0% found this document useful (0 votes)
21 views10 pages

Wireless Networks Wi Fi Bluetooth and Mobile Networks

The document discusses the importance and characteristics of wireless networks, focusing on Wi-Fi, Bluetooth, and mobile networks. It covers their standards, range, data throughput, security protocols, and network architectures, as well as future trends like IoT and edge computing. Security measures are emphasized as critical for protecting against various threats in wireless communication.

Uploaded by

Sayan Ghosh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views10 pages

Wireless Networks Wi Fi Bluetooth and Mobile Networks

The document discusses the importance and characteristics of wireless networks, focusing on Wi-Fi, Bluetooth, and mobile networks. It covers their standards, range, data throughput, security protocols, and network architectures, as well as future trends like IoT and edge computing. Security measures are emphasized as critical for protecting against various threats in wireless communication.

Uploaded by

Sayan Ghosh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Wireless Networks: Wi-Fi,

Bluetooth, and Mobile


Networks
In today's interconnected world, wireless networks have become
indispensable. They provide the backbone for communication, enabling us
to stay connected, access information, and conduct business from
virtually anywhere. This presentation will delve into the key aspects of
wireless networks, focusing on Wi-Fi, Bluetooth, and mobile networks.

We'll explore each technology's standards, frequency bands, range, data


throughput, use cases, and security protocols. Additionally, we will
examine the network architectures, topologies, and essential concepts
that underpin these wireless systems. Finally, we'll touch on the
convergence of these technologies and future trends shaping the wireless
landscape.

by Anuradha Ghosh
Wi-Fi: Wireless Fidelity
Wi-Fi, short for Wireless Fidelity, is a ubiquitous wireless technology based on the IEEE 802.11 family of standards. It operates on
various frequency bands, including 2.4 GHz, 5 GHz, and the newer 6 GHz band introduced with Wi-Fi 6E. This enables devices to
connect to networks wirelessly, offering flexibility and convenience.

Wi-Fi's typical range spans from 100-150 feet indoors to approximately 300 feet outdoors. With advancements like Wi-Fi 6
(802.11ax), theoretical maximum data throughput reaches up to 9.6 Gbps, though real-world speeds usually range from 1-2 Gbps.
It is widely used in home networks, enterprise environments, and public hotspots, secured by protocols like WPA3 for robust
protection.

Frequency Bands Data Throughput Security


Operates on 2.4 GHz, 5 GHz, and 6 GHz Up to 9.6 Gbps theoretical maximum Employs WPA3 for enhanced security.
(Wi-Fi 6E). with Wi-Fi 6 (802.11ax).
Wi-Fi: Network Architecture
Wi-Fi networks employ several architectures to cater to different coverage and scalability needs. A Basic Service Set (BSS)
involves a single access point serving associated clients, ideal for small home networks. For larger environments, an Extended
Service Set (ESS) utilizes multiple access points, creating seamless roaming for users moving between coverage areas.

Wireless mesh networks offer an alternative by interconnecting nodes wirelessly, extending network coverage and resilience. Wi-
Fi operates in two modes: infrastructure mode, with a centralized access point, and ad-hoc mode, for decentralized, peer-to-
peer connections. Roaming ensures users can seamlessly transition between access points within an ESS without losing
connectivity.

1 2 3

Basic Service Set (BSS) Extended Service Set (ESS) Wireless Mesh Networks
Single access point for small networks. Multiple access points for larger Interconnected nodes for extended
coverage with roaming. coverage.
Bluetooth: Short-Range Connectivity
Bluetooth, standardized as IEEE 802.15.1, is designed for short-range wireless communication, primarily operating in the 2.4 GHz
frequency band. Its range varies by class: Class 1 devices can reach up to 100 meters, Class 2 up to 10 meters, and Class 3 up to 1
meter. Bluetooth 5.0 offers data throughput up to 2 Mbps, enhancing its versatility.

Bluetooth is commonly found in wireless headphones, smartwatches, IoT devices, and automotive systems. It's used for diverse
applications, including audio streaming (A2DP), input device connectivity (HID), and file transfer. Bluetooth profiles define
specific protocols tailored to different applications, ensuring compatibility and optimized performance.

Range Data Throughput Common Uses


Class 1: Up to 100 meters, Class 2: 10 Bluetooth 5.0: Up to 2 Mbps. Wireless headphones,
meters, Class 3: 1 meter. smartwatches, IoT devices, file
transfer, automotive.
Bluetooth: Network Topologies
Bluetooth networks are often structured around a piconet, which features a master-slave architecture. One master device can
manage up to seven active slave devices, forming a small, localized network. Multiple piconets can be interconnected to create a
scatternet, allowing devices to participate in multiple networks simultaneously.

Bluetooth Low Energy (BLE) is a variant optimized for low power consumption, making it ideal for IoT devices and applications
requiring long battery life. Devices use advertising packets to announce their presence, enabling other devices to discover and
connect to them efficiently. These topologies cater to diverse use cases, from personal devices to large-scale sensor networks.

Scatternet
2 Multiple interconnected piconets.

Piconet
Master-slave architecture with one 1
master and up to seven active slaves.
Bluetooth Low Energy (BLE)
3
Optimized for low power consumption,
ideal for IoT.
Mobile Networks: Cellular Communication
Mobile networks provide wide-area wireless communication through cellular technologies, including 2G (GSM, CDMA), 3G (UMTS,
CDMA2000), 4G (LTE), and the latest 5G. These networks operate across various frequency bands that vary by region and
operator. 4G LTE offers data throughput from 100 Mbps to 1 Gbps, while 5G ranges from 1 Gbps to 10 Gbps.

The network architecture comprises cell towers, base stations, and mobile switching centers (MSCs). The core network handles
critical functions like authentication, routing, and mobility management, ensuring seamless connectivity as users move. Cellular
networks enable ubiquitous mobile internet access, supporting a vast array of applications and services.

2G 1
GSM, CDMA.

2 3G
UMTS, CDMA2000.

4G (LTE) 3
100 Mbps - 1 Gbps.

4 5G
1 Gbps - 10 Gbps.
Mobile Networks: Cellular
Concepts
In cellular networks, a cell refers to the geographical area covered by a
base station. Frequency reuse is a fundamental concept, where the same
frequencies are allocated to different cells to maximize network capacity
and spectrum efficiency. Handoff ensures a seamless transition between
cells as a mobile device moves, maintaining uninterrupted connectivity.

Multiple access techniques like FDMA, TDMA, CDMA, and OFDMA are
employed to allow multiple users to share the available spectrum
simultaneously. These concepts are crucial for managing network
resources efficiently, providing reliable mobile communication across vast
geographical areas.

Cell Frequency Handoff


Area covered by a Reuse Seamless transition
base station. Maximizing capacity between cells.
by reusing frequencies
in different cells.
Security in Wireless Networks
Securing wireless networks is critical to protect against various threats. Wi-Fi security has evolved to WPA3, employing
Simultaneous Authentication of Equals (SAE) for stronger protection against dictionary attacks. Bluetooth security relies on
encryption, authentication, and authorization mechanisms to safeguard data transmissions.

Mobile network security utilizes SIM card authentication, encryption, and secure communication protocols to protect user
identities and data. Wireless networks are vulnerable to eavesdropping, man-in-the-middle attacks, and denial-of-service
attacks. Security best practices include using strong passwords, enabling encryption, and applying regular security updates to
mitigate these risks.

1 Strong Passwords

2 Encryption

3 Regular Updates
Convergence and Future Trends
The integration of Wi-Fi, Bluetooth, and mobile networks is becoming increasingly common in modern devices, providing
versatile connectivity options. Wi-Fi 6E and Wi-Fi 7 promise increased throughput and reduced latency, enhancing user
experiences. 5G and beyond aim to deliver enhanced mobile broadband, massive machine-type communication (mMTC), and
ultra-reliable low-latency communication (URLLC).

The rise of IoT and wireless sensor networks is connecting billions of devices wirelessly, creating new opportunities and
challenges. Edge computing, which processes data closer to the network edge, reduces latency and enhances real-time
applications. These trends are shaping the future of wireless communication, driving innovation and expanding the possibilities
of connected devices.

Wi-Fi 6E/7 5G and Beyond IoT and WSN Edge Computing


Increased throughput and Enhanced broadband, Connecting billions of Processing data closer to
reduced latency. mMTC, and URLLC. devices wirelessly. the edge for reduced
latency.
Conclusion
Wireless networks are fundamental to modern communication, providing
the flexibility and accessibility required in today's fast-paced world. Each
technology4Wi-Fi, Bluetooth, and mobile networks4offers unique
characteristics and applications, catering to diverse needs.

When deploying wireless networks, security and performance


considerations are paramount. Future trends will continue to enhance the
capabilities and integration of wireless technologies, driving further
innovation and connectivity. As technology evolves, understanding and
adapting to these advancements will be essential for staying connected
and competitive.

Key takeaways: wireless networks are essential, each technology has


unique applications, security is important, and future trends will enhance
capabilities.

You might also like