Premium Essay

Analysis of Wireless Protocols

In: Computers and Technology

Submitted By lmom
Words 285
Pages 2
Analysis of Wireless Protocols

Analysis of Wireless Protocols
Just like wired and TCP/IP communications, wireless communications has its own set of protocols. These protocols exist to govern wireless communications for mobile phones, pagers, and other wireless devices (Protocols.com). Protocols that exist for wireless communications such as wireless session protocol, wireless transaction protocol, wireless transport layer security, and wireless datagram protocol each covering different aspects of the communications model (Protocols.com). Just like wired and TCP/IP communications, wired communication protocols exist in a wireless communications OSI model (Protocols.com). The wireless communications OSI model is divided into the following layers; application layer, session layer, transaction layer, security layer, transport layer (Protocols.com). Each layer of the wireless communications OSI model has is associated protocols.
The necessity for different protocols for wireless communications comes from this “WAP Stack” which is the model for wireless data transfer (Protocols.com). Each layer of the model is governed by different protocols, and are divided as follows. * Application Layer Protocols * WAE or Wireless Application Environment * WTA or Wireless Telephony Application (Protocols.com) * Session Layer Protocols * WSP or Wireless Session Protocol (Protocols.com) * Transaction Layer Protocols * WTP or Wireless Transaction Protocol (Protocols.com) * Security Layer Protocols * WTLS or Wireless Transport Layer Security (Protocols.com) * Transport Layer Protocols * WDP or Wireless Datagram Protocol (Protocols.com)

Protocols are necessary for communications between systems, different types of communications from wired to data to wireless need to have their own rules and regulation to ensure…...

Similar Documents

Premium Essay

Case Analysis on Verizon Wireless

...Case Analysis On Verizon Wireless Submitted to - Tahmina Akter Lecturer Department of Finance University of Dhaka Submitted by - Group No.14 Department of Finance University of Dhaka Name of the Group members SL. | Name | ID. | 01. | Abu Sanzid | 15-066 | 02. | Hasina Akter | 15-072 | 03. | Zakia Ajzad | 15-088 | 04. | Gazi Afsana | 15-252 | Case Summary * Case is about the competitive advantage of Verizon Wireless. * Verizon is a telecommunication based firm in USA telecommunication industry. * The churn rate was high in this industry in 2003 but Verizon Wireless‘s churn rate was lower than its major competitors like Cingular wireless, Sprint, Next and T- mobile. The reason for lower churn rate for Varizon was providing superior quality and customized products. * Low churn rate has enabled the company to grow its subscriber base faster than rivals, which allows the company to better achieve economies of scale by spreading the foxed cost of building a wireless network over a larger customer base. * To reduce customer churn rate and achieve competitive advantage Varizon take several actions. These are - 1. Firstly , the company invested heavily in building high quality nationwide wireless network. That helped it to position itself on differentiation base to its customer. 2. Secondly, it installed CDMA technology instead of traditional GSM, which gave differential advantages over GSM to provide better service and lowering...

Words: 491 - Pages: 2

Free Essay

Wireless Industry Analysis

...of the Verizon’s largest acquisitions was the purchase of Alltell Wireless in 2009 for $28.1 Billion; this purchase expanded their network coverage and increased their market share. Verizon operates a CDMA Radio network which does not require the use of SIM cards. The company’s service quality is a competitive advantage and Verizon invests about $5.7 Billion per year to expand and upgrade their network services. Verizon boasts “America’s largest and most reliable network” and has over 160.3 Million subscribers. They recently added the iPhone to their product line in early February which has allowed the company to take a significant portion of sales away from AT&T. Verizon is one of the most expensive networks and appeals to customers who are willing to pay a premium for advanced network technology. In other news the FCC has accused Verizon of illegally adding charges to customers’ bills. The company was ordered to repay $52.8 million in funds back to customers in early October of 2010. AT&T wireless is the second largest service provider with 98.6 Million users in the U.S., Puerto Rico and Virgin Islands. The company has a more economic pricing structure and promotes rollover minutes. AT&T operates a GSM network, which is the world dominant cellular technology and uses SIM cards to locate and store customer data. In March 2006 AT&T purchased Bell South, the owners of Cingular Wireless Networks and the companies merged under “The New AT&T” brand......

Words: 10350 - Pages: 42

Free Essay

Wireless

...TERM PAPER Wireless LAN Security Enabling and Protecting the Enterprise INSIDE INSIDE ∆ Wireless LAN Technology ∆ ∆ ∆ Benefits of Wireless LANs Security Risks and Technical Challenges Recommendations WIRELESS LAN SECURITY Contents Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Wireless LAN Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Benefits of Wireless LANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Simplified Implementation and Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Extended Reach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Increased Worker Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Reduced Total Cost of Ownership and Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Security Risks and Technical Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 “Leaky” Buildings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Unapproved Deployments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Exposure of Wireless Devices . . . . . . . . . . . . . . . ....

Words: 2559 - Pages: 11

Free Essay

Analyze the Necessity for Different Protocols in Wireless Communications.

...Analyze the necessity for different protocols in wireless communications. An agreed upon guidelines or set of rules for communication is called as protocol. It is very important to agree upon some communication rules otherwise it will fail. If one party speaks French and the other German the communication would surely fail. If they both agree on a single language they can communicate successfully. The set of communication use don internet is called as TCP/IP. A protocol can be defined as rules that are mutually agreed upon for communication. During communication it is important that both the concerned parties speak a common language, only then communication would work. The communication protocol used on internet is TCP/IP. It is a group of different protocols and each protocol has its own special function. The protocols have been established by international bodies and are globally used to ensure a common worldwide platform. For wireless networking there are varieties of protocols and the most popular is 802.11b as it is the most inexpensive one. The maximum speed that can be achieved is 11mbps. The only drawback is that it operates in the unregulated frequency range of 2.4 GHz, which can lead interference to the network traffic from other devices like cordless phone and baby monitors etc. There is a newer improved version protocol 802.11g, it uses the same frequency range of 2.4 GHz that is commonly used, but this protocol can take transmission speed of maximum 54......

Words: 401 - Pages: 2

Free Essay

Case Analysis 4: Google’s Attempt to but Into Wireless Via 700mhz Spectrum Auction

...Case Analysis 4: Google’s attempt to but into wireless via 700MHz Spectrum Auction TM583 12/09/2012 Why did Google make this move? What do they hope to accomplish? Google made this move because they wan to compete with the other companies and become innovated. Google has most been known for their website and maps and now, they want to be known for more. “Google interest in the spectrum came after AT&T and other larger broadband providers expressed interest in recent years in getting web-based businesses to pay more for their customers’ use of the broadband networks.”(http://www.cio.com/article/160601/Google_to_Bid_in_700MHz_Spectrum_Auction) Google wanted control of the Internet experience on the device that hosted it. If they got the wireless spectrum, they could control how much the consumer would decide to pay or not pay for their service. However, since they put a bid in for the wireless spectrum, they wanted to do the same thing on their network. The 700MHz spectrum will travel far making it perfect for the wireless industry. How does Google support for Open Access fit into Google’s plans? “Google has said it would bid on the 700MHz spectrum only if the FCC guarantees certain open-access principles; including open access for companies wanting to buy wireless capacity wholesale.” (http://news.cnet.com/Googles-battle-for-wireless-spectrum---page-2/2008-1039_3-6199374-2.html) Open Access for the 700MHz spectrum can be lay down “four freedom” 1.)......

Words: 699 - Pages: 3

Free Essay

Routing Protocol

...Introduction 1 2.1 Industry Standard protocols vs. Proprietary protocols: 2 3.0 Technical Background 2 3.1 Types Of Routing Protocols 2 3.1.1 Static Routing 2 3.1.2 Distance Vector Protocols 3 3.1.3 Link-State Protocols 4 3.1.4 Advanced Distance Vector Protocol 5 3.1.5 Path Vector Protocols 5 4.0 Protocol Decision Criteria 5 5.0 OSPF 8 6.0 EIGRP 18 7.0 Analysis 21 8.0 Recommendation 22 9.0 References 23 9.1 URLs 23 9.1.1 OSPF 23 9.1.2 EIGRP 24 9.2 Books 24 9.2.1 OSPF 24 9.2.2 EIGRP 24 Executive Summary The network is based on the TCP/IP protocol, which permits the efficient routing of data packets based on their IP address. Cisco routers are used at various points in the network to control and forward the data. Alcatel OmniSwitch switch/routers are also used in the Site 2 facilities. At the current point a decision is being made by on whether to keep the existing Alcatel infrastructure in the Site 2 facility or migrate that equipment to similar Cisco equipment as exists in Site 1. The current Alcatel equipment is experiencing severe problems such as hardware failures, power supply failures, operating system memory leaks resulting in reboots. If the decision is made to upgrade the Alcatel switch/routers then an evaluation will need to be made on what the proper routing protocol should be running......

Words: 8531 - Pages: 35

Free Essay

Implementation and Evaluation of Wireless Mesh Networks on Manet Routing Protocols

...Evaluation of Wireless Mesh Networks on MANET Routing Protocols Shashi Bhushan1,Anil Saroliya2 ,Vijander Singh3 Research Scholar, Computer Science, Amity University, Jaipur, India 1 Assistant Professor, Computer Science, Amity University, Jaipur, India 2 Senior Lecturer, Computer Science, Amity University, Jaipur, India 3 Abstract—Wireless Mesh Network (WMN) is a kind of network which is made up of Mesh router and Mesh clients where Mesh router having lesser mobility and form the heart of WMNs. In this paper, Wireless Mesh Network over MANET implemented using routing protocols such as AODV, DSR. In this work NS-2.34 simulator is used for simulations. Various measurements and calculations were figure out in this work like throughput, Average end-end delay, PDR, NRL and Routing packets in Random way point mobility model. WMN have features such as self configuration, self healing and low cost of equipment. This work specifically aims to study the performance of routing protocols in a wireless mesh network, where static mesh routers and mobile clients participate together to implement networks functionality such as routing and packet forwarding in different mobility scenarios Keywords- Ad hoc Network, Routing Protocols, Wireless Mesh Network, Performance, Throughput, PDR, NRL and Routing packets in Random way point mobility model, Simulation on Network simulator NS-2, AODV,DSR , Routing Overhead. I. INTRODUCTION A Mobile Ad-hoc network (MANET) is an autonomous system of......

Words: 4335 - Pages: 18

Premium Essay

Protocols

...------------------------------------------------- LAB 3.1-3.4 3.1.1 – WHAT WOULD HAPPEN IF WIRELESS DEVICES WERE NOT GOVERNED BY THE WI-FI ALLIANCE AND EACH VENDOR HAD ITS OWN STANDARDS AND PROTOCOLS? A. WIRELESS DEVICES WOULD HAVE DIFFICULTY COMMUNICATING. WHAT IS OKAY WITH ONE VENDOR MAY NOT BE OKAY WITH ANOTHER VENDOR. PRICES OF DEVICES AND CONNECTIONS WOULD ALSO CHANGE. 3.1.2 – GIVE AN EXAMPLE OF A MODEL THAT IS USED TO VISUALIZE SOMETHING THAT IS DIFFICULT TO OBSERVE OR PERCEIVE. A. CONNECTIONS REQUIRING ROUTER EQUIPMENT – HUBS, SWITCHES AND ROUTERS. 3.1.3 – WHAT ARE THE DIFFERENT LAYERS YOU THINK WOULD BE NECESSARY FOR COMMUNICATION TO BE MAPPED TO A MODEL? A. APPLICATION LAYER, PRESENTATION LAYER, SESSION LAYER, TRANSPORT LAYER, DATA LINK LAYER AND PHYSICAL LAYER. 3.1.4 – WHAT WILL HAPPEN IF A MODEL IS TOO GENERAL? TOO GRANULAR? A. THE MODEL WOULD NOT BE FLEXIBLE IF TOO GENERAL; IF TOO GRANULAR, A LOAD IMBALANCE WOULD OCCUR. 3.1 REVIEW – 1. WHY WOULD A 3-LAYER MODEL OF COMMUNICATION THAT HAS THE LAYERS PHYSICAL, NETWORK AND APPLICATIONS BE INSUFFICIENT TO ADEQUATELY DESCRIBE NETWORK COMMUNICATIONS? A. THE 7-LAYER COMMUNICATION MODEL WAS TESTED AND SUCCESSFULLY PROVEN TO WORK. IF A LAYER IS MISSING THE MODEL WILL NOT WORK PROPERLY. 2. WHAT IS THE HISTORY OF THE OSI REFERENCE MODEL? A. TO SERVE AS THE FOUNDATION OF THE ESTABLISHED WIDELY ADOPTED SUITE OF PROTOCOLS THAT ARE USED BY INTERNATIONAL INTERNETWORKS. 3. WHAT IS THE HISTORY OF THE TCP/IP......

Words: 996 - Pages: 4

Premium Essay

Analysis in Financial Statement of Leap Wireless

...------------------------------------------------------------------------- page 1 Wireless Telecommunication Industry -------------------------------------------------- page 2 Leap Wireless International, Inc. -------------------------------------------------------- page 3 Verizon Communication, Inc. ------------------------------------------------------------ page 4 Restatement of Leap Wireless ------------------------------------------------------------ page 4 Analysis in Accounting Policies and Disclosure Practices --------------------------- page 6 Comparative Analysis of the Financial Statements ------------------------------------ page 8 Governance Structures --------------------------------------------------------------------- page 11 Conclusion ----------------------------------------------------------------------------------- page 14 Reference ------------------------------------------------------------------------------------ page 15 Additional Information -------------------------------------------------------------------- page 17 Executive Summary At least 90% people in the United States use at least one kind of wireless telecommunication services, such as cellular networks service. Leap Wireless International, Inc. is the 5th largest United States public telecommunications company. It competitors include AT&T, T-Mobile or Verizon. This paper will be mainly focused on the restatement of Leap’s restatement of financial statements, analysis of Leap......

Words: 5069 - Pages: 21

Free Essay

Protocols

...A protocol is a set of invisible compute rules that govern how an Internet document will be transmitted onto the screen. For two computers to communicate with one another, they must be able to understand one another through the same language. In order for computers to exchange information there must be a preexisting agreement as to how the information will be structured and how the sides will send and be received. The most important that defines the common networking protocols is the OSI known as Open Systems Interconnection. Introducing the TCP and the IP are two different protocols that are often linked together. The linking of several protocols is fairly common since the functions of different protocols may be complementary so that together they carry out particular tasks that are bases of operation layers. These suits of protocols are often used with many local area networks and carries out the basic operations of the Internet. Emailing also has its own set of protocols that has a variety of both for sending and receiving mail. The most common protocol for sending mail is the SMTP that is known for as Simple Mail Transfer Protocol. Then for receiving emails, the protocol being most commonly used is the Post Office Protocol, POP for short. Both the SMTP and the POP is used for managing the transmission for delivery of mail across the Internet. Web pages that are constructed to a standard method are called Hypertext Markup Language known as HTMO. The HTMP......

Words: 413 - Pages: 2

Free Essay

Wireless Telecommunications Carriers Industry Analysis

...Environmenttal Analysis: As defined by the NAICS, This industry comprises establishments engaged in operating and maintaining switching and transmission facilities to provide communications via the airwaves. Establishments in this industry have spectrum licenses and provide services using that spectrum, such as cellular phone services, paging services, wireless Internet access, and wireless video services.[1] The Cellular Telecommunication & Internet Association listed 30 wireless telecommunication service provider in the US. Some of the largets carriers are Verizon, AT&T, Sprint Nextel and T-mobile. Wireless annual revenue was $ 164.6 billion in June 2011, up 6% from the same period in 2010. [2] In June 2011 there were 327.6 million wireless subscriber connection, with 9% increase from the year before June 2010: 300.5 million. [2] Some of the main entry barriers into the wireless industry are the capital investment, the regulatory condition and the spectrum availability. The cost of starting a new wireless carrier is very high, and with the strong competition and small profit margin, many businesses find it unprofitable to start a new carrier. Wireless regulators also limit the number of carriers in one country since the available frequency spectrum is limited. Below is Strengths, Weaknesses, Opportunities, and Threats (SWOT) analysis for the wireless industry: Internal Strengths  Loyal customers: low churn rate  Innovative branding and customer......

Words: 844 - Pages: 4

Free Essay

Network Protocols

...The importance of communication protocols: Unless Patton Fuller Community Hospital has an agreement between the two communicating parties information may get lost or un-communicated. This agreement is called the protocol. Communications protocols usually have a number of parts, Handshake, encoding method, compressions methods, packet / frame structure, and addressing.. This is why protocols are often defined by standards bodies, but some protocols SSL can be used widely even though they are not specifically from a standards body. A protocol must be implemented to enable effective, efficient communication by using a set of rules. Protocols are also described as hardware or software components that carry out the OSI model guidelines for transferring information on a network In short - if we don't have a protocol we won't be able to communicate between different devices. Identify the protocols in your design and provide rationale for your decision Define the overall network architecture. The design of a communications system, which includes the backbones, routers, switches, wireless access points, access methods and protocols used May refer only to the access method in a LAN, such as Ethernet or Token Ring Network architecture is the design of a communications network. It is a framework for the specification of a network's physical components and their functional organization and configuration, its operational principles and procedures, as well as data formats used in......

Words: 1950 - Pages: 8

Premium Essay

Protocols

...Protocols Just like wired and TCP/IP communications, wireless communications has its own set of protocols. These protocols exist to govern wireless communications for mobile phones, pagers, and other wireless devices (Protocols.com). Protocols that exist for wireless communications such as wireless session protocol, wireless transaction protocol, wireless transport layer security, and wireless datagram protocol each covering different aspects of the communications model (Protocols.com). Just like wired and TCP/IP communications, wired communication protocols exist in a wireless communications OSI model (Protocols.com). The wireless communications OSI model is divided into the following layers; application layer, session layer, transaction layer, security layer, transport layer (Protocols.com). Each layer of the wireless communications OSI model has is associated protocols. The necessity for different protocols for wireless communications comes from this “WAP Stack” which is the model for wireless data transfer (Protocols.com). Each layer of the model is governed by different protocols, and are divided as follows. * Application Layer Protocols * WAE or Wireless Application Environment * WTA or Wireless Telephony Application (Protocols.com) * Session Layer Protocols * WSP or Wireless Session Protocol (Protocols.com) * Transaction Layer Protocols * WTP or Wireless Transaction Protocol (Protocols.com) * Security Layer Protocols * WTLS or Wireless Transport Layer......

Words: 278 - Pages: 2

Free Essay

Analyze the Necessity for Different Protocols in Wireless Communications

...agreed upon guidelines or set of rules for communication is called a protocol. It’s extremely important to agree on some communication rules otherwise it will fail. Different protocols are needed for different systems to "talk" to each other or communicate. Protocols are used to communicate, authenticate and is also used for error detection and recovery. The protocol allows computers to talk to each other by setting the "ground rules". It allows for data to flow back and forth between the computers. TCP/IP is the most common protocol, and is actually two distinct protocols, married together (TCP (Transmission Control Protocol) and IP (Internet Protocol). Each protocol does a different "job". Others, such as FTP (File transfer protocol) are used for specific duties to be performed. Imagine two people talking on the phone....one talks the other listens, then they reverse, and the talker becomes the listener. That is a Protocol! What happens when they both talk? Neither hears what the other says. But what happens if they both listen, but not talk...no "data' is exchanged. Standards are totally different, although related.....they are ground rules set by a commission so that hardware is compatible amongst similar computers, and assures interoperability. This is done (usually) to ensure backwards compatibility and compatibility from vendor to vendor. For wireless networking there are varieties of protocols and the most popular is 802.11b as it is the most inexpensive......

Words: 405 - Pages: 2

Premium Essay

Wireless

...Wireless Security Technical Point-of-View Wireless Security Technical Point-of-View W ireless network (Wi-Fi) is now widely established and utilized at home, offices and everywhere in public areas such as rail stations, streets, and etc. This newsletter provides the technical knowledge of Wi-Fi technologies, relevant threats and countermeasures for building a secure internal Wi-Fi network. For the end user best practices of using Wi-Fi, please refer to another newsletter entitled “Wireless Network, Best Practices for General User”. Wireless Technologies | Classification of Networks Technological advancement in wireless communications has led to the worldwide proliferation of networks. The various kinds of network technologies developed can be classified into the following categories according to their range of coverage: Wireless Wide Area Network (WWAN) WWAN offers the largest coverage. Voice and data can be transferred between mobile phones via messaging apps, web pages and video conferencing. In order to secure the transfer, encryption and authentication methods are adopted. Examples of WWAN are 4G, 3G and 2G networks. Wireless Metropolitan Area Network (WMAN) MAN (Metropolitan Area Network) covers across the entire city and WMAN provides the Wi-Fi network similar to MAN. WiMAX and Wireless MAN are both examples of this kind. Wireless Local Area Network (WLAN) WLAN is an 802.11i wireless network that facilitates the access of corporate......

Words: 4503 - Pages: 19