Book

Developing Practical Wireless Applications

Authors:

Abstract

In a constant stream of new ideas, wireless technologies continue to emerge offering a range of capabilities, each affording simplicity and ease-of-use. Such diversity and choice should surely beg the question, "are manufacturers using the right technology for the right product?_ Developing Practical Wireless Applications will explore this question and, in doing so, will illustrate many of the wireless technologies currently available whilst drawing upon their individual strengths and weaknesses. More specifically, the book will draw your attention to the diverse collection of standardized and proprietary solutions available to manufacturers. As developers and innovators your choices are not restricted to any norm and, as such, a standardized or proprietary solution may afford you greater benefits in realising any product roadmap. Developing Practical Wireless Applications will provide you with a comprehensive understanding of how each technology works, coupled with an exploration into overlapping, complementary and competing technologies. In establishing this foundation, we will explore wireless applications in their context and address their suitability. In contrast, the book also considers the practicality of a wireless world in an attempt to better understand our audience and specific demographic groups. Coupled with a richer understanding of our consumers, along with our technology make-up we can indeed target wireless products more effectively. *Explores techniques used to attack wireless networks including WarXing, WarChalking, BlueJacking, and BlueSnarfing *Discusses applications utilizing ZigBee, NFC, RFID, Ultra-Wideband and WirelessUSB (WiMedia) *Details Bluetooth 2.x +EDR and introduces the v3.0 (BToverUWB) specification *Includes fundamental introductions to WiFi, namely 802.11i, 802.11p and 802.11n *Compares personal-area and wide-area communications including 3G, HSDPA, 4G, and WiMAX, as well as introducing Wireless Convergence.
... A estrutura de rede do sistema, assim como o GSM, é transparente para o usuário final e dividida em duas partes: o subsistema de rede de acesso de radio ou RAN (Radio Access Network); o núcleo de rede ou CN (Core Network), parte responsável pela interconexão de redes e controle de usuários, herdando as funções da rede GSM e agregando novas funções. Os elementos principais do núcleo do sistema são [4], [5]: Mobile Switching Center (MSC) é o local onde as ligações são interconectadas; Home Location Register (HLR) é um banco de dados dos usuários; Authentication Centre (AuC) é o local onde o SIM é autenticado; Visitor Location Register (VLR) é um banco de dados temporário para usuários em roaming; Equipment Identity Register (EIR) lista de aparelhos banidos do sistema ou sob monitoração; Serving GPRS Support Node (SGSN) é a parte responsável pela entrega de pacotes GPRS aos aparelhos da rede; Gateway GPRS Support Node (GGSN) é a interface entre GPRS e outras redes tais como a Internet. Estas tecnologias possuem algumas limitações. ...
... Quando se desloca para um lugar fora de sua rede de origem, embora ainda na cobertura da operadora, paga-se um preço um pouco mais caro. Se utilizar a rede de outra operadora, o preço a pagar será bem maior [3], [5], [7]; -Necessidade de convergência: a rápida evolução da tecnologia da informação e da telefonia celular levou a uma busca desenfreada por serviços que agreguem mais valor ao usuário, a custos menores. A busca por serviços assim são norteadas pelo mercado, pela necessidade de oferta e pela atual demanda, e a tecnologia GSM é deficitária neste perfil, por possuir baixas taxas de transferência de dados [9]- [11]. ...
... ZigBee, przykładem zamkniętego np. Z-Wave [4]. W przypadku standardów otwartych dostęp do ich specyfikacji jest ogólnie dostępny. ...
... Z-Wave (http://www.z-wave.com) jest bezprzewodowym protokołem zaprojektowanym przez firmę ZenSys przeznaczonym do urządzeń automatyki domowej [4], [8]. Technologia Z-Wave nie jest otwartym standardem komunikacji bezprzewodowej urządzeń automatyki domowej ale ze względu na jej popularność oraz liczbę dostępnych urządzeń jest bardzo popularna i często stosowana. ...
... RFID es una tecnología que surge a finales de la década de los cuarenta y que se impulsa su uso a través de sistemas de vigilancia electrónica. Los dispositivos RFID pueden operar dentro de tres distintos rangos de frecuencias en función de la aplicación particular [1]; baja de 125 kHz a 134 kHz o de 140 kHz a 148.5 kHz, alta de 13.56 MHz y ultra alta entre 868 MHz y 928 MHz. Se definen dos elementos en las comunicaciones RFID, la etiqueta o tag y el lector o interrogador. ...
... Por otro lado NFC es un protocolo de comunicaciones de corto alcance que surge de combinar tecnologías de interconexión y RFID. NFC permite a dos dispositivos electrónicos realizar una comunicación punto a punto con el simple hecho de que ambos entren en contacto (en la práctica porque estén a una distancia muy corta, hasta 10 cm) utilizando la banda alta de frecuencia de 13.56 MHz [1,2]. Por su parte, Bluetooth es una especificación que define redes inalámbricas de área personal (WPAN) de corto alcance, trabajando en las frecuencias 2.4 GHz a 2.4835 GHz. ...
Conference Paper
Full-text available
En este trabajo se presenta el desarrollo de una plataforma, basada en un microprocesador de bajo coste, que pretende acercar a los alumnos al uso y desarrollo de aplicaciones basadas en las tecnologías inalámbricas RFID y Bluetooth. Mientras que el estándar NFC representa el ejemplo más claro del elevado crecimiento que están experimentado recientemente los dispositivos RFID, Bluetooth personifica el grado de desarrollo y uso que pueden alcanzar estas tecnologías inalámbricas gracias a los dispositivos electrónicos de uso cotidiano como son teléfonos móviles, PDAs y PCs portátiles. Para mostrar a los alumnos el interés de ambas tecnologías, se ha desarrollado un sistema simple para la realización de trabajos prácticos en una asignatura denominada “Laboratorio de Instrumentación Electrónica”, adscrita a la titulación de Ingeniería de telecomunicaciones en la escuela Superior de Ingenieros de la Universidad de Sevilla.
... The field of wireless local area networks (WLANs) is being widely studied and used in various emerging research domains such as mobile and pervasive computing, where WLANs provide high-speed wireless connection and support accessing information from anywhere and anytime. WLANs [1][2][3] support a wide range of applications, which may include simple applications such as web browsing, file transferring, etc. and the other ones, for instance, real-time multimedia applications (e.g., video streaming and video conferencing). IEEE 802.11is a vital standard for wireless LAN, which adopts the standard 802 logical link control (LLC) protocol that is further divided into two sub layers: physical layer (PHY) and medium access control (MAC) layer. ...
... Los protocolos WirelessHART e ISA100.11ª [8] utilizan este estándar para la capa física y los protocolos Zigbee [9], 6Lowpan [10] usan para la capa física y de enlace i como se muestra en la Figura 1. ...
Article
A particular case of wireless sensor networks are those that have a linear topology. These networks are used in monitoring large-scale linear infrastructures that are characterized by having thousands of sensor nodes, hundreds of hops and great lengths. The requirements for routing in linear topologies are minimal relative to the requirements of other topologies. There are currently several network architectures and routing protocols for wireless sensor networks, which have been created based on the application that will run on the nodes. Routing protocols designed for mesh, tree, and star topologies are very complex when applied to linear multi-hop topologies, resulting in large processing delays. This article defines the relevance of the existence of the network level in the network architecture with linear topology, for which the functions of the network protocols that are applicable to linear topologies are analyzed. Finally, it is justified that the network level is not necessary in wireless sensor networks with linear topology, and as a consequence, the network levels that the new network architecture should have are proposed.
... Wireless technology is commonly marketed as a tool that promotes mobility, transparency, and freedom, enabling users to roam from office, to café or restaurant, and even to the beach (Gratton, 2007). Currently there are at least three types of mobile ...
Article
The main objectives of this study were to explore generic applications of mobile communications and to understand the value-added development of mobile tourism (M-tourism). The authors introduce how information technologies have evolved to support mobile applications and services in the tourism context. Four generations have been identified in the evolution of mobile platforms. The authors define Mobile value propositions for M-tourism and discuss the fundamentals of mobile value creation to enrich value-added services for mobile tourists. Consequently, future research approaches to study mobile tourism marketing are discussed.
... Within the context of tourism, advanced mobile technologies extend the ability of travelers to experience a destination by providing access to the internet, get multimedia-based information, and trade m-Commerce (mobile commerce) in a 'one-stop shopping' experiential environment. This fact is echoed by Gratton (2007) who describes that wireless technology is commonly marketed as a tool that promotes mobility, transparency, and freedom, enabling users to roam from offi ce, to café or restaurant, and even to the beach. Human's understanding of 'liberating' travel experience in association with the daily life has continued to be a research focus of many tourism and leisure scholars. ...
Article
Full-text available
The main purpose of this paper is to conceptualize virtual tourism in the mobile context. Through the concept of telepresence, the typology of virtual experience can be explained by two dimensions: vividness and interactivity. The authors first discuss virtual experience in terms of several categories ranging from verbal-based to animated interactive experience. Based on these categories, various mobile applications are then identified to complete the typology. Finally, practical discussions are provided with examples to illustrate various mobile services that facilitate virtual experiences and the application of the mobile-mediated virtual experience to tourism with consideration of the destination marketing organization's innovativeness and consumers' needs for mobile usage.
... The field of wireless local area networks (WLANs) is being widely studied and used in various emerging research domains such as mobile and pervasive computing, where WLANs provide high-speed wireless connection and support accessing information from anywhere and anytime. WLANs [1][2][3] support a wide range of applications, which may include simple applications such as web browsing, file transferring, etc. and the other ones, for instance, real-time multimedia applications (e.g., video streaming and video conferencing). IEEE 802.11is a vital standard for wireless LAN, which adopts the standard 802 logical link control (LLC) protocol that is further divided into two sub layers: physical layer (PHY) and medium access control (MAC) layer. ...
Data
Full-text available
Wireless networks have biggest constraint of limited bandwidth in comparison to wired networks but in spite of this constraint wireless networks are becoming popular day by day on account of their flexibility, mobility as well as inexpensive physical medium (air). This paper aims to simulate wireless local area network. The performance of the network is evaluated using optimized network engineering tool, OPNET 14.5 modeler,over four major physical layer technologies Infra-Red , Direct Sequence Spread Spectrum DSSS, Frequency Hopping Spread Spectrum FHSS and Orthogonal Frequency Division Multiplexing OFDM at multiple transmissionrates,1Mbps,2Mbps,5.5Mbps,6Mbps, 9Mbps,11Mbps, 36Mbps,48Mbps, 54Mbps. DSSS can use 1,2,5.5,11 Mbps rates. FHSS and IR are able to operate at 1or 2 Mbps rates, while OFDM is capable to operate at 6, 9,11,36,48 or 54 Mbps rate.A trade-off exists between the selected data rate and the physical technology. It is founded that at some transmission rate, the OFDM technology delay is better than in DSSS. FHSS delay is less than DSSS delay. IR delay is better than FHSS and DSSS delay. In addition, for one physical layer technology the delay can be reduced by increasing the transmission rate of the channel. General Terms Throughput, delay, loads. Keywords Wireless LAN, IEEE 802.11 OPNET.
... The adoption of wireless technology is demanding and it is crucial for a product market success. Wireless product generates group of interest among peer groups which will result in well received product and accepted by wider group of users [1]. The wireless connectivity is used for the exchange of information over the networks and it is also widely used for IP telephony and IP video conferencing. ...
Article
WiFi is widely implemented in campus wide including administrative, teaching and student's accommodation. Wireless communications are associated with interconnect devices which includes cellular networks, infrared, bluetooth and WiFi enabled devices. It involves mobility and freedom of assessing information anytime and anywhere. A study on WiFi networks in a campus environment is presented in this paper. The aim of the research was to investigate the connectivity problems to WiFi networks. The study includes WiFi performance analysis as well as network auditing. Channel overlapping and saturation condition were some of the problems encountered. Different types of software were used for analyzing the results. Comment: Norrozila Sulaiman and Che Yahaya Yaakub, "Investigation on QoS of Campus-wide WiFi Networks", Journal of Telecommunications, Volume 2, Issue 1, p12-16, April 2010
Conference Paper
Full-text available
W artykule opisano i porównano dwie technologie bezprzewodowych urządzeń automatyki domowej Z-Wave i ZigBee. Zostały one porównywane pod kątem możliwości wykorzystania, ceny, dostępności urządzeń, bezpieczeństwa danych.
Article
Full-text available
Nigerian government is faced with the problem of reconciling access to education with quality in the face of the explosive population of school age children and youths, against the backdrop of inadequate educational facilities and infrastructure. The nation's tertiary institutions can hardly accommodate up to 30% of the population of prospective candidates into tertiary institutions in Nigeria. This puts high pressure on the admission process. Thus manual methods of credentials evaluation to determine eligible candidates in the various courses of study, becomes cumbersome and error prone. More often than not, evaluation and selection processes are compromised as a result of personal interest, subjectivity in judgment, fatigue or graft. Consequently, some candidates are enrolled into courses where the fall short of entry requirements. Following established principles for software architecture designs, this study seeks to present a suitable architecture that can be used to design data structures and program components that are required to build a computer-based system for determining the eligibility of candidates seeking admission into tertiary institutions in Nigeria. It presents the structure and properties of the components that constitute the system, and the interrelationships that occur among all the architectural components of the system. This framework presents standards and procedures which systems developers can adopt to develop generic application for credentials evaluation and eligibility clearance for prospective candidates into Nigerian tertiary institutions.
Article
In today’s world, everything around us are about to expose the harmful radiations. In India, there is no proper automatic monitoring system for the patients in the hospital. Even in the hospitals, the surgeries are done using Internet connectivity where WI-FI leads the way. The Wi-Fi technology uses RF spectrum which exhibits the harmful radiations. The LI-FI Technology will overcome this effect as it uses visible light as a source which is non-hazardous. Some of the death in the medical field happens due to the lack of proper electric facilities and monitoring system. By means of using LI-FI we can overcome the problems of power insufficiency and also the data transmission. Our Li-Fi kit will act as a mediator that converts any kind of visible light source into data for transmission. So, the one who has our kit can send and receive data in high speed even at a rate of several Gbps.
Article
This paper presents various issues concerning mobile device-to-infrastructure information flow and emphasizes some specific features concerning the client-server model in Internet-based mobile telecommunications systems. Integration of such a system in an ad hoc traffic monitoring network is proposed and some practical aspects of its realization are also presented.
Article
As the performance of the Mobile Ad-Hoc Networks and Wireless Communication Networks becomes important. The need for better and protected techniques to secure the transmission of information across these networks gathers importance. Among a few number of techniques suggested and implemented so far perhaps one method which has been overlooked is the weighting technique which could be applied to any digital coding techniques used by the wireless networks. In this research application of what is termed as "Weighted Pulse Code Modulation (WPCM)" is considered together with its pros and cons. Implementation of a prototype system and results obtained are analyzed. Simulation results have shown that application of this method could be an effective path in delivering higher and efficient throughput when backbone path of such networks becomes severely constrained.
Conference Paper
Wireless technologies are generally involves cellular networks, infrared, bluetooth and WiFi enabled devices. Wireless networks are normally associated with mobility as well as freedom of assessing the data anytime and at any place. Hence, ensuring a high quality service in wireless network environment is crucial. This paper presents a study on WiFi network in an educational environment. The purpose of this study was to investigate the user problems in connecting to the network and it involved two parts that are WiFi performance study as well as network auditing. A few solutions had been proposed to overcome these issues and a detailed description of each developed activity was described.
ResearchGate has not been able to resolve any references for this publication.