INTRODUCTION
The term wireless refers to telecommunication technology,
in which radio waves; infrared waves and microwaves,
instead of cables or wires are used to carry a signal to
connect communication devices. These devices include
pagers, cell phones, portable PCs, computer networks,
location devices, satellite systems and handheld digital
assistants. Wireless technology is rapidly evolving, and is
playing an ever-increasing role in the lives of people
throughout the world.
Wireless technologies can both support the institutional
mission and provide cost-effective solutions. Wireless is
being adopted for many new applications: to connect
computers,
to
allow
remote
monitoring
and
data
to
check
stocks
and
from
their
internet-enabled
technologies.
For
the
purposes
of
this
paper,
(GSM),
Time
Division
Multiple
Access
is
growing
rapidly
with
better
and
more
interoperable products.
3. Data Networking
In this paper, we differentiate between pure data applications
in (1) wireless local area networks (WLANs) and data, voice,
and video converged in (2) broadband wireless. We also briefly
discuss (3) Bluetooth, an emerging wireless technology.
3.1 Wireless Local Area Networks
Wireless Local Area Networks (WLAN) are implemented as an
extension to wired LANs within a building and can provide the
final few meters of connectivity between a wired network and
the mobile user.
WLANs are based on the IEEE 802.11 standard. There are
three
physical
layers
for
WLANs:
two
radio
frequency
the
2.4
GHz
license-free
frequency
band and
have
to
provide
an
alternative
to
cable
between
two
geographically distant locations (up to 30 miles). Point-tomulti-point solutions connect several, separate locations to one
single location or building. Both point-to-point and point-tomultipoint can be based on the 802.11b standard or on more
costly infrared-based solutions that can provide throughput
rates up to 622 Mbps (OC-12 speed).
In a typical WLAN infrastructure configuration, there are two
basic components:
1.
3.
.
Wireless Client Adapter A wireless adapter connects users
via an access point to the rest of the LAN. A wireless adapter
can be a PC card in a laptop, an ISA or PCI adapter in a
desktop computer, or can be fully integrated within a handheld
device.
3.2 Broadband Wireless
Broadband wireless (BW) is an emerging wireless technology
that allows simultaneous wireless delivery of voice, data, and
video. BW is considered a competing technology with Digital
Subscriber
Line
(DSL).
It
is
generally
implemented
in
3.
a.
The
high
cost
of
deploying
the
satellite
Initial
deployments
represent
proprietary
thus
making
their
use
in
mobile
wireless
Lucent,
Motorola,
Nokia,
and
over
1,800
Bluetooth
Bluetooth is a simple type of wireless networking that allows the
formation of a small network with up to eight devices being connected
at once. Such devices would include PDAs, Laptops, Mobile Phones
and Personal Computers. However, Bluetooth may also be found in
keyboards, mice, headsets and mobile phone hands-free kits, amongst
others. It was originally invented by Ericsson in 1994. In 1998 the
Bluetooth SIG (Special Interest Group) was formed by a small number
of major companies Ericsson, Nokia, Intel and Toshiba to help each
other develop and promote the technology. Bluetooth falls under
personal area networking since it is has a very short range 30 to 300
feet. This sort of range adds to the security of such a technology in
that if someone wanted to sniff your connection they would not only
need special equipment but also they would have to be fairly close to
you. The main features of Bluetooth are that unlike Infra Red, the
been
formed
to
ensure
network
and
device
physical
obstacles
(walls,
stairways,
etc.),
while
high
throughput
decreases
as
distance
from
the
of
the
transmission
mechanism
(electromagnetic
that
is
being
transmitted.
For
example,
in
2.
3.
4.
Wireless
Equivalency
Privacy
(WEP)
utilizes
data
not
less
secure.
Application
level
encryption
Security
The following are three methods of security available when it comes
to wireless:
WEP (Wired Equivalent Privacy)
Wired Equivalent Privacy is intended to stop the interception of
radio frequency signals by unauthorized users and is most suitable
for small networks. This is so because there is no key management
protocol and each key must be entered manually into the clients
this proves to be a very time consuming administrative task. WEP is
based on the RC4 encryption algorithm by RSA Data Systems. It
works by having all clients and Access Points configured with the
same key for encryption and decryption.
This
is
good
method
of
security
but
only
4 Our recommendations
Today we have the means to provide useful services via Wireless: push
for all and interactivity for advanced users. By making these services
available it will be possible to differentiate one's Web activity from
that of the competition. If the Web architecture is designed clearly
(separation of content, use of stylesheets...), these services will be
relatively simple to develop. In an ever-changing market, solution
scalability and durability can be ensured by following these few
recommendations:
A mobile Internet service must be linked to a Web site
A Web site cannot afford to be without e-mail functionalities
(order confirmation, newsletters ). Users have the possibility
of entering information at their convenience and customizing
the service according to their needs. Relations between parties
can only be enhanced by this.