SlideShare una empresa de Scribd logo
1 de 23
Communication and
computer networks
Presented by: Rabail Hyder ali.
Outlines
 A brief history
 Introduction
 Computer networks
 Wide area network
 Local/Metropolitan area network
 Allocation of resources
 Challenges and issues
A BRIEF HISTORY:
smoke signals
Beating of drum
INTRODUCTION
 A typical communication system consist of following parts:
INFORMATION
 Analog
 Digital
 Transmission of the information can be analog or digital .therefore we have four possibilities:
1. Analog information transmitted as an analog signal.
2. Analog information transmitted as a digital signal.
3. Digital information transmitted as an analog signal.
4. Digital information transmitted as a digital signal
 When a signal carrying information is transmitted, it looses its energy and strength and gathers
some interference (noise) as it propagates away from the
transmitter.
BOOSTED / AMPLIFIED
 Boost energy and strength of a signal, it must be amplified (in case of analog signals)
 rebuilt (in case of digital signals)
MAJOR ISSUE
NOISE AMPLIFICATION in Analog Signal
Why Digital Signal is preferred over Analog Signal in communication?
• FILTERED OUT of noise in Digital Signal
• processing of information for error detection and correction, applying encryption and
decryption techniques to sensitive information.
COMPUTER NETWORKS
 Interconnection of computers.
 The interconnection forms a facility that provides reliable and efficient means of
communication among users and other devices.
 Computer networks are also referred to as computer communication networks.
 Interconnection among computers may be via wired or wireless transmission
medium
 Two broad categories
1. Wide area networks
2. Local/metropolitan area networks
(a) A typical WAN. (b) A typical local/metropolitan area network. (c) A typical
local/metropolitan area communication ring network
• Users will be sharing the transmission link to exchanging their information.
Users will also share
• the processing power of the computers.
• buffering capacity to store the information.
• and any other resources that are connected to the computer network.
• The information from one user to another may need to pass through several switching
nodes and transmission links before reaching its destination.
• If one path is not available, not feasible, or not functional, some other path may be used
• Exchange of Large Quantity of Information via a Packets of information.
TRANSPORTION OF NFORMATION :
Major aspects are
 Addressing mechanism to identify users.
 Addressing mechanism for information packets to identify their source and destination
 Establishing a connection between sender and receiver and maintaining it
 Choosing a path or a route to carry the information from a sender to a receiver
 Implementing a selected route or path.
 Checking information packets.
 Encryption and decryption of information
 Controlling the flow of information.
 Informing the sender.
 Billing for the use of resources
 Ensuring that different computers running different applications and operating systems can exchange
information
 Preparing information appropriately for transmission .
.
OSI (open system interconnection) Model
The International Organization for Standardization (ISO) established the Open
Systems Interconnection (OSI) Reference Model
Each layer deals with a particular aspect of network communication.
WIDE AREA COMPUTER NETWORKS:
 A WAN consist of switching nodes and transmission links.
 Layout of the switching nodes and transmission links is based on the traffic pattern and expected
volume of traffic flow from one site to another site.
 When a user is ready to transmit information
1. Connection oriented service
2. connectionless service
TRAFFIC MANAGEMENT IN WAN
REACTIVE TECHNIQUES
(in late 1960 and early
1970)
WINDOW SCHEME
OPTICAL FIBER
BISDNs (Broadband Integrated Services Digital
Networks)
 Transmit voice, video and data at the same time over fiber optic telephone lines.
Broadband ISDN can support data rates of 1.5 million bits per second (bps)
 Asynchronous transfer mode (ATM) is expected to be used as a transfer mechanism
in BISDNs where information is transmitted into the form of the cell
LOCAL & METROPOLITAN AREA NETWORK
 LOCAL AREA NETWORK
 Limited geographical scope(few kilometers)
 Limited to building or an organization
 METROPOLITAN AREA NETWORK
 Large transmission area (150 km)
 High data rates
 TRANSMISSION IN LOCAL & METROPOLITAN AREA NETWORKS
 CATAGORIES OF MAC(medium access control)PROTOCOL
 Controlled Access Protocols.
 Contention based protocols.
 CONTROLLED ACCESS PROTOCOLS.
• Users take TURNS.
• Only one user is allowed to transmit info. at a time.
 CONTENTION BASED ACCESS PROTOCOLS
• Don't take turns.
• User makes own decision to transmit information.
• Example: carrier sense multiple access with collision detection (CSMA/CD)
WIRELESS AND MOBILE COMMUNICATION
NETWORKS
The devices used for wireless communication require certain features
 Low power consumption
 Light weight
 worldwide communication ability.
 Access to a communication network is wireless so that the end users remain free to move.
LIMITATIONS
 Range of wireless communication is always limited.
 Range of user mobility is also limited.
To overcome this limitations:
 A geographical region is divided into smaller regions called CELLS.
• Each cell has a fixed communication device that serves all mobile devices within that
cell.
• As a mobile Device moves out of one cell and into another cell, service of that
connection is transferred from one cell to another. This is called the handoff process.
• Low power consumptions.
RESOURCE ALLOCATION TECHNIQUES
Two approaches for allocation of resources among the users.
 Static Allocation of resources
 Dynamic allocation of resources
 STATIC ALLOCATION OF RESOURCES
• Quantity of resources is allocated to each user.
• If user doesn't use his allocated resources , no one else can
 DYNAMIC ALLOCATION OF RESOURCES
• Desired quantity of resources is allocated to users on the basis of their demands and for
the duration of their need.
• Once the need is satisfied, the allocation is retrieved.
• Someone else can use these resources if needed.
CHALLENGES AND ISSUES
 Propagation Delay (the time for a signal to propagate from one end to another)
 Integrations of different services in the same networks & Each type of service has its own
requirements to achieving a desired level of quality of service
 Maintaining security and integrity of information.
THANK YOU

Más contenido relacionado

La actualidad más candente

TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
extraganesh
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
Jagdeep Singh
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devices
Numaan Tole
 

La actualidad más candente (20)

Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Physical layer ppt
Physical layer pptPhysical layer ppt
Physical layer ppt
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Parallel computing and its applications
Parallel computing and its applicationsParallel computing and its applications
Parallel computing and its applications
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
IPv4
IPv4IPv4
IPv4
 
Data communications-concepts
Data communications-conceptsData communications-concepts
Data communications-concepts
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSION
 
Data Communication and Networking
Data Communication and NetworkingData Communication and Networking
Data Communication and Networking
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
ISDN Integrated Services Digital Network
ISDN Integrated Services Digital NetworkISDN Integrated Services Digital Network
ISDN Integrated Services Digital Network
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devices
 

Destacado

Ensayo blogger def 2
Ensayo blogger def 2Ensayo blogger def 2
Ensayo blogger def 2
AldoMaGe
 
Посібник "Конспекти уроків у 1 семестрі"
Посібник "Конспекти уроків у 1 семестрі"Посібник "Конспекти уроків у 1 семестрі"
Посібник "Конспекти уроків у 1 семестрі"
sveta7940
 

Destacado (7)

Dmc roast
Dmc roastDmc roast
Dmc roast
 
Introduction to programming principles languages
Introduction to programming principles languagesIntroduction to programming principles languages
Introduction to programming principles languages
 
Ensayo blogger def 2
Ensayo blogger def 2Ensayo blogger def 2
Ensayo blogger def 2
 
Superfunds Magazine - Ready to take on the world
Superfunds Magazine - Ready to take on the worldSuperfunds Magazine - Ready to take on the world
Superfunds Magazine - Ready to take on the world
 
الفيلم أداة للتدريس - التجربة الشخصية أثناء دراسة الماجستير
الفيلم أداة للتدريس - التجربة الشخصية أثناء دراسة الماجستيرالفيلم أداة للتدريس - التجربة الشخصية أثناء دراسة الماجستير
الفيلم أداة للتدريس - التجربة الشخصية أثناء دراسة الماجستير
 
Посібник "Конспекти уроків у 1 семестрі"
Посібник "Конспекти уроків у 1 семестрі"Посібник "Конспекти уроків у 1 семестрі"
Посібник "Конспекти уроків у 1 семестрі"
 
Cdnpal Media Sales Deck Sample
Cdnpal Media Sales Deck SampleCdnpal Media Sales Deck Sample
Cdnpal Media Sales Deck Sample
 

Similar a Communication and computer networks

BSNL TRAINNING
BSNL TRAINNING BSNL TRAINNING
BSNL TRAINNING
ridhuaditi
 
DATA COMMUNICATION BY BP. ...
DATA COMMUNICATION BY BP.                                                    ...DATA COMMUNICATION BY BP.                                                    ...
DATA COMMUNICATION BY BP. ...
BPRAVEENROLEX
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete Introduction
Denis R
 
Lesson 4 communication and computer network (123 kb)
Lesson 4 communication and computer network (123 kb)Lesson 4 communication and computer network (123 kb)
Lesson 4 communication and computer network (123 kb)
IMRAN KHAN
 

Similar a Communication and computer networks (20)

Computer networks
Computer networksComputer networks
Computer networks
 
Networking technology
Networking technologyNetworking technology
Networking technology
 
MODULE 1_Telecommunications Networks.pdf
MODULE 1_Telecommunications Networks.pdfMODULE 1_Telecommunications Networks.pdf
MODULE 1_Telecommunications Networks.pdf
 
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTINGUnit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
 
BSNL TRAINNING
BSNL TRAINNING BSNL TRAINNING
BSNL TRAINNING
 
Chapter4
Chapter4Chapter4
Chapter4
 
Communication and Networking
Communication and NetworkingCommunication and Networking
Communication and Networking
 
Chapter 1.pptx
Chapter 1.pptxChapter 1.pptx
Chapter 1.pptx
 
1.CN-PPT.ppt
1.CN-PPT.ppt1.CN-PPT.ppt
1.CN-PPT.ppt
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
 
Bsnl Training Report
Bsnl Training ReportBsnl Training Report
Bsnl Training Report
 
Ioe module 4
Ioe module 4Ioe module 4
Ioe module 4
 
DATA COMMUNICATION BY BP. ...
DATA COMMUNICATION BY BP.                                                    ...DATA COMMUNICATION BY BP.                                                    ...
DATA COMMUNICATION BY BP. ...
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete Introduction
 
Lesson 4 communication and computer network (123 kb)
Lesson 4 communication and computer network (123 kb)Lesson 4 communication and computer network (123 kb)
Lesson 4 communication and computer network (123 kb)
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
 
Networking Fundamentals.ppt
Networking Fundamentals.pptNetworking Fundamentals.ppt
Networking Fundamentals.ppt
 
Computer networks
Computer networksComputer networks
Computer networks
 
is chap5.pptx
is chap5.pptxis chap5.pptx
is chap5.pptx
 
Applications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networksApplications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networks
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Último (20)

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 

Communication and computer networks

  • 2. Outlines  A brief history  Introduction  Computer networks  Wide area network  Local/Metropolitan area network  Allocation of resources  Challenges and issues
  • 5. INTRODUCTION  A typical communication system consist of following parts:
  • 7.  Transmission of the information can be analog or digital .therefore we have four possibilities: 1. Analog information transmitted as an analog signal. 2. Analog information transmitted as a digital signal. 3. Digital information transmitted as an analog signal. 4. Digital information transmitted as a digital signal  When a signal carrying information is transmitted, it looses its energy and strength and gathers some interference (noise) as it propagates away from the transmitter. BOOSTED / AMPLIFIED  Boost energy and strength of a signal, it must be amplified (in case of analog signals)  rebuilt (in case of digital signals) MAJOR ISSUE NOISE AMPLIFICATION in Analog Signal
  • 8. Why Digital Signal is preferred over Analog Signal in communication? • FILTERED OUT of noise in Digital Signal • processing of information for error detection and correction, applying encryption and decryption techniques to sensitive information.
  • 9. COMPUTER NETWORKS  Interconnection of computers.  The interconnection forms a facility that provides reliable and efficient means of communication among users and other devices.  Computer networks are also referred to as computer communication networks.  Interconnection among computers may be via wired or wireless transmission medium  Two broad categories 1. Wide area networks 2. Local/metropolitan area networks
  • 10. (a) A typical WAN. (b) A typical local/metropolitan area network. (c) A typical local/metropolitan area communication ring network
  • 11. • Users will be sharing the transmission link to exchanging their information. Users will also share • the processing power of the computers. • buffering capacity to store the information. • and any other resources that are connected to the computer network. • The information from one user to another may need to pass through several switching nodes and transmission links before reaching its destination. • If one path is not available, not feasible, or not functional, some other path may be used • Exchange of Large Quantity of Information via a Packets of information.
  • 12. TRANSPORTION OF NFORMATION : Major aspects are  Addressing mechanism to identify users.  Addressing mechanism for information packets to identify their source and destination  Establishing a connection between sender and receiver and maintaining it  Choosing a path or a route to carry the information from a sender to a receiver  Implementing a selected route or path.  Checking information packets.  Encryption and decryption of information  Controlling the flow of information.  Informing the sender.  Billing for the use of resources  Ensuring that different computers running different applications and operating systems can exchange information  Preparing information appropriately for transmission . .
  • 13. OSI (open system interconnection) Model The International Organization for Standardization (ISO) established the Open Systems Interconnection (OSI) Reference Model Each layer deals with a particular aspect of network communication.
  • 14. WIDE AREA COMPUTER NETWORKS:  A WAN consist of switching nodes and transmission links.  Layout of the switching nodes and transmission links is based on the traffic pattern and expected volume of traffic flow from one site to another site.  When a user is ready to transmit information 1. Connection oriented service 2. connectionless service
  • 15. TRAFFIC MANAGEMENT IN WAN REACTIVE TECHNIQUES (in late 1960 and early 1970) WINDOW SCHEME OPTICAL FIBER
  • 16. BISDNs (Broadband Integrated Services Digital Networks)  Transmit voice, video and data at the same time over fiber optic telephone lines. Broadband ISDN can support data rates of 1.5 million bits per second (bps)  Asynchronous transfer mode (ATM) is expected to be used as a transfer mechanism in BISDNs where information is transmitted into the form of the cell
  • 17. LOCAL & METROPOLITAN AREA NETWORK  LOCAL AREA NETWORK  Limited geographical scope(few kilometers)  Limited to building or an organization  METROPOLITAN AREA NETWORK  Large transmission area (150 km)  High data rates  TRANSMISSION IN LOCAL & METROPOLITAN AREA NETWORKS
  • 18.  CATAGORIES OF MAC(medium access control)PROTOCOL  Controlled Access Protocols.  Contention based protocols.  CONTROLLED ACCESS PROTOCOLS. • Users take TURNS. • Only one user is allowed to transmit info. at a time.  CONTENTION BASED ACCESS PROTOCOLS • Don't take turns. • User makes own decision to transmit information. • Example: carrier sense multiple access with collision detection (CSMA/CD)
  • 19. WIRELESS AND MOBILE COMMUNICATION NETWORKS The devices used for wireless communication require certain features  Low power consumption  Light weight  worldwide communication ability.  Access to a communication network is wireless so that the end users remain free to move. LIMITATIONS  Range of wireless communication is always limited.  Range of user mobility is also limited.
  • 20. To overcome this limitations:  A geographical region is divided into smaller regions called CELLS. • Each cell has a fixed communication device that serves all mobile devices within that cell. • As a mobile Device moves out of one cell and into another cell, service of that connection is transferred from one cell to another. This is called the handoff process. • Low power consumptions.
  • 21. RESOURCE ALLOCATION TECHNIQUES Two approaches for allocation of resources among the users.  Static Allocation of resources  Dynamic allocation of resources  STATIC ALLOCATION OF RESOURCES • Quantity of resources is allocated to each user. • If user doesn't use his allocated resources , no one else can  DYNAMIC ALLOCATION OF RESOURCES • Desired quantity of resources is allocated to users on the basis of their demands and for the duration of their need. • Once the need is satisfied, the allocation is retrieved. • Someone else can use these resources if needed.
  • 22. CHALLENGES AND ISSUES  Propagation Delay (the time for a signal to propagate from one end to another)  Integrations of different services in the same networks & Each type of service has its own requirements to achieving a desired level of quality of service  Maintaining security and integrity of information.