processing%29http://en.wikipedia.org/wiki/Spread-spectrumhttp://en.wikipedia.org/wiki/List_of_mobile_phone_standardshttp://en.wikipedia.org/wiki/IS-95http://en.wikipedia.org/wiki/CDMA2000http://en.wikipedia.org/wiki/3Ghttp://en.wikipedia.org/wiki/WCDMAhttp://en.wikipedia.org/wiki/GSMhttp://en.wikipedia.org/wiki/GSMhttp://en.wikipedia.org/wiki/WCDMAhttp://en.wikipedia.org/wiki/3Ghttp://en.wikipedia.org/wiki/CDMA2000http://en.wikipedia.org/wiki/IS-95http://en.wikipedia.org/wiki/List_of_mobile_phone_standardshttp://en.wikipedia.org/wiki/Spread-spectrumhttp://en.wikipedia.org/wiki/Spread-spectrumhttp://en.wikipedia.org/wiki/Spread-spectrumhttp://en.wikipedia.org/wiki/Bandwidth_%28signal_processing%29http://en.wikipedia.org/wiki/Multiple_accesshttp://en.wikipedia.org/wiki/Radiohttp://en.wikipedia.org/wiki/Channel_access_method
  • 7/27/2019 Resource Guide.ppt

    21/42

    21

  • 7/27/2019 Resource Guide.ppt

    22/42

    22

    he technology of code division multiple accesshannels has long been known. In the USSR, the first

    work devoted to this subject was published in 1935 byrofessorDmitriy V. Ageev.[1] It was shown that throughhe use of linear methods, there are three types of signaleparation: frequency, time and compensatory. Theechnology of CDMA was used in 1957, when the young

    military radio engineerLeonid Kupriyanovich in Moscow,

    made an experimental model of a wearable automaticmobile phone, called LK-1 by him, with a base station.K-1 has a weight of 3 kg, 2030 km operating distance,nd 2030 hours of battery life.[2][3] The base station, asescribed by the author, could serve several customers.n 1958, Kupriyanovich made the new experimental

    pocket" model of mobile phone. This phone weighed.5 kg. To serve more customers, Kupriyanovichroposed the device, named by him as correllator.[4][5] In958, the USSR also started the development of theAltai" national civil mobile phone service for cars, based

    n the Soviet MRT-1327 standard. The phone systemweighed 11 kg and was approximately 3 cubic meters inze[dubiousdiscuss]. It was placed in the trunk of theehicles of high-ranking officials and used a standardandset in the passenger compartment. The mainevelopers of the Altai system were VNIIS (Voronezh

    cience Research Institute of Communications) andGSPI (State Specialized Project Institute

    History

    http://en.wikipedia.org/wiki/USSRhttp://ru.wikipedia.org/wiki/%D0%90%D0%B3%D0%B5%D0%B5%D0%B2,_%D0%94%D0%BC%D0%B8%D1%82%D1%80%D0%B8%D0%B9_%D0%92%D0%B0%D1%81%D0%B8%D0%BB%D1%8C%D0%B5%D0%B2%D0%B8%D1%87http://en.wikipedia.org/wiki/Code_division_multiple_accesshttp://en.wikipedia.org/wiki/Leonid_Kupriyanovichhttp://en.wikipedia.org/wiki/Code_division_multiple_accesshttp://en.wikipedia.org/wiki/Code_division_multiple_accesshttp://en.wikipedia.org/wiki/Altai_%28mobile_telephone_system%29http://en.wikipedia.org/wiki/Wikipedia:Disputed_statementhttp://en.wikipedia.org/wiki/Talk:Code_division_multiple_accesshttp://en.wikipedia.org/wiki/Talk:Code_division_multiple_accesshttp://en.wikipedia.org/wiki/Wikipedia:Disputed_statementhttp://en.wikipedia.org/wiki/Altai_%28mobile_telephone_system%29http://en.wikipedia.org/wiki/Code_division_multiple_accesshttp://en.wikipedia.org/wiki/Code_division_multiple_accesshttp://en.wikipedia.org/wiki/Code_division_multiple_accesshttp://en.wikipedia.org/wiki/Code_division_multiple_accesshttp://en.wikipedia.org/wiki/Leonid_Kupriyanovichhttp://en.wikipedia.org/wiki/Code_division_multiple_accesshttp://ru.wikipedia.org/wiki/%D0%90%D0%B3%D0%B5%D0%B5%D0%B2,_%D0%94%D0%BC%D0%B8%D1%82%D1%80%D0%B8%D0%B9_%D0%92%D0%B0%D1%81%D0%B8%D0%BB%D1%8C%D0%B5%D0%B2%D0%B8%D1%87http://en.wikipedia.org/wiki/USSR
  • 7/27/2019 Resource Guide.ppt

    23/42

    23

    CDMA is a spread spectrum multiple access[6]

    echnique. A spread spectrum technique spreadshe bandwidth of the data uniformly for the sameransmitted power. A spreading code is a pseudoandom code that has a narrow ambiguityunction, unlike other narrow pulse codes. In

    CDMA a locally generated code runs at a muchigher rate than the data to be transmitted. Dataor transmission is combined via bitwise XORexclusive OR) with the faster code. The figurehows how a spread spectrum signal is

    enerated. The data signal with pulse duration ofsymbol period) is XORed with the code signal

    with pulse duration of (chip period). (Note:andwidth is proportional to where = bit time)

    Therefore, the bandwidth of the data signal isnd the bandwidth of the spread spectrum signa

    s . Since is much smaller than , theandwidth of the spread spectrum signal is much

    arger than the bandwidth of the original signal.

    The ratio is called the spreading factor

    Steps in CDMA Modulation

    http://en.wikipedia.org/wiki/Code_division_multiple_accesshttp://en.wikipedia.org/wiki/Ambiguity_functionhttp://en.wikipedia.org/wiki/Ambiguity_functionhttp://en.wikipedia.org/wiki/XORhttp://en.wikipedia.org/wiki/Bandwidth_%28signal_processing%29http://en.wikipedia.org/wiki/Bandwidth_%28signal_processing%29http://en.wikipedia.org/wiki/XORhttp://en.wikipedia.org/wiki/Ambiguity_functionhttp://en.wikipedia.org/wiki/Ambiguity_functionhttp://en.wikipedia.org/wiki/Code_division_multiple_access
  • 7/27/2019 Resource Guide.ppt

    24/42

    24

  • 7/27/2019 Resource Guide.ppt

    25/42

    25

    Synchronous CDMA exploits mathematicalroperties oforthogonality between vectors

    epresenting the data strings. For example,inary string 1011 is represented by the vector1, 0, 1, 1). Vectors can be multiplied by takingheirdot product, by summing the products ofheir respective components (for example, if u =

    a, b) and v = (c, d), then their dot product uv =c + bd). If the dot product is zero, the twoectors are said to be orthogonalto each other.

    Some properties of the dot product aidnderstanding of how W-CDMA works:

    Code division multiplexing (Synchronous

    CDMA)

    http://en.wikipedia.org/wiki/Orthogonalityhttp://en.wikipedia.org/wiki/Coordinate_vectorhttp://en.wikipedia.org/wiki/Dot_producthttp://en.wikipedia.org/wiki/W-CDMAhttp://en.wikipedia.org/wiki/W-CDMAhttp://en.wikipedia.org/wiki/W-CDMAhttp://en.wikipedia.org/wiki/W-CDMAhttp://en.wikipedia.org/wiki/Dot_producthttp://en.wikipedia.org/wiki/Coordinate_vectorhttp://en.wikipedia.org/wiki/Orthogonality
  • 7/27/2019 Resource Guide.ppt

    26/42

    26

    When mobile-to-base links cannot be preciselyoordinated, particularly due to the mobility ofhe handsets, a different approach is required.

    Since it is not mathematically possible toreate signature sequences that are bothrthogonal for arbitrarily random starting pointsnd which make full use of the code space,nique "pseudo-random" or "pseudo-noise"PN) sequences are used in asynchronous

    CDMA systems. A PN code is a binaryequence that appears random but can beeproduced in a deterministic manner by

    ntended receivers. These PN codes are usedo encode and decode a user's signal in

    Asynchronous CDMA in the same manner ashe orthogonal codes in synchronous CDMAshown in the example above). These PN

    equences are statistically uncorrelated, andhe sum of a large number of PN sequencesesults in multiple access interference (MAI)hat is approximated by a Gaussian noiserocess (following the central limit theorem intatistics.

    Asynchronous CDMA

    http://en.wikipedia.org/wiki/Central_limit_theoremhttp://en.wikipedia.org/wiki/Central_limit_theorem
  • 7/27/2019 Resource Guide.ppt

    27/42

    27

    iber-optic communication is a method of

    ransmitting information from one place tonother by sending pulses oflight through anptical fiber. The light forms an electromagneticarrier wave that is modulated to carrynformation. First developed in the 1970s, fiber-

    ptic communication systems haveevolutionized the telecommunications industrynd have played a major role in the advent of thenformation Age. Because of its advantages overlectrical transmission, optical fibers have largelyeplaced copper wire communications in coreetworks in the developed world.

    The process of communicating using fiber-opticsnvolves the following basic steps: Creating the

    ptical signal involving the use of a transmitter,elaying the signal along the fiber, ensuring thathe signal does not become too distorted or

    weak, receiving the optical signal, and convertinginto an electrical signal.

    Fiber-optic communication

    http://en.wikipedia.org/wiki/Lighthttp://en.wikipedia.org/wiki/Optical_fiberhttp://en.wikipedia.org/wiki/Electromagnetic_radiationhttp://en.wikipedia.org/wiki/Carrier_wavehttp://en.wikipedia.org/wiki/Modulationhttp://en.wikipedia.org/wiki/Communication_systemhttp://en.wikipedia.org/wiki/Telecommunicationshttp://en.wikipedia.org/wiki/Information_Agehttp://en.wikipedia.org/wiki/Fiber-optic_communicationhttp://en.wikipedia.org/wiki/Fiber-optic_communicationhttp://en.wikipedia.org/wiki/Core_networkhttp://en.wikipedia.org/wiki/Core_networkhttp://en.wikipedia.org/wiki/Developed_worldhttp://en.wikipedia.org/wiki/Electrical_signalhttp://en.wikipedia.org/wiki/Electrical_signalhttp://en.wikipedia.org/wiki/Developed_worldhttp://en.wikipedia.org/wiki/Core_networkhttp://en.wikipedia.org/wiki/Core_networkhttp://en.wikipedia.org/wiki/Fiber-optic_communicationhttp://en.wikipedia.org/wiki/Fiber-optic_communicationhttp://en.wikipedia.org/wiki/Information_Agehttp://en.wikipedia.org/wiki/Telecommunicationshttp://en.wikipedia.org/wiki/Communication_systemhttp://en.wikipedia.org/wiki/Modulationhttp://en.wikipedia.org/wiki/Carrier_wavehttp://en.wikipedia.org/wiki/Electromagnetic_radiationhttp://en.wikipedia.org/wiki/Optical_fiberhttp://en.wikipedia.org/wiki/Light
  • 7/27/2019 Resource Guide.ppt

    28/42

    28

    n 1880Alexander Graham Bell and hisassistant Charles Sumner Tainterreated a very early precursor to fiber-

    optic communications, the Photophone,

    at Bell's newly established VoltaLaboratory in Washington, D.C. Bellonsidered it his most important

    nvention. The device allowed for the

    ransmission of sound on a beam ofght. On June 3, 1880, Bell conductedhe world's first wireless telephoneransmission between two buildings,

    ome 213 meters apart.[1][2]

    Due to itsse of an atmospheric transmissionmedium, the Photophone would notprove practical until advances in laser

    and optical fiber technologies permittedhe secure transport of light.

    History

    http://en.wikipedia.org/wiki/Alexander_Graham_Bellhttp://en.wikipedia.org/wiki/Charles_Sumner_Tainterhttp://en.wikipedia.org/wiki/Photophonehttp://en.wikipedia.org/wiki/Volta_Laboratory_and_Bureauhttp://en.wikipedia.org/wiki/Volta_Laboratory_and_Bureauhttp://en.wikipedia.org/wiki/Washington,_D.C.http://en.wikipedia.org/wiki/Transmission_%28telecommunications%29http://en.wikipedia.org/wiki/Telephonehttp://en.wikipedia.org/wiki/Fiber-optic_communicationhttp://en.wikipedia.org/wiki/Fiber-optic_communicationhttp://en.wikipedia.org/wiki/Fiber-optic_communicationhttp://en.wikipedia.org/wiki/Telephonehttp://en.wikipedia.org/wiki/Transmission_%28telecommunications%29http://en.wikipedia.org/wiki/Washington,_D.C.http://en.wikipedia.org/wiki/Volta_Laboratory_and_Bureauhttp://en.wikipedia.org/wiki/Volta_Laboratory_and_Bureauhttp://en.wikipedia.org/wiki/Photophonehttp://en.wikipedia.org/wiki/Charles_Sumner_Tainterhttp://en.wikipedia.org/wiki/Alexander_Graham_Bell
  • 7/27/2019 Resource Guide.ppt

    29/42

    29

    Modern fiber-optic communicationystems generally include an opticalransmitter to convert an electricalignal into an optical signal to send intohe optical fiber, a cable containingbundles of multiple optical fibers that isouted through underground conduits

    and buildings, multiple kinds ofamplifiers, and an optical receiver toecover the signal as an electricalignal. The information transmitted isypically digital information generated by

    omputers, telephone systems, andable television companies.

    Technology

    http://en.wikipedia.org/wiki/Optical_fiber_cablehttp://en.wikipedia.org/wiki/Digital_communicationshttp://en.wikipedia.org/wiki/Digital_telephonyhttp://en.wikipedia.org/wiki/Cable_televisionhttp://en.wikipedia.org/wiki/Cable_televisionhttp://en.wikipedia.org/wiki/Digital_telephonyhttp://en.wikipedia.org/wiki/Digital_communicationshttp://en.wikipedia.org/wiki/Optical_fiber_cable
  • 7/27/2019 Resource Guide.ppt

    30/42

    30

    Optical fiber can be used as a medium forelecommunication and computer networking because it flexible and can be bundled as cables. It is especiallydvantageous for long-distance communications,ecause light propagates through the fiber with littlettenuation compared to electrical cables. This allows

    ong distances to be spanned with few repeaters.he per-channel light signals propagating in the fiber

    ave been modulated at rates as high as 111 gigabitser second (Gbit/s) by NTT,[ although 10 or 40 Gbit/s isypical in deployed systems.[ In June 2013, researchersemonstrated transmission of 400 Gbit/s over a singlehannel using 4-mode orbital angular momentum modeivision multiplexing.[

    ach fiber can carry many independent channels, eachsing a different wavelength of light (wavelength-division

    multiplexing (WDM)). The net data rate (data ratewithout overhead bytes) per fiber is the per-channel dataate reduced by the FEC overhead, multiplied by the

    umber of channels (usually up to eighty in commercialense WDM systems as of 2008). As of 2011 the recordor bandwidth on a single core was 101 Tbit/sec (370hannels at 273 Gbit/sec each) The record for a multi-ore fibre as of January 2013 was 1.05 petabits perecond. In 2009, Bell Labs broke the 100 (Petabit per

    econd)kilometre barrier (15.5 Tbit/s over a single000 km fiber).[

    Optical fiber communication

    http://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Optical_communications_repeaterhttp://en.wikipedia.org/wiki/Gigabit_per_secondhttp://en.wikipedia.org/wiki/Gigabit_per_secondhttp://en.wikipedia.org/wiki/Nippon_Telegraph_and_Telephonehttp://en.wikipedia.org/wiki/Optical_fiberhttp://en.wikipedia.org/wiki/Optical_fiberhttp://en.wikipedia.org/wiki/Orbital_angular_momentum_of_lighthttp://en.wikipedia.org/wiki/Optical_fiberhttp://en.wikipedia.org/wiki/Wavelength-division_multiplexinghttp://en.wikipedia.org/wiki/Wavelength-division_multiplexinghttp://en.wikipedia.org/wiki/Dense_WDMhttp://en.wikipedia.org/wiki/Optical_fiberhttp://en.wikipedia.org/wiki/Optical_fiberhttp://en.wikipedia.org/wiki/Dense_WDMhttp://en.wikipedia.org/wiki/Wavelength-division_multiplexinghttp://en.wikipedia.org/wiki/Wavelength-division_multiplexinghttp://en.wikipedia.org/wiki/Wavelength-division_multiplexinghttp://en.wikipedia.org/wiki/Wavelength-division_multiplexinghttp://en.wikipedia.org/wiki/Optical_fiberhttp://en.wikipedia.org/wiki/Orbital_angular_momentum_of_lighthttp://en.wikipedia.org/wiki/Optical_fiberhttp://en.wikipedia.org/wiki/Optical_fiberhttp://en.wikipedia.org/wiki/Nippon_Telegraph_and_Telephonehttp://en.wikipedia.org/wiki/Gigabit_per_secondhttp://en.wikipedia.org/wiki/Gigabit_per_secondhttp://en.wikipedia.org/wiki/Optical_communications_repeaterhttp://en.wikipedia.org/wiki/Computer_network
  • 7/27/2019 Resource Guide.ppt

    31/42

    31

    An optical fiber is a cylindrical

    dielectric waveguide(nonconducting waveguide) thattransmits light along its axis, bythe process oftotal internal

    reflection. The fiber consists of acore surrounded by a claddinglayer, both of which are made of

    dielectric materials. To confine theoptical signal in the core, therefractive index of the core mustbe greater than that of the

    cladding. The boundary betweenthe core and cladding may eitherbe abrupt, in step-index fiber, or

    gradual, in graded-index fiber.

    Principle of operation

    http://en.wikipedia.org/wiki/Dielectric_waveguidehttp://en.wikipedia.org/wiki/Insulator_%28electrical%29http://en.wikipedia.org/wiki/Total_internal_reflectionhttp://en.wikipedia.org/wiki/Total_internal_reflectionhttp://en.wikipedia.org/wiki/Cladding_%28fiber_optics%29http://en.wikipedia.org/wiki/Dielectrichttp://en.wikipedia.org/wiki/Refractive_indexhttp://en.wikipedia.org/wiki/Step-index_profilehttp://en.wikipedia.org/wiki/Graded-index_fiberhttp://en.wikipedia.org/wiki/Graded-index_fiberhttp://en.wikipedia.org/wiki/Graded-index_fiberhttp://en.wikipedia.org/wiki/Graded-index_fiberhttp://en.wikipedia.org/wiki/Step-index_profilehttp://en.wikipedia.org/wiki/Step-index_profilehttp://en.wikipedia.org/wiki/Step-index_profilehttp://en.wikipedia.org/wiki/Refractive_indexhttp://en.wikipedia.org/wiki/Dielectrichttp://en.wikipedia.org/wiki/Cladding_%28fiber_optics%29http://en.wikipedia.org/wiki/Total_internal_reflectionhttp://en.wikipedia.org/wiki/Total_internal_reflectionhttp://en.wikipedia.org/wiki/Insulator_%28electrical%29http://en.wikipedia.org/wiki/Dielectric_waveguide
  • 7/27/2019 Resource Guide.ppt

    32/42

    32

    iber with large core diameter (greater than0 micrometers) may be analyzed by geometricaptics. Such fiber is called multi-mode fiber, fromhe electromagnetic analysis (see below). In atep-index multi-mode fiber, rays of light are

    uided along the fiber core by total internaleflection. Rays that meet the core-claddingoundary at a high angle (measured relative to ane normal to the boundary), greater than theritical angle for this boundary, are completelyeflected. The critical angle (minimum angle forotal internal reflection) is determined by theifference in index of refraction between the corend cladding materials. Rays that meet the

    oundary at a low angle are refracted from theore into the cladding, and do not convey lightnd hence information along the fiber. The criticangle determines the acceptance angle of theber, often reported as a numerical aperture.

    Multi-mode fiber

    http://en.wikipedia.org/wiki/Geometrical_opticshttp://en.wikipedia.org/wiki/Geometrical_opticshttp://en.wikipedia.org/wiki/Ray_%28optics%29http://en.wikipedia.org/wiki/Surface_normalhttp://en.wikipedia.org/wiki/Critical_angle_%28optics%29http://en.wikipedia.org/wiki/Core_%28optical_fiber%29http://en.wikipedia.org/wiki/Guided_rayhttp://en.wikipedia.org/wiki/Numerical_aperturehttp://en.wikipedia.org/wiki/Numerical_aperturehttp://en.wikipedia.org/wiki/Guided_rayhttp://en.wikipedia.org/wiki/Core_%28optical_fiber%29http://en.wikipedia.org/wiki/Critical_angle_%28optics%29http://en.wikipedia.org/wiki/Surface_normalhttp://en.wikipedia.org/wiki/Ray_%28optics%29http://en.wikipedia.org/wiki/Geometrical_opticshttp://en.wikipedia.org/wiki/Geometrical_optics
  • 7/27/2019 Resource Guide.ppt

    33/42

    33

    iber with a core diameter less than about tenmes the wavelength of the propagating lightannot be modeled using geometric optics.nstead, it must be analyzed as anlectromagnetic structure, by solution of

    Maxwell's equations as reduced to thelectromagnetic wave equation. The

    lectromagnetic analysis may also be requiredo understand behaviors such as speckle thatccur when coherent light propagates in multi-

    mode fiber. As an optical waveguide, the fiberupports one or more confined transverse

    modes by which light can propagate along theber. Fiber supporting only one mode is calledingle-mode ormono-mode fiber. The behaviorf larger-core multi-mode fiber can also be

    modeled using the wave equation, which showshat such fiber supports more than one mode ofropagation (hence the name). The results ofuch modeling of multi-mode fiberpproximately agree with the predictions of

    eometric optics, if the fiber core is largenough to support more than a few modes.

    Single-mode fiber

    http://en.wikipedia.org/wiki/Wavelengthhttp://en.wikipedia.org/wiki/Electromagnetismhttp://en.wikipedia.org/wiki/Maxwell%27s_equationshttp://en.wikipedia.org/wiki/Electromagnetic_wave_equationhttp://en.wikipedia.org/wiki/Coherence_%28physics%29http://en.wikipedia.org/wiki/Transverse_modehttp://en.wikipedia.org/wiki/Transverse_modehttp://en.wikipedia.org/wiki/Transverse_modehttp://en.wikipedia.org/wiki/Transverse_modehttp://en.wikipedia.org/wiki/Coherence_%28physics%29http://en.wikipedia.org/wiki/Electromagnetic_wave_equationhttp://en.wikipedia.org/wiki/Maxwell%27s_equationshttp://en.wikipedia.org/wiki/Electromagnetismhttp://en.wikipedia.org/wiki/Wavelength
  • 7/27/2019 Resource Guide.ppt

    34/42

    34

    Wi-Fi, also spelled Wi-Fi orWi-Fi, is a

    popular technology that allows anelectronic device to exchange data oronnect to the internet wirelesslysing radio waves. The Wi-Fi Alliance

    efines Wi-Fi as any "wireless localarea network (WLAN) products thatare based on the Institute of Electricaland Electronics Engineers' (IEEE)

    tandards".[1]

    However, since mostmodern WLANs are based on thesetandards, the term "Wi-Fi" is used ineneral English as a synonym for

    WLAN". Only Wi-Fi products thatomplete Wi-Fi Alliancenteroperability certification testinguccessfully may use the "Wi-Fi

    CERTIFIED" trademark.

    Wi-Fi

    http://en.wikipedia.org/wiki/Wireless_networkhttp://en.wikipedia.org/wiki/Radio_waveshttp://en.wikipedia.org/wiki/Wi-Fi_Alliancehttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Institute_of_Electrical_and_Electronics_Engineershttp://en.wikipedia.org/wiki/Institute_of_Electrical_and_Electronics_Engineershttp://en.wikipedia.org/wiki/802.11http://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/Interoperabilityhttp://en.wikipedia.org/wiki/Interoperabilityhttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/802.11http://en.wikipedia.org/wiki/802.11http://en.wikipedia.org/wiki/Institute_of_Electrical_and_Electronics_Engineershttp://en.wikipedia.org/wiki/Institute_of_Electrical_and_Electronics_Engineershttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Wi-Fi_Alliancehttp://en.wikipedia.org/wiki/Wi-Fi_Alliancehttp://en.wikipedia.org/wiki/Wi-Fi_Alliancehttp://en.wikipedia.org/wiki/Radio_waveshttp://en.wikipedia.org/wiki/Wireless_network
  • 7/27/2019 Resource Guide.ppt

    35/42

    35

    802.11 technology has its origins in a 1985 ruling by theUS Federal Communications Commission that releasedthe ISM band for unlicensed use. In 1991, NCRCorporation withAT&T Corporation invented theprecursor to intended for use in cashier systems. Thefirst wireless products were under the name WaveLAN.A large number of patents by many companies are usedin 802.11 standard.Vic Hayes has been called the "fatheof Wi-Fi" by some, due to his involvement in negotiatingthe initial standards within the IEEE while chairing theworkgroup.[

    A key patent used in Wi-Fi was developed by theAustralian radioastronomerJohn O'Sullivan as a by-product in a CSIRO research project, "a failedexperiment to detect exploding mini black holes the sizeof an atomic particle In 1992 and 1996,Australianorganization CSIRO obtained patents for a method later

    used in Wi-Fi to "unsmear" the signal.In 1999, the Wi-Fi Alliance was formed as a tradeassociation to hold the Wi-Fi trademark under whichmost products are sold

    History

    http://en.wikipedia.org/wiki/ISM_bandhttp://en.wikipedia.org/wiki/NCR_Corporationhttp://en.wikipedia.org/wiki/NCR_Corporationhttp://en.wikipedia.org/wiki/AT%26T_Corporationhttp://en.wikipedia.org/wiki/WaveLANhttp://en.wikipedia.org/wiki/Vic_Hayeshttp://en.wikipedia.org/wiki/Institute_of_Electrical_and_Electronics_Engineershttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/John_O%27Sullivan_%28engineer%29http://en.wikipedia.org/wiki/CSIROhttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/Australianhttp://en.wikipedia.org/wiki/Wi-Fi_Alliancehttp://en.wikipedia.org/wiki/Wi-Fi_Alliancehttp://en.wikipedia.org/wiki/Wi-Fi_Alliancehttp://en.wikipedia.org/wiki/Wi-Fi_Alliancehttp://en.wikipedia.org/wiki/Australianhttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/CSIROhttp://en.wikipedia.org/wiki/John_O%27Sullivan_%28engineer%29http://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/Institute_of_Electrical_and_Electronics_Engineershttp://en.wikipedia.org/wiki/Vic_Hayeshttp://en.wikipedia.org/wiki/WaveLANhttp://en.wikipedia.org/wiki/AT%26T_Corporationhttp://en.wikipedia.org/wiki/NCR_Corporationhttp://en.wikipedia.org/wiki/NCR_Corporationhttp://en.wikipedia.org/wiki/ISM_band
  • 7/27/2019 Resource Guide.ppt

    36/42

    36

    The IEEE does not test equipment forompliance with their standards. The non-profit

    Wi-Fi Alliance was formed in 1999 to fill thisoid to establish and enforce standards fornteroperability and backward compatibility, ando promote wireless local-area-networkechnology. As of 2010, the Wi-Fi Alliance

    onsisted of more than 375 companies fromround the world.[23][24] The Wi-Fi Alliancenforces the use of the Wi-Fi brand toechnologies based on the IEEE 802.11tandards from the Institute of Electrical and

    Electronics Engineers. This includes wirelessocal area network (WLAN) connections, deviceo device connectivity (such as Wi-Fi Peer to

    Peer aka Wi-Fi Direct), Personal area network

    PAN), local area network (LAN) and evenome limited wide area network (WAN)onnections. Manufacturers with membershipn the Wi-Fi Alliance, whose products pass theertification process, gain the right to mark

    hose products with the Wi-Fi logo.

    Wi-Fi certification

    http://en.wikipedia.org/wiki/Non-profithttp://en.wikipedia.org/wiki/Backward_compatibilityhttp://en.wikipedia.org/wiki/Wirelesshttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/Institute_of_Electrical_and_Electronics_Engineershttp://en.wikipedia.org/wiki/Institute_of_Electrical_and_Electronics_Engineershttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Personal_area_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Wide_area_networkhttp://en.wikipedia.org/wiki/Wide_area_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Personal_area_networkhttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Wireless_LANhttp://en.wikipedia.org/wiki/Institute_of_Electrical_and_Electronics_Engineershttp://en.wikipedia.org/wiki/Institute_of_Electrical_and_Electronics_Engineershttp://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/Wirelesshttp://en.wikipedia.org/wiki/Backward_compatibilityhttp://en.wikipedia.org/wiki/Non-profithttp://en.wikipedia.org/wiki/Non-profithttp://en.wikipedia.org/wiki/Non-profit
  • 7/27/2019 Resource Guide.ppt

    37/42

    37

    A Wi-Fi-enabled device can

    connect to the Internet when withinrange of a wireless network whichis configured to permit this. The

    coverage of one or more(interconnected) access pointscalled hotspots can extend froman area as small as a few rooms to

    as large as many square miles.Coverage in the larger area mayrequire a group of access points

    with overlapping coverage. Outdoopublic Wi-Fi technology has beenused successfully in wireless meshnetworks in London, UK.

    Internet access

    http://en.wikipedia.org/wiki/Wireless_networkhttp://en.wikipedia.org/wiki/Wireless_access_pointhttp://en.wikipedia.org/wiki/Wireless_mesh_networkhttp://en.wikipedia.org/wiki/Wireless_mesh_networkhttp://en.wikipedia.org/wiki/Wireless_mesh_networkhttp://en.wikipedia.org/wiki/Wireless_mesh_networkhttp://en.wikipedia.org/wiki/Wireless_access_pointhttp://en.wikipedia.org/wiki/Wireless_network
  • 7/27/2019 Resource Guide.ppt

    38/42

    38

    n the early 2000s, many cities around theworld announced plans to construct city-

    wide Wi-Fi networks. There are manyuccessful examples; in 2004, Mysorebecame India's first Wi-Fi-enabled cityand second in the world afterJerusalem.

    A company called WiFiyNet has set upotspots in Mysore, covering the completeity and a few nearby villages.[n 2005, Sunnyvale, California, became

    he first city in the United States to offerity-wide free Wi-Fi. Minneapolis hasenerated $1.2 million in profit annually

    orits provider.

    n May 2010, London, UK, MayorBorisohnson pledged to have London-wideWi-Fi by 2012. Several boroughsncluding Westminster and Islington

    already have extensive outdoor Wi-Fioverage.

    City-wide Wi-Fi

    http://en.wikipedia.org/wiki/Mysorehttp://en.wikipedia.org/wiki/Jerusalemhttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/Sunnyvale,_Californiahttp://en.wikipedia.org/wiki/Minneapolishttp://en.wikipedia.org/wiki/Minneapolis_wireless_internet_networkhttp://en.wikipedia.org/wiki/Londonhttp://en.wikipedia.org/wiki/Boris_Johnsonhttp://en.wikipedia.org/wiki/Boris_Johnsonhttp://en.wikipedia.org/wiki/Boris_Johnsonhttp://en.wikipedia.org/wiki/Boris_Johnsonhttp://en.wikipedia.org/wiki/Londonhttp://en.wikipedia.org/wiki/Minneapolis_wireless_internet_networkhttp://en.wikipedia.org/wiki/Minneapolishttp://en.wikipedia.org/wiki/Sunnyvale,_Californiahttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/Jerusalemhttp://en.wikipedia.org/wiki/Mysore
  • 7/27/2019 Resource Guide.ppt

    39/42

    39

    Wi-Fi allows cheaper deployment oflocal areaetworks (LANs). Also spaces where cables

    annot be run, such as outdoor areas andistorical buildings, can host wireless LANs.Manufacturers are building wireless networkdapters into most laptops. The price ofchipsetsor Wi-Fi continues to drop, making it an

    conomical networking option included in evenmore devices.[citation needed]Different competitive brands of access points andlient network-interfaces can inter-operate at aasic level of service. Products designated asWi-Fi Certified" by the Wi-Fi Alliance areackwards compatible. Unlike mobile phones,ny standard Wi-Fi device will work anywhere inhe world.

    Wi-Fi Protected Access encryption (WPA2) isonsidered secure, provided a strongassphrase is used. New protocols forquality-of-ervice (WMM) make Wi-Fi more suitable foratency-sensitive applications (such as voice and

    ideo). Power saving mechanisms (WMM PowerSave) extend battery life.

    Advantages

    http://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Chipsethttp://en.wikipedia.org/wiki/Wikipedia:Citation_neededhttp://en.wikipedia.org/wiki/Backwards_compatiblehttp://en.wikipedia.org/wiki/Mobile_phonehttp://en.wikipedia.org/wiki/Wi-Fi_Protected_Accesshttp://en.wikipedia.org/wiki/Passphrasehttp://en.wikipedia.org/wiki/Quality_of_servicehttp://en.wikipedia.org/wiki/Quality_of_servicehttp://en.wikipedia.org/wiki/Wireless_Multimedia_Extensionshttp://en.wikipedia.org/wiki/Wireless_Multimedia_Extensionshttp://en.wikipedia.org/wiki/Quality_of_servicehttp://en.wikipedia.org/wiki/Quality_of_servicehttp://en.wikipedia.org/wiki/Quality_of_servicehttp://en.wikipedia.org/wiki/Quality_of_servicehttp://en.wikipedia.org/wiki/Quality_of_servicehttp://en.wikipedia.org/wiki/Passphrasehttp://en.wikipedia.org/wiki/Wi-Fi_Protected_Accesshttp://en.wikipedia.org/wiki/Wi-Fi_Protected_Accesshttp://en.wikipedia.org/wiki/Wi-Fi_Protected_Accesshttp://en.wikipedia.org/wiki/Mobile_phonehttp://en.wikipedia.org/wiki/Backwards_compatiblehttp://en.wikipedia.org/wiki/Wikipedia:Citation_neededhttp://en.wikipedia.org/wiki/Chipsethttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Local_area_network
  • 7/27/2019 Resource Guide.ppt

    40/42

    40

    pectrum assignments and operational limitations areot consistent worldwide: most of Europe allows for andditional two channels beyond those permitted in theS for the 2.4 GHz band (113 vs. 111), while Japanas one more on top of that (114). As of 2007, Europe essentially homogeneous in this respect.

    Wi-Fi signal occupies five channels in the 2.4 GHzand. Any two channel numbers that differ by five or

    more, such as 2 and 7, do not overlap. The oft-repeateddage that channels 1, 6, and 11 are the onlynon-verlapping channels is, therefore, not accurate.hannels 1, 6, and 11 are the only group of three non-

    verlapping channels in the U.S. In Europe and Japansing Channels 1, 5, 9, and 13 for802.11g and 802.11nrecommended.[citation needed]

    quivalent isotropically radiated power(EIRP) in the EU limited to 20 dBm (100 mW).

    he current 'fastest' norm, 802.11n, uses double theadio spectrum/bandwidth (40 MHz) compared to02.11a or 802.11g (20 MHz).[citation needed] This meanshere can be only one 802.11n network on the 2.4 GHzand at a given location, without interference to/fromther WLAN traffic. 802.11n can also be set to use

    0 MHz bandwidth only to prevent interference in denseommunity.[citation needed]

    Limitations

    http://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/Wikipedia:Citation_neededhttp://en.wikipedia.org/wiki/Equivalent_isotropically_radiated_powerhttp://en.wikipedia.org/wiki/DBmhttp://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/Wikipedia:Citation_neededhttp://en.wikipedia.org/wiki/Wikipedia:Citation_neededhttp://en.wikipedia.org/wiki/Wikipedia:Citation_neededhttp://en.wikipedia.org/wiki/Wikipedia:Citation_neededhttp://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/DBmhttp://en.wikipedia.org/wiki/Equivalent_isotropically_radiated_powerhttp://en.wikipedia.org/wiki/Wikipedia:Citation_neededhttp://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/IEEE_802.11
  • 7/27/2019 Resource Guide.ppt

    41/42

    41

    Wi-Fi networks have limited range. Aypical wireless access point using

    802.11b or802.11g with a stock antennamight have a range of 35 m (120 ft)ndoors and 100 m (300 ft) outdoors. IEEE802.11n, however, can more than double

    he range.[41] Range also varies withrequency band. Wi-Fi in the 2.4 GHzrequency block has slightly better rangehan Wi-Fi in the 5 GHz frequency block

    which is used by 802.11a and optionallyby 802.11n. On wireless routers with

    etachable antennas, it is possible tomprove range by fitting upgraded

    antennas which have higher gain inparticular directions. Outdoor ranges canbe improved to many kilometers throughhe use of high gain directional antennas

    at the router and remote device(s).

    Range

    http://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/Directional_antennahttp://en.wikipedia.org/wiki/Directional_antennahttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/IEEE_802.11http://en.wikipedia.org/wiki/IEEE_802.11
  • 7/27/2019 Resource Guide.ppt

    42/42

    The most common wireless encryption-tandard, Wired Equivalent Privacy (WEP),

    as been shown to be easily breakable evenwhen correctly configured. Wi-Fi ProtectedAccess (WPA and WPA2) encryption, whichecame available in devices in 2003, aimedo solve this problem. Wi-Fi access pointsypically default to an encryption-free (open)

    mode. Novice users benefit from a zero-onfiguration device that works out-of-the-ox, but this default does not enable any

    wireless security, providing open wirelessccess to a LAN. To turn security on requireshe user to configure the device, usually via aoftware graphical user interface (GUI). Onnencrypted Wi-Fi networks connecting

    evices can monitor and record datancluding personal information). Suchetworks can only be secured by using other

    means of protection such as a VPN or

    Data security risks

    http://en.wikipedia.org/wiki/Encryptionhttp://en.wikipedia.org/wiki/Wired_Equivalent_Privacyhttp://en.wikipedia.org/wiki/Fluhrer,_Mantin_and_Shamir_attackhttp://en.wikipedia.org/wiki/Wi-Fi_Protected_Accesshttp://en.wikipedia.org/wiki/Wi-Fi_Protected_Accesshttp://en.wikipedia.org/wiki/Wireless_access_pointhttp://en.wikipedia.org/wiki/Wireless_securityhttp://en.wikipedia.org/wiki/Graphical_user_interfacehttp://en.wikipedia.org/wiki/Virtual_private_networkhttp://en.wikipedia.org/wiki/Virtual_private_networkhttp://en.wikipedia.org/wiki/Graphical_user_interfacehttp://en.wikipedia.org/wiki/Wireless_securityhttp://en.wikipedia.org/wiki/Wireless_access_pointhttp://en.wikipedia.org/wiki/Wi-Fi_Protected_Accesshttp://en.wikipedia.org/wiki/Wi-Fi_Protected_Accesshttp://en.wikipedia.org/wiki/Wi-Fi_Protected_Accesshttp://en.wikipedia.org/wiki/Wi-Fi_Protected_Accesshttp://en.wikipedia.org/wiki/Fluhrer,_Mantin_and_Shamir_attackhttp://en.wikipedia.org/wiki/Wired_Equivalent_Privacyhttp://en.wikipedia.org/wiki/Encryption