Wireless Communication and Wireless Networking

You are not Member of this Project.
Project Owner : vani.R
Created Date : Thu, 15/03/2012 - 12:11
Project Description :


Wireless Communication and Wireless Networkingtalks about Wireless Communication and Wireless Network. The research paper talks about the basic frame work to realize this. Wireless communication basically deals with a situation wherein there is no requirement of wires. It is an operation undertaken without a hardwired network.

Wireless communication is increasing in an astronomical way. People cannot let them be away from information access wherever they might be. They may be enjoying a vacation or flying and the information has to reach them somehow come what may. Here in comes into existence the great use of wireless networking. The research paper quotes the example of a laptop and the wireless communication methods it offers. In a global application based/oriented world wireless communication plays a great role.



Applications of wireless technology

[edit]Mobile telephones

One of the best-known examples of wireless technology is the mobile phone, also known as a cellular phone, with more than 4.6 billion mobile cellular subscriptions worldwide as of the end of 2010. [These wireless phones use radio waves to enable their users to make phone calls from many locations worldwide. They can be used within range of the mobile telephone site used to house the equipment required to transmit and receive the radio signals from these instruments.

[edit]Wireless data communications

Wireless data communications are an essential component of mobile computing.[7] The various available technologies differ in local availability, coverage range and performance[8][9], and in some circumstances, users must be able to employ multiple connection types and switch between them. To simplify the experience for the user, connection manager software can be used [10][11], or amobile VPN deployed to handle the multiple connections as a secure, single virtual network.[12] Supporting technologies include:

Wi-Fi is a wireless local area network that enables portable computing devices to connect easily to the Internet.[13] Standardized as IEEE 802.11 a,b,g,n, Wi-Fi approaches speeds of some types of wired Ethernet. Wi-Fi has become the de facto standard for access in private homes, within offices, and at public hotspots.[14] Some businesses charge customers a monthly fee for service, while others have begun offering it for free in an effort to increase the sales of their goods.[15]
Cellular data service offers coverage within a range of 10-15 miles from the nearest cell site.[8] Speeds have increased as technologies have evolved, from earlier technologies such as GSM,CDMA and GPRS, to 3G networks such as W-CDMAEDGE or CDMA2000.[16][17]
Mobile Satellite Communications may be used where other wireless connections are unavailable, such as in largely rural areas[18] or remote locations.[8] Satellite communications are especially important for transportationaviationmaritime and military use.[19]

[edit]Wireless energy transfer


Wireless energy transfer is a process whereby electrical energy is transmitted from a power source to an electrical load that does not have a built-in power source, without the use of interconnecting wires.

[edit]Computer interface devices

Answering the call of customers frustrated with cord clutter, many manufactures of computer peripherals turned to wireless technology to satisfy their consumer base. Originally these units used bulky, highly limited transceivers to mediate between a computer and a keyboard and mouse, however more recent generations have used small, high quality devices, some even incorporating Bluetooth. These systems have become so ubiquitous that some users have begun complaining about a lack of wired peripherals.[who?] Wireless devices tend to have a slightly slower response time than their wired counterparts, however the gap is decreasing. Concerns about the security of wireless keyboards arose at the end of 2007, when it was revealed that Microsoft's implementation of encryption in some of its 27 MHz models was highly insecure.


You are not authorized to access this content.
You are not authorized to access this content.
You are not authorized to access this content.
You are not authorized to access this content.
You are not authorized to access this content.