How Wireless Works
How Wireless Works
How Wireless Works
title: author: publisher: isbn10 | asin: print isbn13: ebook isbn13: language: subject publication date: lcc: ddc: subject: Page i How Wireless Works Page ii Page iii How Wireless Works Preston Gralla
How Wireless Works Gralla, Preston. Pearson Education, Inc. 0789724871 9780789724878 9780768655575 English Wireless communication systems, Transmission sans fil. 2002 TK5103.2.G73 2002eb 384.5 Wireless communication systems, Transmission sans fil. cover
page_i page_ii
page_iii Page iv How Wireless Works Copyright 2002 by Que Corporation Associate Publisher Greg Wiegand Acquisitions Editor Stephanie McComb Development Editor Nicholas J. Goetz Managing Editor Thomas F. Hayes Project Editor Tonya Simpson Indexer Sandra Henselmeier Proofreader Maribeth Echard Technical Editor Don Marsh Illustrator D&G Limited
Team Coordinator Sharry Lee Gregory Interior Designers Anne Jones and Dan Armstrong Cover Designer Alan Clements Page Layout Gloria Schurick All rights reserved. No part of this book shall be reproduced, stored in a retrieval system, or transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the information contained herein. Although every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein. International Standard Book Number: 0-7897-2487-1 LibraryofCongressCatalogCardNumber:00-108245 PrintedintheUnitedStatesofAmerica FirstPrinting:September2001 040302014321 Trademarks All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Que Corporation cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. Warning and Disclaimer Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an ''as is" basis. The author and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book. page_iv Page v Introduction Part I: Understanding Wireless's Basic Technologies Chapter 1 Welcome to the World of Wireless Chapter 2 What Is the Electromagnetic Spectrum? Chapter 3 How a Basic Wireless System Works Chapter 4 How Amplitude Modulation (AM) and Frequency Modulation (FM) Work Chapter 5 How Data Rides on Wireless Waves Chapter 6 How Antennas, Transmitters, and Receivers Work Part 2: How Radio and Television Work Chapter 7 How Radio Broadcasting Works Chapter 8 How Walkie Talkies and Family Radio Service (FRS) Work Chapter 9 How Television Broadcasting Works Part 3: How Cellular Telephones and Pagers Work Chapter 10 How Cellular Networks, Cells, and Base Stations Work Chapter 11 How Cellular Telephones Work Chapter 12 How Pagers Work Part 4: Understanding Wireless Networks Chapter 13 How a Wireless Network Works Chapter 14 How Home Wireless Networks Work Chapter 15 Understanding Bluetooth and IEEE 802.11 Networking Part 5: The Wireless Internet Chapter 16 Understanding the Internet Chapter 17 How Cell Phones Access the Internet Chapter 18 How XML and Voice XML Deliver Internet Data Chapter 19 How i-mode Works Chapter 20 PCs and Wireless Technology Chapter 21 How Wireless Palmtops Work Part 6: Applying Wireless Technology: mCommerce, Security, Business Use, and Beyond Chapter 22 How mCommerce and Corporate Wireless Access Work Chapter 23 Privacy and Security in a Wireless World
2 6 12 20 24 30 36 44 48 56 60 68 72 84 98 106 110 116 122 128 132 142 152 158 162 168 178 182 188
Chapter 24 How Wireless 3G Works Chapter 25 Wireless Use in Satellites and Space Glossary Index
page_v
Page vi Acknowledgments AS with all books, this was a collaboration among many people, and although my name is on the cover, thanks have to go to them. Thanks to Greg Wiegand and Stephanie McComb for trusting me with the book; and to Nick Goetz for helping shape it, working with the illustrators and in general for pulling together all the elements in a book as complex as this one. Thanks also to technical editor Don Marsh, and illustrators at D&G Limited: Erikk D. Lee and Colin King. And there are many people at Que who deserve recognition including Tonya Simpson, Gloria Schurick, Maribeth Echard, and Sandy Henselmeier. Without the aid of the many people and companies whom I interviewed for this book, it wouldn't exist. The people at Logitech, Share Wave, and Netgear were especially helpful in providing much-needed information. Finally, the biggest thanks as always to my wife, Lydia, and my kids, Gabe and Mia. Doing this book so monopolized my life at times, that probably the easiest way for them to reach me would have been through the ultimate wireless technologythe Vulcan mind meld. Tell Us What You Think! As the reader of this book, you are our most important critic and commentator. We value your opinion and want to know what we're doing right, what we could do better, what areas you'd like to see us publish in, and any other words of wisdom you're willing to pass our way. As an associate publisher for Que, I welcome your comments. You can fax, e-mail, or write me directly to let me know what you did or didn't like about this bookas well as what we can do to make our books stronger. Please note that I cannot help you with technical problems related to the topic of this book, and that due to the high volume of mail I receive, I might not be able to reply to every message. When you write, please be sure to include this book's title and author as well as your name and phone or fax number. I will carefully review your comments and share them with the author and editors who worked on the book. Fax: 317-581-4666 E-Mail: feedback@quepublishing.com Mail: Greg Wiegand Que 201 West 103rd Street Indianapolis, IN 46290 USA page_vi Page vii Introduction YOU take it for granted: You pick up a cell phone, make a call, hang up, and then go about your business. You tune in your radio to a baseball game occurring on the other side of the continent. You watch a war taking place live on the other side of the planet. You page the plumber because your hot water heater has broken and is flooding your basement. You turn off your car alarm by remote control. Welcome to the wireless world. Just about every aspect of your daily life is touched in one way or another by wireless technology, by the sending of signals and information through the air. It suffuses our life, and yet, little more than 100 years ago, people didn't even realize that waves could carry information. Probably the closest thing the modern world has to magic is wireless technology. Invisibility; things appearing out of thin air; communicating across the street, across town, across the continent or the worldit has all the earmarks of magic. Although we all use wireless technologies many times a day, most of us probably have only the vaguest idea of how the technologies actually work. Perhaps we have some notion that some kind of waves carry information in some way. We've probably heard the term modulation or amplification, or cell or base station. But as for the details...they seem to escape us. This book is dedicated to demystifying how wireless technologies work. As you'll see, they're not that mysterious or difficult to understand. The book covers everything from the basics of the electromagnetic spectrum to how next-generation wireless technologies work and will change our lives. Whether you don't have a clue about how wireless works or consider yourself something of a cellular maven, there's something here for you to learn. Making it all the easier for you is that it's all explained in easy-to-follow, glorious, full-color illustrations. So, no matter how complex and intricate the topic, you'll find it easy to follow.
Part 1, ''Understanding Wireless's Basic Technologies," introduces you to the most basic principles of how wireless works. You'll learn about basic wireless concepts, see a timeline of how wireless technologies have developed, and see the many ways in which wireless technologies are used in our everyday lives. This section of the book also explains the electromagnetic spectrum, details what the radio frequency spectrum is, shows you how electromagnetic waves are created, and describes how data is transmitted by them. You'll be introduced to a basic wireless network and learn about amplitude modulation and frequency modulationthe two basic ways in which data is put onto RF waves. And the section covers the basic hardware as wellyou'll see how antennas, transmitters, and receivers work. Part 2, "How Radio and Television Work," details how those two common broadcasting media work. You'll see how radio broadcasts are created and transmitted, and then can be tuned in by your radio and played. You'll learn about low-power FM broadcastinga technology approved by the Federal Communications Commission that allows nonprofit groups to create their own radio stations and broadcast in a small area, such as a neighborhood or town. And you'll learn about the newest technology to hit radio: subscription satellite broadcasts. For a fee of about $10 a month, you'll be able to listen to hundreds of high-quality broadcasts. And because the broadcasts are delivered via satellite, you'll be able to page_vii Page viii listen to those radio stations wherever you are. This part also shows how the magic of TV broadcasting works, how the signal is created, processed, and sent through the air. You'll also learn about high-definition TV, the next big thing in television, and how satellite dishes work. Part 3, ''How Cellular Telephones and Pagers Work," shows you the intricacies of the most popular cellular communications technologies. You'll look inside cell phones and pagers so that you can see how the devices do their processing, and what the electronic components do. You'll learn about cells and base stations and how they work together with your phone so you can be located to receive phone calls, and easily make them when you need. This section also explains the differences between a whole alphabet soup of cell-phone technologies: GSM, PCS, TDMA, CDMA, and more. And you'll find out about the differences between digital and analog cell phones as well. By the time you're finished with this part, there will be hardly a thing you won't understand about cell phones and pagers. Part 4, "Understanding Wireless Networks," looks at how wireless technology is used to connect computers and allow them to communicate with one another. There's no doubt that, just as telephones are increasingly becoming wireless, the same thing will happen to computer networks. You'll see how home wireless networks function, as well as wireless networks in large corporations. Bluetooth and the 802.11 standard are the two primary ways that computers (and increasingly, other devices) communicate wirelessly. You'll see exactly how those standards work and how they'll be used in the future. Part 5, "The Wireless Internet," details the convergence of the two great technologies of our time, the worldspanning Internet and wireless communications. Although today most people access the Internet using wired computers, that won't be the case in the future. In fact, some people believe that in the not-too-distant future, the Internet will be trafficked by more wireless devices than by wired computers. This section of the book shows the basics of the Internet, and then shows how cell phones and personal digital assistants (PDAs) get onto the Internet. You'll learn about a variety of technologies, including the Wireless Application Protocol (WAP), the Wireless Markup Language (WML), WMLScript, Web clipping, XML, Voice XML, and many others. You'll also see how wireless PDAs access the Internet, how wireless keyboards and mice work, and how computers can print without wires. And you'll learn about the most advanced use of Internet-enabled wireless technology, the i-mode cell phones that had their start in Japan. The last section of the book, Part 6, "Applying Wireless Technology: mCommerce, Security, Business Use, and Beyond," shows you the many uses to which wireless technologies have been put. You'll learn how cell phones will be used for commerce, how corporations incorporate wireless technologies into their computer systems, and about all the dangers to your privacy and security posed by wireless technologies, such as wireless viruses and cell-phone snoopers. This section also describes the next generation of wireless technology, so-called 3G (for third-generation) technologies. And you'll see some of the more amazing uses of wireless technology, such as how it's used in satellite transmissions and satellite phones, and how space exploration satellites use wireless technology to communicate with Earth. So, come along to learn about the invisible world of communications all around us. As you'll see in this book, it's not really magicand in learning about it, you'll see that the reality of how it works is more amazing than any magic could ever be. page_viii Page 1 This page intentionally left blank.
page_1
Page 2
page_2 Page 3 PART I Understanding Wireless's Basic Technologies Chapter 1: Welcome to the World of Wireless 6 Chapter 2: What Is the Electromagnetic Spectrum? 12 Chapter 3: How a Basic Wireless System Works 20 Chapter 4: How Amplitude Modulation (AM) and Frequency Modulation (FM) Work 24 Chapter 5: How Data Rides on Wireless Waves 30 Chapter 6: How Antennas, Transmitters, and Receivers Work 36 page_3 Page 4 AS I've said in this book's introduction, wireless technologies are the closest thing that the modern world has to magic. The capability to make things appear at long distance, traveling through the invisible etherwireless technology has all the earmarks of prestidigitation. As we all know, there is no such thing as magic. And the truth is, what appears to be magic is just the culmination of a series of basic laws of nature and basic applied technologies that makes remarkable things possible. In this section of the book, we're going to look at those wireless basics that make it all possiblethat allow everything from TV and radio waves to travel through the air and allow your TV and radio to play the signals; that allow cellular communications across the planet; that allow interstellar communications; and more. Chapter 1, ''Welcome to the World of Wireless," takes a "big-picture" approach to understanding wireless technologies. It starts off by looking at a timeline of wireless technologies. We'll peer into the previous centuries to see when the electromagnetic spectrum and radio waves were first discovered; we'll see when early wireless technologies, such as radio, were conceived; we'll look at when the now-mature technology of TV got its start and reached fruition; and we'll see a timeline of modern wireless technologies, such as cellular telephones and
beyond. In this chapter, we'll also get our first look at basic wireless concepts, such as modulation, cells, transmitters, and receivers. And we'll see how wireless technologies are used in our everyday lives. Chapter 2, "What Is the Electromagnetic Spectrum?" introduces the most basic concept of all wireless technologiesthe electromagnetic spectrum. The spectrum is made up of energy waves that do everything from let us see the world, to cook our dinner, to let us peer into the body with X-rays, and, of course, to communicate using wireless technology. We'll take an in-depth look at the spectrum and how it works, as well as the specific part of the electromagnetic spectrum used for communicationswhat are called the radio frequencies, or RF. And of particular importance, we'll see how electromagnetic waves are created. Chapter 3, "How a Basic Wireless System Works," starts getting down to the nitty-gritty. We'll overview a basic wireless network. We'll see how information is modulated onto RF waves, is sent through a transmitter, travels through the air, and then is demodulated at the receiving end so it can be understood. Chapter 4, "How Amplitude Modulation (AM) and Frequency Modulation (FM) Work," looks inside the mysteries of modulation. All information that needs to be transmitted wirelessly, whether it's your voice, TV signals, or digital data, needs to be transferred onto carrier waves that send that information through the air. The information is put onto the waves in a page_4 Page 5 process called modulation. There are two ways that data can be modulated onto a wave amplitude modulation (AM) and frequency modulation (FM). In this chapter, we'll see how each of those techniques works and learn the pros and cons of using each different kind. In Chapter 5, ''How Data Rides on Wireless Waves," we'll learn more about how information travels on carrier waves. We'll look at what happens to a signal after it has been modulatedwe'll see, for example, how it's processed by devices such as signal processors so that it can be sent through the air most effectively. We'll also learn about things such as signal gain and how interference affects RF waves. The chapter covers some very basic and important informationunderstanding the difference between sending analog information over RF waves and sending digital information over RF waves. Chapter 6, "How Antennas, Transmitters, and Receivers Work," covers the most basic hardware in any wireless systemantennas, transmitters, and receivers. There's no way that signals can get from point A to point B unless this hardware is there to do it. You'll learn not only the inner workings of these devices, but also gain an understanding of the importance of various antenna, transmitter, and receiver designs. So, whether you're a wireless maven or just trying to understand how wireless technology works, you'll find a lot in this first part to help you understand the wireless world. As you'll see, wireless technologies are, in a way, magicalthough magic of the most practical sort. page_5 Page 6 CHAPTER 1 Welcome to the World of Wireless
page_6 Page 7 A little more than 100 years ago, an Italian physicist and inventor named Guglielmo Marconi was the first person to successfully transmit information over radio waves, and the world has never been the same since. These days, it's chic to talk about the computer revolution or the Internet revolution as the driving force behind changes in the way we live and work, but in fact, the greatest and most far-reaching revolution of the last 100 years or so has been neither of themit's been wireless technology, the capability to send information up to thousands of miles invisibly through the air. Without wireless transmissions there would be no broadcast mass media. No radio. No television. No instant communications via satellites. The world has become a global village, in large part because of wireless technologyand in fact, in many of the poorer countries on earth it's easier to communicate using cell phones than over traditional telephones (called landlines) because of the immense cost involved in stringing telephone wires over vast distances. Despite all the advances in wireless communicationsthe cell phones, the pagers, satellite transmissions, the transmission of digital datawireless technology works to a great extent the same way today as it did back in the days of Marconi. All wireless transmissionswhether Morse code in the days of Marconi or digital data todayare able to piggyback information onto invisible waves. These waves are part of the electromagnetic spectrum energy waves that include visible light, X-rays, ultraviolet light, microwaves, and many other kinds of waves. The portion of the electromagnetic spectrum that can be used to transmit information is called the radio frequency (RF). RF is used to transmit all kinds of data, not just radio broadcasts, so don't be confused by the term. The information piggybacked onto RF waves can be of any kindanything from voice to television signals to computer data. The information is piggybacked onto the waves using a device called a modulator. It's then transmitted through the air. Sometimes it's sent to a device a foot away from the transmitter; other times it's broadcast to a wide audience hundreds or thousands of miles away; and yet other times it might be sent to a cell phone tower a mile away, where it then is sent by that tower somewhere closer to its destination. But in all cases, when it reaches its destination, the information is taken from the wave in a process called demodulation. And that process of modulating information onto a wave, transmitting the wave, and then receiving the wave and demodulating information from it, is the heart of all wireless technology. Whether you're doing something as simple as changing the channel on your TV or accomplishing a task a bit more complex, such as sending and receiving e-mail on your cell phone, realize that you're using technology that's older than a century, and as up to date as today's news. page_7
page_12 Page 13 EVERY second of our lives, we are surrounded by waves of energysome visible, the vast majority of them
invisible. These waves are created in many different ways. Some, like the light and colors that we see and the different kinds of waves created by the sun, are naturally created. Others, such as radio and television signals, microwaves, remote-control infrared rays, and cell phone transmissions, are man-made. All these waves of energyknown as electromagnetic radiationtaken together are referred to as the electromagnetic spectrum. You're probably already familiar with another kind of spectrum, the spectrum of visible light. This spectrum of visible light occupies only a very tiny portion of the electromagnetic spectrum. To fully understand the spectrum and radiation, you must understand two basic concepts: frequency and wavelength. Wavelength, as its name implies, refers to the length of the energy wave; in other words, the length between its peaks. There are tremendous variations between wavelengths along the spectrum. They can be as long as 106 meters at the bottom of the spectrum, or as short as 10-15 meters at the top of the spectrum. (For those of you not used to the metric system, that means from distances measured in microscopic sizes, all the way up to 62 miles.) Frequency refers to the number of times, or cycles, per second that wave cycles occur. The number of cycles per second are measured in hertz (Hz). A single cycle per second is one hertz; seven cycles per second are seven hertz. Electromagnetic waves generally go through many more cycles per second than that, though, so a shorthand is used to refer to higher numbers of hertz. One kilohertz (kHz) refers to one thousand (103) cycles per second; one megahertz (MHz) refers to one million (106) cycles per second; one gigahertz (GHz) refers to one billion (109) cycles per second; one terahertz (THz) refers to one trillion (1012) cycles per second; and one petahertz (PHz) refers to one quadrillion (1015) cycles per second. There are tremendous variations in frequency along the spectrum, with frequencies of 102 and below at the bottom and 1023 and above at the top. As a rule of thumb, there is a relationship between frequency and wavelength: The longer the wavelength, the lower the frequency. Radio waves are electromagnetic radiation that is capable of being used for communications. They occupy a small spot along the electromagnetic spectrum, near the bottom. They have the longest wavelengths and the lowest frequenciescharacteristics that make them the most suited for sending information. The most commonly used frequencies for RF are from 9 kHz to 30 GHz. Radio waves also can be separated into a spectrum. Because of their wavelengths and frequencies, differentkinds of radio waves are suited for different kinds of communications. The higher the frequency, the shorter the range the waves can travel. The lower the frequency, the farther the range the waves can travel. So, AM radio broadcasts, for example, use a relatively low frequency, enabling them to travel long distances from their transmission towers. Cellular telephone calls use a relatively higher frequency and can travel shorter distances. They need to travel only a short distance because they need to travel only to a nearby cellular base station with which they communicate. page_13 Page 14 How Electromagnetic Waves Are Created
page_18 Page 19 Page 20 CHAPTER 3 How a Basic Wireless System Works page_19
page_20 Page 21
AS you learned in Chapter 2, radio frequency (RF) waveswaves that make up a small part of the electromagnetic spectrumare used to send wireless information from one device to another, such as cellular telephones or a television. But how does a basic wireless system work? How do computer data, television transmissions, or the spoken voice over the telephone get from point A to point B without the use of wires? No matter how simple or complex the system, and no matter what kind of information is being transmitted, the basic wireless system for transmitting information remains very much the same. At its heart, it's fairly simple it's the details that are complicated. First, the information that is to be transmitted needs to be created. Next, it's encoded onto a radio wave, and then it's transmitted. The signal, now in wave form, travels through the air and is ultimately received by an antenna or aerial, which sends it along to a receiver. Finally, a variety of devices transform the energy in the signal into the electrical energy that can be recognized by the receiving device, whether it be a television set, handheld computer, or cellular telephone. It all sounds so simple, but as you'll see throughout this book, there are complications and endless variations on this one theme. Networks can bounce RF waves off satellites and deliver them tens of thousands of miles, or can transmit radio broadcasts into a single neighborhood. They can be used to create vast wireless systems connecting thousands of computers in major corporations, or they can connect two computers in your home office. They can send TV, radio, or voice signals; they can help us search for life other places in the universe. They can carry voice or data of all different kinds. The use of the word ''network" with regard to wireless technology is a loose one. Generally, though, it means a system in which RF signals carrying information of some kind are sent from one device, through intervening communications devices, and then to a receiving device. So, for example, a simple child's walkie-talkie wouldn't be considered a network, because with walkie-talkies, the signal is sent directly from one device to another. But cell phones are part of a network, because they don't communicate directly with other telephonesthey are hooked into a huge network that routes calls using many different pieces of hardware and software. As you'll see throughout this book, the most important wireless technologies in one way or another use networks. These networks have become increasingly complicated over time. But keep in mind, as you learn about them, that at heart they're all the same simple system: Information gets created, encoded onto RF waves, sent through intervening communications devices, and then received, decoded, and used. page_21 Page 22 How a Basic Wireless Network Works
Page 24 CHAPTER 4 How Amplitude Modulation (AM) And Frequency Modulation (FM) Work
page_24 Page 25 INFORMATION that is going to be sent wirelessly needs some way to get from one place to another through the air. To get from point A to point B, it rides on the back of RF waves. The wave that carries the information is called a carrier wave. Information is put onto the carrier wave through a process called modulation. Modulation takes the information, which can be in analog or digital form, and superimposes it onto a carrier wave. (Digital data is data represented as either on or off, like the data in a computer. Analog data is information represented along a continuumthere can be infinite variations between two points.) The carrier wave itself is always an analog wave. The carrier wave then is sent through the air, and on the other end, it is demodulatedthat is, the information is separated from the carrier wave. The two primary means of modulation are amplitude modulation (AM) and frequency modulation (FM). You're no doubt familiar with both terms from your radio and, as you've probably guessed by now, AM broadcast radio uses amplitude modulation, and FM broadcast radio uses frequency modulation. These types of modulation aren't limited to radio broadcasts, howeverone way or another, all wireless communications uses some form of AM or FM modulation. In AM, the frequency of the carrier wave stays constant, but the amplitude of itin other words, its height changes as a way to represent the information being sent. AM is the earliest kind of modulation, and it has been around since the earliest days of radio communications. It's easy to implement, but there's a problem with itit's prone to interference, and creating a high-quality signal using AM is difficult. There are several reasons for that, primarily that it's easier for interference to change the amplitude of a signal than it is for it to change the frequency of a signal. That means that AM suffers more from interference than FM. A new generation of AM, called Binary Amplitude Shift Keying (BASK), is more resistant to interference and noise, and it can be used to transmit digital data. Because of that, it's used in some digital wireless systems. FM works differently than AM. In it, the amplitude of the carrier wave stays constant, but the frequency changesin other words, the speed at which it goes through a wave cycle constantly changes. The changing frequency is what represents the information being sent. Noise and interference don't affect the frequency of RF signals in a major way, so because of that, the quality of the FM signal tends to be higher than the quality of AM signals. Many kinds of digital wireless communications use a variant of FM, called Phase Modulation (PM). PM uses the
fact that there are different points in a wave cycle to transmit information. It continually shifts the points in the cycleand each of those points can represent different information. It's particularly wellsuited for representing digital information. Variants of it are used in many major cellular technologies. page_25 Page 26 How AM Works
page_28 Page 29 Page 30 CHAPTER 5 How Data Rides on Wireless Waves page_29
page_30 Page 31 YOU know by now that wireless communication requires information to be sent along RF waves, but how is that information actually transmitted along waves? That's what you'll find out in this chapter. As you learned in previous chapters, for information to be transmitted wirelessly, it first needs to be modulated onto a carrier wave. The information to be transmitted can be of many different kindsradio, television, voice, or data, for example. But no matter what kind it is, it can be of two different types, either analog or digital. Analog data is information represented along a continuumthere can be infinite variations between two points. So, for example, a watch face that has hands on it represents data in an analog manner. And a wave itself is analog, because it's continuous. Digital data, on the other hand, is information presented as either on or off, often represented as 1 for on and 0 for off. All data in computers is digital data. Whether the data is digital or analog, when it's transmitted wirelessly, it rides on RF waves, which are analog. So, even digital data has to piggyback onto an analog wave to be transmitted. Until recently, all wireless data, such as TV and radio transmissions and conversations sent via cell phones, was analog. But increasingly, data is sent in digital format. Digital data sent wirelessly is superior to that sent in analog format for a variety of reasons. It can be more efficiently sent, it's easier to be sure that the data hasn't been corrupted during the transmission, and it's easier to encrypt it so that eavesdroppers can't listen in, among other reasons. Because of this, the newest wireless technology is digital, including new, high-speed cellular telephone services, wireless Internet access, and digital television. No matter what kind of data is to be transmitted, it frequently needs to be processed in some way before it's sent. That's because of the very nature of RF waves and the environment through which they travel. The environment is full of electromagnetic radiation caused by many different things, such as the normal background radiation caused by the sun, sunspots, machinery, and lightning storms. This electromagnetic radiation is called noise, because it doesn't carry information. Weak RF signals would be drowned out by this noise if they weren't in some way strengthened before they were sent. Another problem with sending information wirelessly is that the environment naturally weakens RF waves as they travel. Everything with which the RF waves come in contact, such as air molecules, rain, buildings, even leaves on trees, weakens the waves through a process called absorption. The waves also can be deflected by objects they come into contact with. Because of this, RF waves often need to be processed before they're sent changed so that they can be transmitted efficiently, and strengthened so that they can reach their destination. Devices such as signal processors and amplifiers process and strengthen the signal. page_31 Page 32 How Data Is Transmitted by Waves
page_36 Page 37 NO matter what kind of information is being sent and received, and no matter on what frequency it travels, the same basic hardware is required for all types of wireless technology. This hardware must do several basic things. It must take information, such as music, that is originally an electrical signal, put that signal onto a carrier electrical signal, and then convert the electrical signal into an RF signal. Then, it needs to transmit that signal. On the receiving end, it must receive the signal, convert the RF wave into an electrical signal, separate the information from the carrier wave, and then interpret the resulting electrical signal in some way, such as by sending it into a headphone or speakers. Obviously, in the real world things are more complicated than this, but these are the basic steps. These steps are handled by three primary pieces of hardware: a transmitter, an antenna, and a receiver. The transmitter does the work of taking the information and piggybacking it onto another signal. The antenna does the job of converting that electrical signal to RF waves, which then propagate through the air. An antenna receives the waves, and then the receiver turns the waves into electrical energy, separates the information, and sends it to devices such as speakers or headphones. In some instances, transmitters and receivers are found on the same devicesuch as a cell phone, which needs to both send information and receive it. In other instances, transmitters and receivers are separatefor example, in the instance of TV transmitters and TV sets. When a device does both sending and receiving, it's called a transceiver, and typically has one antenna that both sends and receives RF waves. In some devices, such as a cell phone, transmitters and receivers are designed to send and receive only at a single frequency. In essence, the capability to send and receive at that frequency is programmed into the hardware of the transmitters and receivers. In other devices, such as radios and televisions, the receiver has been designed to accept and interpret signals at a range of frequencies. These kinds of devices are a bit more complicated because they require the device to be capable of tuning into different frequencies. So, when you turn a radio dial, for example, you're telling the receiver to listen for waves only at a specific frequency and to ignore the rest. page_37 Page 38 How Antennas Work
Chapter 7: How Radio Broadcasting Works 48 Chapter 8: How Walkie Talkies and Family Radio Service (FRS) Work 56 Chapter 9: How Television Broadcasting Works 60 page_45 Page 46 WE like to think that the latest technologies are the most revolutionary the world has seen. The Internet has been hailed as the technology that finally will bring the world together in one vast, global village, and allows ways for people to communicate as never beforeone on one across space, instantly. And it's been recognized as bringing instantaneous news to everywhere on the globefree information available whenever people want, updated constantly throughout the day. Cell phones and cellular technology are seen as similarly revolutionary. Wherever you are, you can talk with anyone else, untethered by wires. The truth is, though, that the impact of the Internet and cellular technologies pales in comparison with technologies from the earliest days of the 20th century, and even from the latter days of the 19th century. Radio and television revolutionized the way that people work and think in ways far more basic and far-reaching than the Internet and cell phones have. Guglielmo Marconi first sent information over radio waves in 1895; by 1905, the first long-distance wireless distress signal, an SOS, was sent. Radio soon boomed, and by the first decade of the 20th century, radio stations were everywhere. Radio was the first mass communications medium, delivering instant news and entertainment long distance and creating the modern mass market. People felt connected with the world in ways they never had before. In fact, an argument can be made that radio, more than politics or any other cause, was a prime driving force behind forging a national unity in the United States. Television accelerated what radio had begun. The first experimental TV broadcasts were begun in 1924, and it took nearly 30 years for television to become a mass phenomenon. But when it became one, it did so with a vengeance. Not only has it become the primary way that people get their news and entertainment; in many ways, it shapes the way that people look and think about the world. And it does so on a global scale, not just on a national one. It's what has helped turn the world into a global village. In this part of the book, we'll look at the technologies that make radio and television work. Chapter 7, ''How Radio Broadcasting Works," covers the technologies that make radio broadcasts work. We'll start by looking at the basics of radio broadcastinghow broadcasts are created, how the signals are piggybacked onto waves, amplified, and sent out over antennas, and then how radios tune in and decode the radio signals. It covers both AM and FM broadcasts. page_46 Page 47 The chapter also looks at several radio broadcast technologies that are less well-known, but will become increasingly popular. The first, low-power FM radio broadcasting (LPFM), allows nonprofit groups to broadcast in a small area, such as an individual neighborhood or town. These groups allow people to bypass the major corporations that, in essence, own the radio airwaves, and create community programming of their own programming that is local, and that has points of view and voices that you otherwise might not hear on commercial radio. As you'll see in this chapter, there are ways to ensure that LPFM doesn't interfere with existing radio broadcasts. The chapter also looks at subscription satellite radio. This service beams high-quality digital radio broadcasts down from satellites for a monthly subscription fee. Because satellites cover the entire United States, you'd be able to drive from one end of the country to the other without losing a radio signal. Chapter 8, ''How Walkie-Talkies and Family Radio Service (FRS) Work," explains the inner workings of the familiar walkie-talkie, the device that many of us know from childhood but that can be, in fact, far more powerful than the toys of our youth. Walkie-talkies allow direct communications between people, without having to use cell phone towers, pay monthly subscription fees, or pay for connect time. It's a generic term that describes a variety of personal two-way radiosradios that let people communicate directly with one another. Family Service Radio, which we'll look at in detail, is a new, powerful form of walkie-talkie that allows people and families to keep in touch when camping, bike riding, or just in the neighborhood. Finally, Chapter 9, "How Television Broadcasting Works," looks at the technology that everyone claims to hate, but that they spend an inordinate amount of time watching. We'll see how TV cameras work, how TV signals are combined and processed, and how they're broadcast and received. We'll also look at how a television set is able to decode and display a television signal. The chapter also looks at two newer technologies, satellite TV and digital TV. Satellite TV enables you to receive hundreds of TV stations beamed down to you by satellites circling the globe. And digital TV is the next generation of televisionit uses an exceedingly high resolution and can even allow several television signals, as
well as data, to ride along with television signals. So, if you've ever wondered how the biggest mass communications media of our time work, this is the section of the book for you. page_47 Page 48 CHAPTER 7 How Radio Broadcasting Works
page_48 Page 49 TODAY, we tend to think of the Internet as the greatest communications revolution the world has ever seen. But the truth is, it probably has not had as revolutionary impact on the world as did the radio. Information was first piggybacked onto radio waves by Guglielmo Marconi in 1895, and the world hasn't been the same since. By 1905, the first wireless distress signalan SOSwas sent using radio waves. Radio soon became a growth industry; so much so that by 1912 the U.S. Congress passed the first laws regulating public use of the airwaves. The radio was the first mass communications medium that drew the world closer together, that created a mass audience, that allowed news and information to travel great distances to huge audiences instantly. Although today's electronic equipment is far more sophisticated than the earliest radios, and although the quality of the sound received is far, far superior, in the most basic ways, radio hasn't changed much since broadcasting first began. The same basic physics and technology still holds. Like all other RF communications, radio broadcasts must be piggybacked onto carrier waves for them to be sent. They're piggybacked using amplitude modulation (AM) and frequency modulation (FM) techniqueshence the name AM and FM radio. AM signals are more prone to interference, so its quality is not as good. But AM signals traditionally have a longer wavelength than FM signals and travel a greater distance. Radio receivers include an antenna and a variety of electronics to tune into and demodulate signals, and then play them over speakers. Although the basics of radio haven't changed that much over the decades, the past few years have seen some intriguing new developments. The first is low-power FM (LPFM) radio broadcasting. This allows nonprofit institutions to run inexpensive radio stations that serve individual neighborhoods, cities, or regions. These radio stations operate at lower powereither 10 watts or 100 wattsand can broadcast their signal only for less than four miles. These stations require licenses from the Federal Communications Commission to operate, and the FCC makes sure they don't interfere with existing broadcasters. The other new development is the advent of subscription satellite radio. It's a commercial service that uses satellites to deliver hundreds of high-quality, stereo radio broadcasts for a monthly fee. One of the big draws of
the service is that when you drive, you'll never lose the signal. That's because when you leave the area that one satellite covers, you'll enter an area that another satellite covers. So, you could drive across the country and listen to the same radio station the entire time if you wanted. page_49 Page 50 How Radio Broadcasting Works
Page 56 CHAPTER 8 How Walkie-Talkies and Family Radio Service (FRS) Work
page_56 Page 57
WALKIE-TALKIES, also called handy talkies, have been with us for more than 60 years. Although the devices have been around since 1938, the way they work hasn't changed all that much over the years. Walkie-talkies are transceiversthat is, they have hardware for both sending and receiving over RF. The same antenna both sends and receives. Walkie-talkies can't send and receive at the same time, however; Only one person can talk at a time when using them. Typically, when someone stops talking, you have to press a button to send a voice signal. Walkie-talkie is, in fact, a generic term that describes a variety of personal two-way radios radios that let people communicate directly with one another. Unlike cell phones and some other kinds of wireless communications technologies, walkie-talkies don't require separate transmitters or base stations. Instead, when you talk to someone, you transmit voice and they pick it up directly; and the same holds for when they transmit voice to you. One of the most popular kinds of walkie-talkies became something of a cultural icon back in the 1970sthe CB (citizen's band) radio. CB radios communicate on shortwave frequencies at approximately 26 to 27 MHz. Their signals can travel long distances because they can ''skip" through the atmosphere, but this skip also can cause problemsthe radios have a problem communicating at more than five miles. But CB radios became a victim of their own success (and excess). They became so popular that foul language and general obnoxiousness began to take over the airwaves. Other kinds of walkie-talkies are commercial walkie-talkies, used by companies in many different ways, such as for security personnel to communicate with one another, or at construction sites, or within a building. There's one more type of walkie-talkie, what many people think of as the toys of their youth. These low-cost devices usually transmit only about 100 yards, and in fact, have no real use except for play. Today, an increasingly popular kind of walkie-talkie is the Family Radio Service (FRS). Think of FRS as the walkie-talkie of your youth on steroids, made more powerful by the use of FM as a means of modulation, and more power output. It can send and receive in a radius of up to two miles, and has a bevy of sophisticated features. You can use it to block out everyone except those in a select group. It will scan channels to find unused ones or to find people already talking. Some have scramblers to help keep your conversations private. The newest ones will send you weather alerts, and include Global Positioning Satellite (GPS) capabilities. page_57 Page 58 How Family Radio Service (FRS) Works
page_58 Page 59
page_60 Page 61 TELEVISION has been with us for nearly 80 years: The first experimental television broadcasts began in 1924. Fifteen years later, regularly scheduled broadcasts began, although in those early days very few people watched them. That shouldn't be a great surprise because the technology in the earliest days was very rudimentaryin TV's earliest incarnations, the picture was only one-inch square. TV pioneer Vladimir Kosma Zworykin, a Russian migr to the United States, invented the cathode-ray tube, which enabled larger pictures and better transmissions. By the 1950s, the television set with its rabbit-ear antennas had become ubiquitous, and it took a central place in our culturea place it has yet to relinquish. If the world has truly become a global village, it has television to thank. News, complete with video, is beamed across the world even as it happens; many of the last several wars were in fact televisedand not just televised, but televised live. Increasingly, there is a global pop culture focused on MTV and Hollywood. More than any other wireless technology, it has conquered time and space. Television broadcasts work like many other types of wireless communications, although with a variety of twists. First, the broadcast is createdand it might be live or on tape. The signal is processed, notably by separating it into red, green, and blue components, and then put onto a carrier RF signal and transmitted. Televisions pick up the signals with their antennas, decode and process the signal, and then display it by having rays of red, green, and blue strike the inside of the television set. These days, of course, not all television is sent wirelessly; many people receive their TV signals through cable. But even for people who receive TV through cable, wireless transmission usually is involved. Cable systems often receive from satellites the signals they then send through the wires. Although television is a nearly 80-year-old technology, there have been several advances in recent years, and some very big ones on the way. Many people prefer to receive their TV signals not through cable, but through satellite. To do that, people pay a subscription fee and get a small satellite dish that they must point toward a satellite. The satellite beams their signals down to them. Satellite TV uses digital transmissions, which are of a higher quality than the analog signals now commonly used in normal broadcasts. But television is gradually going digital. Digital TV, and its offshoot High Definition TV (HDTV), have been slow coming along, but there's no doubt that they'll eventually arrive. HDTV allows for TV of an exceptionally high quality, including high-quality sound. And beyond that, because it's digital and uses computer formats for broadcasting, it will be easy for the signals to carry data as well, and will go a long way toward bringing interactivity to the TV set. page_61
page_64
page_65
page_68
Page 69 PART 3 How Cellular Telephones and Pagers Work Chapter 10: How Cellular Networks, Cells, and Base Stations Work 72 Chapter 11: How Cellular Telephones Work 84 Chapter 12: How Pagers Work 98 page_69 Page 70 MENTION the word ''wireless" to someone, and the first things they'll probably think of are cell phones or pagers. Forget radios, televisions, walkie-talkies, and the myriad other wireless devices out there. When it comes to wireless, people think cell phones. There's good reason for that. They've become ubiquitous. You can't walk down a city street, drive in your car, or be anywhere else, for that matter, and not see someone with a cell phone held up against their ear. And it's not just human beings that have become so used to cell phonessome birds, notably starlings, have begun to copy the tones that cell phones make when they have a call. As prevalent as cell phones are in the United States, they're that much more common in Asia and Europe. In fact, those continents are ahead of the United States not just in cell phone use, but also in the sophistication of their cell phone networks and features. Japan's i-mode, for example, offers the kind of interactive services that are still far away in the United States. Pagers are common all over the world. They're not as noticeable because they're smaller. And increasingly, cell phones are replacing pagers. But pagers still are in widespread use, for everyone from plumbers to doctors. In this part of the book, we'll take a look at how cell phones and pagers work. Chapter 10, "How Cellular Networks, Cells, and Base Stations Work," explains all the basics of cell phones and their associated networks. You'll learn all about cellular networksyou'll see, for example, how a typical network routes a call from your phone, through base stations, switches, and a variety of other communications devices, and then sends those calls to the phone network or to other cellular networks. You'll see step-by-step the intricate choreography involved when you do a simple thing such as connect your phone to the network. Similarly, you'll see how your call is routed when you make a call, and how the network knows where you are and delivers a call to you when someone is trying to reach you. The chapter also explains how individual cells workthe cells that give cell phones their name. Every cellular network is divided into many cells, each of which has its own transmitter and receiver called a base station. Cells cover a specific geographic area. You'll see how cells perform a "handoff" when you drive from one cell to another so that you can keep talking even though you're moving out of one cell and into another. Chapter 11, "How Cellular Telephones Work," takes a closer look at the inner workings of the phone itself. In that chapter, you'll see a cutaway view of a cell phone, so that you can see all the different components and what each does to help make you send and receive calls. page_70 Page 71 You'll learn how cell phones use cellular channelscommunication lines between the phone and the network that carry voice as well as commands that instruct the cell phone what to do to communicate with the network. The chapter also explains the difference between digital and analog cell phones, and it spends a great deal of time making sense of the alphabet soup of cellular-related acronyms. You'll look inside a PCS system, you'll learn the difference between TDMA, CDMA, and GSM systems, and find out how they all work. And you'll learn how cell phones use the Short Message System (SMS) that allows people to send text messages to each other much like a computer's instant messaging, except for cell phones. Finally, this section of the book takes an inside look at pagers. Chapter 12, ''How Pagers Work," shows you a cutaway view of a pager. You'll see its innards and how they all work together to deliver pages to you. You'll see how a paging network functions and what happens when someone calls in a pageyou'll see it wend its way through the network, find out exactly where you are, and then page you. The chapter also looks at an increasingly popular devicetwo-way pagers. These let you not only receive pages, but let you send messages as well. Although they have many uses, the most popular use is for getting always-on access to e-mail. With a two-way pager, you can always be alerted when you have e-mail, and can then read it and respond to it. page_71 Page 72 CHAPTER 10 How Cellular Networks, Cells, and Base Stations Work
page_72 Page 73 CELL phone networks are everywhere, not just in the United States, but all over the world. In fact, cell phone use is more common and advanced outside the United States than inside it. Analog networks, which were the first cellular networks, are referred to as Advanced Mobile Phone Service, or AMPS. They use frequency modulation to deliver signals. They were the first generation of cellular technology. But although AMPS is very popular, there are problems with analog networks like it. First, their capacity is limited, so they can't handle as many calls as more advanced cellular networks. And equally important is that they can't deliver the same kinds of advanced services, such as browsing the Web, paging, and text messaging, as digital networks. Digital networks were developed to solve these problems. One of the most common one is called Personal Communications Services (PCS). There are many other digital network schemes, though, as you'll learn in Chapter 11, ''How Cellular Telephones Work," but no matter where cell phone networks are located, and whether they're digital or analog, they operate on similar principles. Those are the principles you'll learn about in the illustrations on the following pages. Cell phone networks are made up of the phones themselves; of individual cells and their associated base stations, which communicate with the cell phones; and of a variety of networking hardware and software that handles internal communications for transferring calls and data through the network; and external communications for transferring calls and data from the network to other networks and to the normal telephone system. (The "normal" telephone system, by the way, is commonly known as the public switched telephone network, or PSTN.) Cell phone networks are not monopolies, so more than one network can operate in a given geographical area. Depending on the type of network, they operate on different frequencies, so there isn't any interference between the networks. As cell phone networks become ubiquitous, they raise certain societal issues. Whether drivers should be allowed to talk on their cell phones while driving has become a hot issue, and in fact, some municipalities have banned or curtailed the practice, and others are examining the issue. Some restaurants are banning cell phone use. And everyone has had the unpleasant experience of being in a movie theater, play, or opera and listening to someone's cell phone beep during important parts of the performance. Of special concern to network operators, though, are that the cell phone towers which house cell base stations have begun to draw fire in certain communities. In particular, they've been attacked as being unsightly. Because of this, some cellular network operators have taken to disguising their towers as treesdesigning them and camouflaging them to fit more closely into the natural environment so that they're not noticed by passing drivers or hikers. And some companies disguise their towers to look like flagpoles on the tops of buildings. page_73 Page 74
page_74 Page 75 Page 76 How Cell Phones Connect to the Network page_75
page_84 Page 85
AT the heart of the wireless communications revolutions is a device so small and slim it can fit in the palm of your hand, and yet contains such sophisticated electronics, computing, and communications technologies that they were inconceivable decades ago. We're talking, of course, about the cell phone, the device that has become ubiquitous: Everywhere you gofrom the grocery store to city streets, cafs, and, of course, automobilesit seems to be glued to people's ears. The devices themselves contain an astonishing array of technologies taken from different industries. There are liquid crystal displays, microprocessors, antennas, amplifiers, circuit boards, microphones, speakers, digital signal processors, and much more. If you take a cell phone apart, you'd be amazed at all the electronics squashed into such a small space. Of course, you don't want to take one apart, so the first illustration in this chapter shows you what the inside of a cell phone looks like, and explains what all the important components do. The cell phone by itself, of course, can't do anythingfor that, it needs a network. In the previous chapter, you learned how cell phone networks work. In this chapter, you'll look at various underlying technologies that work closely with the phones. You'll see, for example, how control and communications channels work in concert with cell phones to send and receive data. If you've tried to buy a cell phone and cell phone service, you know what a mind-boggling number of acronyms and incompatible technologies you have to wend your way through when making a decision. So, the rest of the illustrations in this chapter will help you understand the most important of those technologies. Phones can use either digital or analog technology. Analog phones are older, and eventually they probably no longer will be manufactured as the world goes digital. Digital phones offer far more services, but to deliver them, they use more complex technology. The acronyms you'll most likely encounter in the cell phone world are PCS (Personal Communication Service), TDMA (Time Division Multiple Access), CDMA (Code Division Multiple Access), and GSM (Global System for Mobile Communications). PCS doesn't really refer to a single, discrete technology; instead, it's a more general term describing digital cellular systems that offer a wide range of services, such as text messaging (known as Short Message Service, or SMS) and access to the Web and e-mail. GSM, primarily used in Europe, also doesn't describe a single technology, but rather a host of related technologies. PCS, in fact, is based on GSM, and is essentially the U.S. version of a GSM system. TDMA and CDMA, on the other hand, are specific technologies. They're digital technologies that use different methods of allowing many different people to share the same frequency for cell phone use. page_85 Page 86 A Cutaway View of a Cellular Telephone
page_90
page_91
page_92 Page 93 Page 94 How TDMA, CDMA, and GSM Work page_93
page_94 Page 95 Page 96 How Short Message Service (SMS) Works page_95
page_98 Page 99 PAGERS, once worn primarily by doctors, plumbers, and others whose jobs required them to be reached in emergencies, have long ago reached the mainstream. Everyone from high-tech executives to teenagers now carry them on their belts so that they can be easily reachedand for some, it's become a sign of prestige, an announcement to the world that they're so important they need to be able to be contacted no matter the place or hour. Pagers have become a huge part of our lives for several reasons. The devices are exceedingly small and can be unobtrusively carried. They're inexpensive, don't have high monthly fees, have a very long battery life, and generally work no matter where you are. Pagers work like many other radio devices. They contain an antenna that receives the RF signal and electronics that translate that signal into letters or numbers and letters on an LCD screen. An individual pager is part of a network, which has an infrastructure similar to those of cell phones. Your pager has a unique code that identifies it, so it receives only pages that have been specifically sent to it. Unlike cell phones, pagers don't have transmitters (except in the case of two-way pagers). The first pagers could do nothing more than alert you to the fact that someone wanted to get in touch with you, and show their phone number or some other numeric code. Since then, there have been significant advances in paging. Broadcast paging allows messages to be sent to many people, not just one. It can be used to deliver real-time news, stock quotes, and other information to people who want it. Most notable has been the advent of two-way paging. Two-way pagers allow you not just to receive messages, but to send them as well. Becoming increasingly popular are two-way pagers that allow you to be alerted when you have e-mail, and then let you check your e-mail, and even to respond to it. Doing that requires you to work with your employer (if you want to get your business-related e-mail), or with your Internet service provider (ISP) if you want to get and send your personal e-mail. Although two-way pagersespecially those that let you receive and send e-mailare becoming increasingly popular, it's not yet clear how popular more traditional one-way pagers will remain. The newest cell phones have a pager-like function called Short Message Service (SMS), which allows cell phones to send and receive pager-like messages. For more information about cell phones and SMS, turn to Chapter 11, ''How Cellular Telephones Work." page_99 Page 100 A Cutaway View of a Pager
page_102 Page 103 Page 104 How Two-Way Pagers Work page_103
page_106 Page 107 PART 4 Understanding Wireless Networks Chapter 13: How a Wireless Network Works 110 Chapter 14: How Home Wireless Networks Work 116 Chapter 15: Understanding Bluetooth and IEEE 802.11 Networking 122 page_107 Page 108 A time is comingit's coming soon, and is already here for many peoplewhen wherever you go, you'll be connected to a network. A computer network, that is. Most of us are used to the idea of being connected to a telephone or paging network wherever we go. With some exceptions and dead spots, when you carry your cell phone around, all you need to do to connect to the world, or see whether anyone wants to connect to you, is turn on the power. Worldwide communications are only a few button pushes away. And the same holds true for paging. Wherever you go, your little beeping companion will always let you know when someone needs to get in touch with you. That's not the case, however, when it comes to computers. If you happen to carry a laptop, you can't get instant communications. You'll have to be sure you have a modem, then find a nearby telephone, and then dial numbers and hope for the best. For many people, ''mobile computing" isn't very mobileit's tethered by a phone line and access to a landline telephone. Your computer is tethered even inside a corporation or your home. If you want to be connected in a corporate network, you must be near a jack that can get you into your company's network through an Ethernet cable. At home, you'll need to be near a telephone, or if you connect to the Internet through a cable modem or DSL line, you'll have to be near those cables or lines. In short, computer communications has a long way to go when it comes to wireless network and Internet access. That's all changing, however. Wireless networks have arrived, and although they certainly aren't everywhere yet, they're becoming more popular. One day, they'll become very common, and you'll be able to roam with a computer wherever you want, and be instantly connected to a network or the Internet. In this section of the book, we'll take a look at wireless networks, both at home and in the office. We'll look at their inner workings and how they'll be used in a typical home or office. And we'll look at the workings of the
two most popular kinds of wireless networks Bluetooth and the family of IEEE 802.11 standards. In Chapter 13, "How a Wireless Network Works," we'll look at the business use of wireless networks and see how a typical corporate wireless network works. We'll see how hubs and routers handle communications, examine how computers connect to the network, see how corporate offices connect to one another, see how traveling employees can connect to the home network wirelessly, and more. We'll see that corporate networks truly will lead to the completely mobile worker, both in the office and on the road. In this chapter, we'll also take a look at the inner workings of a wireless network card and see how it's able to let computers make connections to wireless networks. page_108 Page 109 Chapter 14, ''How Home Wireless Networks Work," looks at wireless networking at home. Surprisingly, wireless networking has come to the home before it has come to the corporate world. You can buy wireless networks inexpensivelyfor several hundred dollars that will connect all the computers in a home. Typically, these networks primarily are used to allow several computers to share a high-speed Internet connection, such as a cable modem or DSL modem. But they also allow printers and other devices to be shared, as well as allowing computers to share files with one another. These networks are quite easy to set up and are especially helpful for people who don't want to have to string Ethernet cabling throughout a home. In this chapter, we'll also look at a home network that goes beyond computersone that can include radios and appliances such as microwave ovens in a wireless home network attached to the Internet. In Chapter 15, "Understanding Bluetooth and IEEE 802.11 Networking," we'll look closely at the two most popular wireless network standards. Bluetooth is named after Harald Blatand, King of Denmark from approximately 940 to 985, who united Denmark and Norway. Bluetooth technology is designed to allow many different kinds of devices to talk to one another, from computers to cell phones to stereosin fact, just about any device you can name. It's designed as a peer-to-peer network that allows these devices to talk directly to one another, without extra hardware such as network servers. The IEEE 802.11 networking standard, on the other hand, is designed specifically for computers, and although it also can work as a peer-to-peer network, it most often will be used in concert with traditional networking hardware such as hubs, routers, and servers. page_109 Page 110 CHAPTER 13 How a Wireless Network Works
page_110 Page 111 THE lifeblood of businesses is information; its heart is communication. The more information it has, and the better it shares that information, the healthier it is. The primary way that companies get and share information today is through their local area networks (LANs). LANs serve two purposes: They allow people in the business to share information with each other and to get at corporate information and resources; and they allow people to access the Internet, through the LAN's connection to the Internet through hardware called routers. Just about any corporation you walk into has LANs with Internet access. By now, that's old hat, and pretty much a requirement for any company to do business. What you're just starting to see are wireless LANs that allow people to connect to the corporate network and the Internet without wires. There are many benefits for this for companies, not the least of which is that it makes it far easier for people to get at information and share it, than when they use a traditional LAN. For example, in a company with wireless LAN, wherever people go with their laptops, they're automatically connected to the LAN. So, people can take laptops into meetings with them, into other people's offices, and get all the information and corporate resources they want. It also means that people who have wireless personal digital assistants (PDAs), like the Palm, also can get immediate access to the network wherever they go. Wireless networks also let corporations extend their LANs far beyond the walls of a single building. Wireless point-to-point networks, called wireless bridges , let companies who have buildings with clear lines of sight to each other send network data over microwave transmitters and receivers. Some companies that span the U.S. and Mexican border use these wireless bridges as a way to have corporate offices communicate with each other, and so get around the steep cost of international phone calls. Wireless networks can extend the corporation's reach to its employees in other ways, as well. People can connect to the network with wireless devices using a Virtual Private Network (VPN) over a wireless gateway, and get at their e-mail and other corporate resources even when they're outside the office. Because the VPN uses encryption, no one can steal data being sent and received. Wireless networks are still somewhat rare in the business world, and even when they become more popular, they'll rarely be wireless-only. Instead, wireless networks will be tacked on to existing wired networks through the use of wireless access points. These wireless access points allow computers with wireless network cards to hop onto the LAN. In the next two illustrations, you'll see how corporate networks work, and you'll also take a look inside a wireless network card. page_111 Page 112 How a Corporate Wireless Network Works
page_112 Page 113 Page 114 How a Wireless Network Card Works page_113
page_114
Page 115 Page 116 CHAPTER 14 How Home Wireless Networks Work
page_115
page_116 Page 117 WIRELESS networks aren't only for business. In fact, as of now, they're probably used more in the home than in businesses. There are several reasons for that. A big one has to do with cost. Corporations are located in office buildings that are already wiredthey have strung through them the Ethernet cables that connect computers to the network, so building an entirely new wireless network is a very expensive proposition. By way of contrast, homes don't have Ethernet cables strung through the walls. Therefore, to network computers in several roomsin a study, a home office, and several children's bedrooms, for exampleone would have to snake cables through the walls, and that costs a significant amount of time and money. With a wireless network, you don't need to spend that time and money. The other reason that wireless networks have become popular at home is that the simple ones used in homes are very easy to set up, and have become relatively inexpensive, costing only several hundred dollars. To build a wireless network at home, you can buy a network kit with all the required pieces. You'll need a wireless hub/router that connects all the computers to one another and to the Internet. And you'll need to buy wireless network cards for each computer you want to connect to the network. The computers all connect to the wireless hub/router, and the hub/router routes all the traffic between the computers and between the computers and the Internet. For computers to be networked this way, they all must have what are called IP addresses. When a computer has an IP address, it can get full access to the Internet and to other computers on the network. Among other jobs, the hub/router assigns IP addresses to all computers in the network. The main reason why people install wireless networks is to share a high-speed Internet connection, such as a cable modem or a DSL modem. But they can use the network for other things as well, notably sharing devices such as printers, to send files back and forth between computers, or to play computer games over the network against other family members. Although today, mainly computers at home are networked wirelessly, in the future other kinds of devices and appliances will be connected to one another as well, such as radio receivers; small, inexpensive e-mail devices that only send and receive e-mail; and even traditional home appliances such as refrigerators, microwave ovens, and alarm clocks. Not only will they connect to one another, they'll connect to the Internet as well. Connecting these kinds of devices and appliances will make life more convenientyou'll be able to use your
refrigerator to automatically generate shopping lists, for example, and send orders directly to grocery stores. And you'll have an alarm clock that can change the time it awakens you based on traffic reports it garners from the Internet. These kinds of devices aren't mere fantasythey are already being sold or tested, and soon will be sold in a department store near you. Initially, many will require wires to connect to each other and the Internet, but soon they'll connect wirelessly as well, and some already do. (You can find more information about Internet appliances at www.thaliaproducts.com.) page_117 Page 118 How a Home Wireless Network Works
page_118 Page 119 Page 120 How a Wirelessly Networked Home Works page_119
page_122 Page 123 WIRELESS networks are new enough that there's no single, dominant established standard yet for how computers and other devices connect to each other and to the Internet. It probably will be years before a dominant standard is establishedand it might well be that no single standard will emerge, and that several will be in widespread use. For now, there are two main standards for wireless networking: one called Bluetooth, and the other known by the unromantic name IEEE 802.11. (It's pronounced ''eye-triple-e-eight-o-two-dot-eleven. Often, though, the IEEE isn't used in referring to it.) Although they compete with each other, they actually are used for somewhat different purposes. Bluetooth is designed to be used in devices of all sortseverything from your computer to your stereo system and anything in between. The capability to network wirelessly with Bluetooth is built into a chip, and the chip is put into a device. Because of that, it is expected to become a low-cost way to network various devices. The technology was devised so that you need not do anything to hook a device into a network. Simply turn the device on, and it automatically looks around for another Bluetooth device. If it finds one or more, they set up wireless communications by themselves. Bluetooth is an ad hoc network, which means that not only do the devices find each other on their own, but they can communicate directly with each other without having to go through a central device, such as a server or a network access point. This kind of network, when devices connect directly to one another, is known as a peer-to-peer network. Bluetooth allows computers, telephones, personal digital assistants (PDAs), and even home devices such as stereos and TVs to communicate with one another. Bluetooth devices automatically find each other, without your having to install them, or even ask them to find other devices. You also can use Bluetooth devices to access the Internet, as long as one of the devices is directly connected in some way to it. Bluetooth networks can't be very large; if there are too many devices on one that try to communicate with one another, the network and devices can crash. Because of that, and because Bluetooth wasn't devised only for computers, another kind of wireless network has become popular802.11. This kind of network is well-suited for working with the Ethernet local area networks popular in many corporations. Although 802.11 can work in an ad hoc peer-to-peer manner, it primarily is used more like a traditional corporate network. Computers equipped with 802.11 network cards communicate with wireless access points, which connect the computers to the network. Often, 802.11 wireless networks connect to larger corporate networks. So, it's an ideal way for someone with a laptop computer to hook into a company networkno matter where the person goes with a laptop, immediate network access is available. Because it's often used in a corporate environment, it can use security services such as for encryption and authentication using the Wired Equivalent Privacy (WEP) protocol. Both 802.11 and Bluetooth networks can be used either at home or in corporations. And, in fact, there's no reason why Bluetooth and 802.11 networks can't exist side by side. Bluetooth is mainly for many kinds of devices, including those used for home entertainment, whereas 802.11 is best suited for computers. So, a Bluetooth network could be used for entertainment and similar reasons (even though it's also suitable for data transmissions), whereas the 802.11 could be used for computers and Internet access. page_123 Page 124 How Bluetooth Works
page_124 Page 125 Page 126 How IEEE 802.11 Networking Works page_125
page_128
Page 129 PART 5 The Wireless Internet Chapter 16: Understanding the Internet 132 Chapter 17: How Cell Phones Access the Internet 142 Chapter 18: How XML and Voice XML Deliver Internet Data 152 Chapter 19: How i-Mode Works 158 Chapter 20: PCs and Wireless Technology 162 Chapter 21: How Wireless Palmtops Work 168 page_129 Page 130 THE greatest revolution in wireless technology since the invention of the cell phone is, undoubtedly, the wireless Internet. In the same way that the cell phone gave people instant access to the global telephone network, the wireless Internet gives people instant access to the other great globe-scanning communications medium. Most of us are used to accessing the Internet through a computer, but with the advent of the wireless Internet, there will be many different ways to gain access to everything from e-mail to Web pages and more. You can browse the Web or get e-mail using a cell phone, for example, or from a personal digital assistant (PDA) such as a Palm device. And there are many other ways that the Internet can be accessed wirelessly. In this section of the book, we'll look at the wireless Internet. You'll learn everything from the basic underlying technologies that make the Internet possible, to the different ways that cell phones access the Internet, to how wireless PDAs work, and much more. In Chapter 16, ''Understanding the Internet," you'll learn about the basic technologies and protocols that make the Internet work. You'll start off with the basics, seeing how data moves through the giant data network. Then, you'll learn about the most basic of Internet protocolsTCP/IP, the Transmission Control Protocol/Internet Protocol. Together, these protocols do the job of delivering data across the world. You'll also learn how the Web workshow Web servers and your computer work together to let you visit any Web page in the world. The chapter also covers that ubiquitous type of communicationse-mail. You'll see how the Internet takes an e-mail you write on your computer (or cell phone, these days) and delivers it to mailboxes anywhere in the world. Chapter 17, "How Cell Phones Access the Internet," delves into the mysteries of how your cell phone can do things such as browse the Web, grab Internet information, and send and receive e-mail. Cell phones get onto the Internet using a protocol called the Wireless Access Protocol (WAP), which works together with TCP/IP. You'll see how WAP enables you do to things such as browse the Web. An important part of WAP is the Wireless Markup Language (WML). This language is related to the HTML language that builds Web pages. WML allows people to build Web sites specifically suited for cell phones. A related technology is WMLScript, a scripting language that adds interactivity to WAP pages. So, you'll learn how that technology works as well. Finally, you'll see how cell phones can send and receive e-mail. In Chapter 18, "How XML and Voice XML Deliver Internet Data," you'll learn about two related technologies: the Extended Markup Language (XML) and the Voice Extended Markup Language (VXML). XML wasn't specifically designed for cell phone use or WAPit's a very important technology that will transform the way the Web is used and built. But it also page_130 Page 131 can be used to build WAP sites and deliver information to cell phones, as you'll see in this chapter. VXML, on the other hand, was specifically designed to give people telephone access to the Internet. Although it can be used with any telephone, it will find its use primarily with cell phones. It allows people to design Web pages that deliver information through voice rather than text and pictures. And it allows people to interact with the Web not by clicking or pushing buttons, but instead by speaking into their telephone. Chapter 19, ''How i-mode Works," covers a wireless Internet technology primarily used in Japan right now, but which will most likely point the way toward how all of us will use the Internet on our cell phones. i-mode has become something of a national obsession in Japan, doing everything from allowing people to send instant text messages to one another to getting daily horoscopes on their cell phones. And it's an always-on technology, so information is delivered without your having to connecte-mail, for example, could show up on your phone by itself. Chapter 20, "PCs and Wireless Technology," covers how wireless technologies are commonly used in computers. You'll learn, for example, how wireless mice and keyboards work and how infrared technology allows computers to print without wires. Finally, Chapter 21, "How Wireless Palmtops Work," covers palmtop computers, sometimes called PDAs, such
as the Palm and PocketPC devices. It explains how these devices connect to the Internet and send and receive data and e-mail, and how they are able to beam data to one another using their infrared ports. page_131 Page 132 CHAPTER 16 Understanding the Internet
page_132 Page 133 THE next big thing in cell phonesand in personal digital assistants (PDAs) such as the Palmis accessing the Internet. No longer do you need to be tethered to a computer or laptop to do things such as browse the Web and send and receive e-mail. You can do all that, right now, from your cell phone and PDA. As you'll see in the rest of the chapters in this section of the book, a variety of technologies enable you to hop onto the Internet with a cell phone or PDA. But no matter what those technologies are, or how they work, they still need to follow the basic way that the Internet works. Before you can understand how cell phones access the Internet, you first must understand how the Internet itself works. That's what you'll see in the illustrations in this chapter. Most important to understand about the Internet is that it's a network of networks. These networks can exchange data because all computers on the Internet follow the same basic rules for communicating, with what are called the TCP/IP protocols, which stand for Transmission Control Protocol/Internet Protocol. The Transmission Control Protocol breaks up data that is to be sent across the Internet into small packets, and then reassembles those packets on the computer that receives them. The Internet Protocol handles the job of making sure all the packets get to their proper destination. Doing the job of physically moving all these packets are pieces of hardware called routers. The Internet is called a packet-switched network because the packets are handled this way. When you communicate with someone on a computer, you don't have a single, direct, dedicated connection to that computer or person. Many other people can use the same lines that you are using. The normal telephone, by way of contrast, isn't a packet-switched networkit's a circuit-switched network. When you make a connection with someone, that connection is dedicated only to you and that person, even if neither of you happens to be talking at that point. An important concept to understand about the Internet, the Web, and e-mail is called client/server. Clients your Web browser or e-mail software, for examplerun on your own computer and request information from a computer on the Internet, known as a server. So, when you browse the Web, your client browser software requests a Web page from a server and then displays it to you. And when you receive e-mail, your client email software requests your e-mail from an Internet mail server (called a POP3) server, and then displays it to
page_133
page_136 Page 137 Page 138 How the World Wide Web Works page_137
page_140 Page 141 Page 142 CHAPTER 17 How Cell Phones Access the Internet page_141
page_142 Page 143 THE Internet, once the domain solely of computers, now can be accessed by anyone with a cell phone. Increasingly, many of the new cell phones being manufactured include the capability to use the Internet, and many cell phone calling plans include Internet access as part of them. But it's no easy task to allow a cell phone, with its tiny screen and usually low-speed connection, to access the Internet. To allow cell phones to access the Internet, the Wireless Access Protocol (WAP) is used. WAP was specifically designed with low-speed, cellular connections in mind, and recognizing that the device contacting the Internet will have a small window, not a full-size Web browser. WAP protocols are built not just for the present, but for the future as well. So, although WAP works well with today's low-speed cellular Internet connections, it's also designed so that when wireless high-speed 3G connections come into being, cell phones will be able to take full advantage of them. WAP actually is a full suite of protocols and services, not a single one. For example, it includes the WAP Transaction Protocol (WTP), which is in a way the equivalent of the TCP/IP protocols that form the underlying basis of the Internet. And it also includes the Wireless Transport Layer Security (WTLS), which allows for the sending and receiving of encrypted information so that you can feel secure in shopping and banking when you use it. Two of the most important components of WAP are WML, the Wireless Markup Language; and WMLScript, a scripting language that allows for interaction between the cell phone and the Internet. WML is based on HTML, the language that is used to build Web pages. WML is made up of commands specifically designed to display textand even graphicson a small cell phone screen. Designers create sites with WML; when your cell phone contacts a site, it's actually downloading WML documents to your cell phone. A microbrowser in your cell phone then displays those documents, in the same way that a browser displays Web pages on a computer screen. WMLScript is similar to the Web's JavaScript scripting language and, like JavaScript, it adds interactivity to pages. Especially important is that it can have the microbrowser that otherwise would have to be done by contacting a Web site. This is important, because cell phones usually have low-speed connections to the Internet, so WMLScript can speed up the delivery of information. And it also can help keep cell phone costs down. Another important component of WAP is the WAP gateway. This is a special server that translates requests and information between the TCP/IP protocols of the Web and the WAP protocols of cell phones. The gateway also can reformat Web pages so that they display better on cell phones, although the truth is, unless a Web site is built specifically for WAP and cell phones, it never looks very good. page_143 Page 144 How Web Pages Are Delivered with WAP
page_148 Page 149 Page 150 How Cell Phones Send and Receive E-Mail page_149
page_150
Page 151
page_151
Page 152 CHAPTER 18 How XML and Voice XML Deliver Internet Data
page_152 Page 153 WIRELESS technology is relatively new, and giving wireless devices, such as wireless phones and personal digital assistants (PDAs), access to the Internet is even newer. Because of that, it's still not yet thoroughly clear how Internet information will be delivered to wireless devices. However, many people believe that one of the primary ways will be through an Internet technology called eXtensible Markup Language (XML). This language is an outgrowth of the markup language that forms the underlying basis of the Web, the Hypertext Markup Language, or HTML. To understand XML, and how it will deliver information to wireless devices, you first must understand a little bit about HTML. HTML instructs a Web browser how to view a pagefor example, to display certain text as large and another as small; to display graphics; and so on. HTML documents are text files placed on a Web server. When a computer visits the server, the page is downloaded to the computer, and the browser displays the page based on the commands in HTML. As you learned in Chapter 17, ''How Cell Phones Access the Internet," there is an HTML variant called Wireless Markup Language (WML) specifically designed so that when cell phones visit Web pages, the pages will be displayed properly on their small screens. XML takes a different approach. It's not designed to tell browsers how to display informationin fact, it can't tell a browser how to display information, because it doesn't contain those kinds of display commands. Instead, XML marks up the contents of a page and defines what kind of content each different element is. For example, if XML were used to define a book, there would be a set of tags defining the chapter number, another set of tags defining the chapter title, another set of tags defining the chapter text, and so on. What makes XML so important is that it separates the contents of a page from its display. So, after the content is defined, it can be displayed many different ways by applying different templates. The content on the page never needs to changeone just needs to create or change a template. It's like looking at the exact same weather report in several different newspapers in which the information is the same, but the colors and style of the weather map are different. This is important for wireless access to the Web, because it means that Web designers can use XML to create a page only once, and then have different templates applied to it so that the page looks one way to a computer,
another way to a cell phone, and so on. An interesting variant of XML, Voice eXtensible Markup Language (VXML), will be used to deliver Internet content to cell phones as well. VXML allows designers to create Web sites that are never viewedinstead, the pages are read to visitors. And visitors interact with the pages simply by speaking into the phone. Considering how annoying it can be to use cell phone keypads, this could be a big step forward for delivering Internet content to cell phones. page_153 Page 154 How XML Works
page_156 Page 157 Page 158 CHAPTER 19 How i-mode Works page_157
page_158 Page 159 THE United States hasn't been in the forefront of accessing the Web, e-mail, and other Internet and interactive services with cell phones. Although there has been a lot of talk about it, it's still not a daily part of many people's lives. There are several reasons for that, including relatively high costs, a relatively small installed base of phones that can access the Internet, low connection speeds, and, to a great extent, no compelling reason for people to hop onto the Internet with their telephones. That's not the case, however, in the rest of the world. In Japan, cell phone access to the Internet has become something of a national craze, with teenagers as well as businesspeople regularly getting a variety of services and information through their cell phones. In the United States, a primary way that people access the Internet is through the Wireless Access Protocol (WAP). For more information about how WAP works, turn to Chapter 17, ''How Cell Phones Access the Internet." In Japan, though, people access the Internet a different way, using a service called i-mode. i-mode services offer much more content and services than do cell phones in the United Stateseverything from e-mail and chat to stock quotes, online shopping, games, quizzes, and horoscopes. To give you just a small example of how popular the service is, as of months ago, some 600,000 people used a service that offers daily quizzes and horoscopes, provided by a company called Bandai. And the Sanwa Bank in Japan estimates that more people bank using mobile phones than bank using PCs. In Japan, a single company runs i-modeit's not like in the United States where many different companies compete to provide WAP cell phone service. The Japanese firm NTT DoCoMo is in charge of the i-mode service, and it has plans to bring that service to the rest of the world. Its first target is Europe, and after that, it might bring it to the United States. Unlike WAP, i-mode is an always-on service. It delivers information at a relatively low speed9,600 bits per second (bps). But it won't stay at that slow speed for long. DoCoMo has been building an infrastructure to use 3G cellular technology (the new generation of high-speed Internet cellular access) with i-mode. There have been delays in getting it off the ground, which is no great surprise, because there have been delays worldwide in delivered 3G cellular services. (For more information about how 3G works, turn to Chapter 24, "How Wireless 3G Works.") But if it's not rolled out by the time you read this, it will be available soon. page_159 Page 160 How i-mode Works
page_160 Page 161 Page 162 CHAPTER 20 PCs and Wireless Technology page_161
page_162 Page 163 FOR most of this book, you've seen how wireless technologies are used for various kinds of communications between cellular phones, over the Internet, and among computer networks, among many others. But wireless technologies can be used not just to communicate between different devices. They can also be used to help devices themselves work. The most obvious example is the remote control, which helps you use your television. Many other examples abound, however, from garage door openers to remote control toys. Wireless technology can be used to help computers operate as well. For now, these technologies are not that commonly used, although they are slowly catching on. If you own a laptop computer, you might notice a curious, small, dark, red piece of plastic on it somewhere. (It is on some desktop computers, as well.) It's usually quite unobtrusive and blends in with its surroundings. That plastic protects the IrDA ( Infrared Data Association) port, a port that can be used to communicate with other computers or with devices such as printers. It's safe to say that this port is rarely used. In fact, many computers come with the port disabled; to use it, you'll have to navigate through a series of menus and check off the proper boxes on the right screen. It communicates with computers and devices using a technology similar to your TV's remote control. Both use infrared, rather than RF waves, to communicate. Your computer and the computer or device with which you're communicating need to be within one meter of each other, and they need to be in a direct line with each other with no obstacles in the way. The most common use of this technology is to print to infraredenabled printers, although in theory it also can be used to communicate with other PCs. A more popular way to use wireless technologies in PCs is for wireless keyboards and mice. Unlike PC infrared technology, which has a standard to adhere to (IrDA), there is no standard way for wireless keyboards and mice to work. They can use infrared or RF frequencies. The best wireless devices use RF rather than infrared. With RF, there's no need for the mouse or keyboard to point directly at an infrared port; instead, a radio transmitter in the device sends out signals that are picked up by the PC. They only need to be within six feet of one another. Given all the obstacles on a typical computer user's desk, it's a good thing that a clear line of sight is not needed, because it's rare that there will ever be one. page_163 Page 164 How Wireless Mice and Keyboards Work
page_164 Page 165 Page 166 How Infrared Printing Works page_165
page_166 Page 167 Page 168 CHAPTER 21 How Wireless Palmtops Work page_167
page_168 Page 169 ALTHOUGH wireless access to the Internet is only beginning to catch on for cell phone users, there's a small, portable device that has been used for years for wireless access to the Internet: palmtops, often referred to as Personal Digital Assistants (PDAs). These palmtops are used primarily as a way for people to keep track of personal and business information. They include an address book, a calendar, a memo page, a To-Do list, and similar productivity-based programs. People also can download and install thousands of other programs onto them, from games to databases and beyond. Generally, there are two kinds of these devicesthose made by Palm and that use the Palm operating system, and those that use Microsoft's Windows CE operating system. Palm devices are by far the more popular of the two. The first palmtops didn't offer wireless access to the Internet, but the second generation started to offer wireless access, either by being built directly into the device, or by means of a special wireless modem that attaches to the device. Palm makes a model, called the Palm VII, that includes an antenna and built-in radio for wireless Internet access. It uses a cellular network for Internet access that works very much like the cellular network for cell phones. There are two problems with giving a device like the Palm VII access to the Internet. One is that the cellular network that it uses is a low-speed network, so receiving Web pages over it can take a substantial amount of time. The second problem is that the small screen of the Palm isn't well-suited for displaying Web pagesthe screen is far too small, doesn't offer a high resolution, and many Palms don't use color. To solve both those problems, Palm devised a technique called Web clipping. With Web clipping, you don't actually get Web pages delivered to you. Instead, you get information sent to you from the Web pages, and the information is formatted especially for the Palm's screen. Software called a Palm Query Application (PQA) runs on the Palm, and data from the Web is delivered into that software in a form easy for you to read. Palms and other palmtops also let you send and receive e-mail. To solve the problem of low-speed access, you get only a screenful of information at a timeif you want more, you ask for a second screen, and so on. Attachments are stripped out because the Palm can't handle them. Palms and other palmtops also can use add-on software to browse the Web using the WAP protocol, which was designed for cell phones. For more information about WAP, turn to the illustration ''How Web Pages Are Delivered with WAP," in Chapter 17, "How Cell Phones Access the Internet." There is one more way in which some palmtopsnotably, the Palmuse wireless technology. They allow palmtop users to beam data and programs directly to each other using a built-in infrared port. page_169 Page 170
page_170 Page 171 Page 172 How Web Clipping Works page_171
Page 174 How Wireless Palmtops Send and Receive E-Mail How iMessenger E-Mail Works
page_174 Page 175 Page 176 How Palmtops Beam Data to Each Other page_175
page_178 Page 179 PART 6 Applying Wireless Technology: mCommerce, Security, Business Use, and Beyond Chapter 22: How mCommerce and Corporate Wireless Access Work 182 Chapter 23: Privacy and Security in a Wireless World 188 Chapter 24: How Wireless 3G Works 198 Chapter 25: Wireless Use in Satellites and Space 202 page_179 Page 180 CELL phones or other wireless technologies can be entertaining, but they also must have some real uses. The whole point of using wireless technology, after all, is to reach people, or do business, or in some way to make your life easier or more convenient. In this part of the book, we'll look at a variety of ways in which wireless technology is used. And we'll look at a variety of miscellaneous uses of the technology, as well as what the future of wireless technology will look like. Chapter 22, ''How mCommerce and Corporate Wireless Access Work," looks at the most important ways that wireless technology is used in corporations and for buying and selling. It starts off by examining mCommerce, the term commonly used for mobile commerce. As of yet, mCommerce is not yet big, but expectations are that it will boom in the coming years. According to one estimate, in fact, several billion dollars a year will be spent buying and selling over cell phones. The chapter looks at a wireless commerce standard called Mobile Electronic Transactions (MET) that uses encryption to be sure you can buy and sell without someone stealing your credit card. And it shows you how a variety of technologies, such as the Wireless Access Protocol (WAP), the Wireless Transport Layer Security, WMLScript, and others will make it easy and safe for you to buy from your cell phone. The chapter also looks at how corporations can use wireless technologies to give employees-access to all of a company's resources, no matter where they are. A salesperson, for example, could get up-to-the-minute pricing information and availability for goods or services, and could place an order directly on a personal digital assistant. The systems to allow this apparently simple matter are quite complex, as you'll see in this chapter. Chapter 23, "Privacy and Security in a Wireless World," looks at cellular's seamy underbelly and at privacy issues anyone who uses wireless communication should know about. You'll learn all about a variety of dangers in this chapter: For example, you might not realize it, but it's exceedingly simple for someone to listen to your cellular calls with inexpensive, off-the-shelf hardware. The chapter takes a close look at how snoopers can listen in to your cell phone calls. Snoopers can do more than thatwith a laptop computer, the right hardware, and a little know-how, they can tap into all the traffic going through a wireless network, and can do it from the parking lot outside a company. And there are many more dangers, as well. Viruses have already targeted PDAs, and the first forms of a cell phone virus have been circulating as well. In this chapter, you'll find a detailed explanation of how these cellular viruses work. The chapter looks at another danger you might not know aboutthe "cloning" of cell phones. Some cell phones can be cloned, and then sold, allowing other people to make calls using your cell phone, and leaving you to foot the bill. page_180 Page 181 Chapter 24, ''How Wireless 3G Works," looks at one of the most talked-about technologies in the wireless world 3G (for third-generation) technology. This technology will allow very high-speed access to the Internet, allowing for things such as streaming videos and music straight to your cell phone. The technology has been slower in coming than many people had hoped, due largely to financial problems that wireless providers have faced, as well as some technical hurdles. But no one doubts that 3G will be here soon, and will eventually become the dominant way that people use cellular technology. Finally, the last chapter in the book, Chapter 25, "Wireless Use in Satellites and Space," takes you on a journey high above the earth, so that you can see some of the many ways that wireless technologies are used in satellite communications and in space research. You'll see how satellites can pinpoint any person's location on earth using Global Positioning System (GPS) technology. You'll also see how remarkable satellite telephones work. These telephones can make and receive calls anywhere on earth. page_181 Page 182 CHAPTER 22
page_182 Page 183 ALTHOUGH wireless technology is used for entertainment, games, and to keep in touch with friends and family, one of its primary uses will be for business. There are some very obvious ways it is already used for business, primarily by allowing workers and managers to be easily reached, no matter where they are, via cell phones. And by extending the reach of corporate wireless networks, it is used by corporations as well. But there are more important ways that wireless technologies will be used for business. One of the most important ones is called mCommerce, which stands for Mobile Commerce. mCommerce refers to the use of cell phones or wireless personal digital assistants (PDAs) to do buying, primarily over the Internet. Although today there is very little mCommerce, its use is expected to explode in the future, in the same way that online shopping expanded in a few short years. Consider this: There are estimates that by 2003, the number of cell phone users worldwide will exceed the number of people who have fixed Internet access through phone lines, corporate networks, and devices such as cable modems. Given the chance, those cell phone users will want to shopso much so that industry experts predict that by 2005, several billion dollars a year will be spent on mCommerce. When we refer to mCommerce here, we don't refer to someone making a cell phone call and placing an order by voice. Instead, it means buying using the cell phone over the Internet, sometimes by browsing a wireless online shopping site and other times by making a direct connection to an individual store. There's no single standard yet on how mCommerce will work, and mCommerce still is in its infancy, so it might be a while before everyone agrees on how it will work. But an emerging standard supported by several cell phone companiesMobile Electronic Transactions (MET)eventually might form the core of mCommerce. The standard has information for many different kinds of mCommerce, including buying directly from Web sites using the Wireless Applications Protocol (WAP), as well as for things such as wireless wallets, paying in retail stores using a cell phone, and other commercial applications. Another important business use of wireless devices will be in allowing people with cell phones and PDAs to directly interact with large company databases and other ''enterprise" software, no matter where they are. And it also will allow people to synchronize the data on their PDAs with corporate information, by updating the PDA information as well as updating the information found on corporate databases. This will be most important for sales people, but eventually many kinds of workers will be able to access corporate information this way. In fact, companies are already doing it, and it's a way of life at some corporations right now. page_183 Page 184 How mCommerce Works
page_186 Page 187 Page 188 CHAPTER 23 Privacy and Security in a Wireless World page_187
page_188 Page 189 PICK up the newspaper on just about any given week, and you'll find scare stories about security and privacy problems having to do with the Internet. Viruses spreading worldwide, Web sites being hacked and attacked, people's identities stolenthese are just a few of the problems you'll find on the Internet. As of yet, you rarely hear similar scare stories when it comes to the wireless world. That might make you think that you're safe and secure, that hackers, pranksters and evil-doers want nothing to do with the wireless world. Nothing could be further from the truth. Just wait. They're coming. In fact, ultimately, the wireless world might be more vulnerable than the Internet when it comes to privacy and security problems. There are some simple reasons for that. The first is obvious: When you communicate wirelessly, you're sending information out through the air, so people can try to pluck that information using devices such as scanners, which can listen in on wireless communications. Thousands of hobbyists have long listened in on wireless police and emergency communications in this wayand they've also listened in on cell phone calls using scanners as well. Just think of the scandal a few years back when Prince Charles was overheard and taped talking to his mistress over a cell phone. And scanners also allow thieves to ''clone" cell phones and allow other people to make free phone calls using that cloned phone. Another reason for the vulnerability has to do with advances being made in cellular technology. Telephones increasingly are taking on the functions of computers, complete with computerized address books and databases and more features as well. The more complex telephones become, the more vulnerable they are to viruses and hackers. Yet one more reason has to do with the always-on future of cellular communications. When it comes to computers, viruses are frequently sent through e-mail. In a world where cellular phones maintain an always-on connection to the Internet, e-mail, and chat programs, viruses can be sent instantaneously. Not just cell phones are vulnerable. Personal digital assistants (PDAs), such as the Palm device, are targets as well. In fact, the Palm has already been hit by a cellular-borne virus that piggybacked a ride whenever a Palm beamed information to another Palm using infrared ports. For corporations, the problems are even more serious. Wireless networks can be easily tapped by someone in a nearby parking lot using a laptop computer and inexpensive hardware and software. In fact, that's already happened. Two security experts have been making the rounds in Silicon Valley, listening in on wireless networks in many high-tech companies, including the hardware networking giant Sun Microsystems, and Nortel Networks, a company that specifically sells software designed to stop people from snooping in on networks. So, the headlines might not be there today, but count on itin the future, there will be bigger security dangers in the wireless world than there are today on the Internet. page_189
page_190 Page 191 Page 192 How Wireless Viruses Work page_191
page_192 Page 193 Page 194 How Cell Phone Calls Can Be Tapped page_193
page_194 Page 195 Page 196 How Cell Phone Identities Can Be Stolen page_195
page_196 Page 197 Page 198 CHAPTER 24 How Wireless 3G Works page_197
page_198 Page 199 THE services you can get with today's cell phone will look nothing like the ones you'll get tomorrow. They'll be so dramatically different, it almost will be as if you're using a different device altogetherand in fact, you will be. Think of today's cellular phone systems as the Internet before the invention of the World Wide Web. Before the Web, the Internet largely was a text-based system; a sleepy kind of backwater. Then the Web came, and the world changed. In the same way, a group of cellular technologies, collectively known as 3G , for third generation , will forever change the way in which cell phones and similar devices are used. These technologies will offer always-on, high-speed cellular access to the Internet as well as to phone calls. It's hard to know exactly how the world will change because of it, but there's no doubt that it will. You'll receive video and music on your cell phone, get live navigational directions, receive instant e-mail, and, no doubt, a lot more, as well. 3G is not a single, distinct, technology, but rather a catchall phrase that encompasses a group of technologies to offer this always-on, high-speed access. The technologies are a natural outgrowth of previous cellular technologies. So-called 1G technologies were the initial wave of cell phones and wireless devices. It's hard to remember now, but these first cell phones and pagers were heavy and bulky and didn't offer that many servicescell phones were attached to backpacks that had batteries in them; pagers were brick-sized. 2G technologies refer to the technology we have todaysmaller-size cell phones and pagers; simple cellular Web browsing and e-mail delivery; and other technologies, such as caller ID. Some people even talk about 2.5G technologies, which to a great extent means today's technology, but delivered at a higher speed. In fact, some people refer to GPRS technology as a 2.5G rather than a 3G technology. Billions of dollars have been spent worldwide on the necessary infrastructure for delivering 3G technologies. Most of that money has been spent in Japan and Europe, and that's where 3G technologies will first hit. The Japanese company NTT DoCoMo worked on rolling out some of the first 3G technologies in late 2001 and early 2002, with the world following from there. Although there's no single standard that defines what 3G technology is, it's sometimes referred to as IMT-2000 (International Mobile Communications-2000). An international organization called the International Telecommunications Union (ITU) has put together a broad group of specifications known collectively as IMT2000. But the truth is, at this point, it's little more than an alphabet soup of technologies that won't necessarily be the same from continent to continent. page_199 Page 200 How Wireless 3G Works
page_200 Page 201 Page 202 CHAPTER 25 Wireless Use in Satellites and Space page_201
page_202 Page 203 YOU might not realize it, but orbiting above the earth and you are hundreds of satellites busy beaming information to and from the earth. They're tracking the weather or gathering spy information; sending phone calls, TV, and radio signals; sending positioning information to people; and far more. Some of them are sending information from far out in spacefrom Mars, for example, or even from beyond the limits of our solar system. And for all these communications, they're using wireless technologies. What might be most surprising about satellite communications is that they use the same basic kinds of communications equipment used here on earthtransmitters, antennas, receivers, and so on. Several types of satellites are involved in communications. Geostationary satellites orbit the earth at 35,784 kilometers. At that height, they have an orbital period of 24 hoursin other words, they are orbiting at the same speed the earth revolves. So, these satellites can stay fixed above the exact same position above a spot on the earth. Because of this, satellite dishes on earth can simply point at one of these satellites and never need to move, because the relative position of the satellite doesn't move. They are located in a belt above the equator, so antennas in the northern hemisphere that use these satellites all point in a southern direction. A second kind of satellite is Middle Earth Orbit (MEO) satellites, which orbit at an altitude of between 5,000 and 15,000 kilometers above the earth. Among these are satellites for the Global Positioning System (GPS). As you'll see in the illustration later in this chapter, GPS systems can pinpoint your location on earth so that you can know your current longitude and latitude. When combined with computer technology and a database of maps, they can provide navigation instructions. They also can provide exceedingly accurate time. A third kind of satellite are Low Earth Orbit (LEO) satellites, which orbit at a height of 100 to 1,000 kilometers. The very first communications satellite, the Echo satellites, were LEO satellites, launched in 1960. For financial and technical reasons, these kinds of satellites were used less and less until the 1990s, when a company called Iridium hatched a scheme to launch dozens of LEO satellites that would allow people to make and receive phone calls from anywhere on earth, by beaming calls to and from the satellites. The business went bankrupt in a spectacular fashion, but it has since been revived, and several other companies, such as Globalstar, now are planning to sell satellite phone service as well. The other kinds of satellites that use wireless communications are those used for space exploration. When you see pictures from Mars or Jupiter, those photos have been beamed to earth using wireless technologies. Surprisingly, as you'll see in the illustration later in this chapter, the transmitters on them are not particularly strongonly about eight times as strong as those on a cell phone. But a variety of other technologies and designs make up for that, so that the satellites can keep sending data back to earth, literally from beyond the edge of the solar system. page_203
page_204 Page 205 Page 206 How Satellite Phones Work page_205
page_210
Page 211 3G A standard for the next generation (third generation) of cell phones, which will be able to access the Internet at high data rates. 802.11 The most common standard for wireless computing networks. Several 802.11 standards allow for different rates of transmission. advanced mobile phone network (AMPS) The first generation of cellular networks; they are analog-based. amplifier A device that strengthens a signal by increasing its amplitude. amplitude The magnitude of a wave. amplitude modulation (AM) A method of modulation in which an information signal is superimposed over a carrier signal by varying the amplitude of the carrier signal. analog data Information represented as a continuous wave in which there can be infinite variations between two points. analog-to-digital converter (ADC) A device that converts analog data to digital data. antenna A device that sends and receives radio signals by converting alternating voltages to and from electromagnetic fields. antenna gain A measure of an antenna's capability to concentrate or receive electromagnetic energy in or from a given direction. base service set (BSS) In an 802.11 network, an access point, along with all the wireless clients, such as computers and personal digital assistants, communicating with it. base station A device in a cellular network that handles radio frequency communications with phones and other cellular devices inside a single cell. base transceiver station See base station . binary amplitude shift keying (BASK) A method of digital AM used to transmit digital data in some digital wireless systems. Bluetooth A wireless networking standard that allows many different kinds of devices to communicate in a peer-to-peer fashion; that is, without having to use a server or other hardware to connect them. card A single page on the Internet built with the WML language, designed to be viewed by cell phones. Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) The way that computers communicate with a wireless access point. When used, transmitters/receivers transmit only when the channel is clear, thus avoiding ''collisions," simultaneous transmissions that garble both transmitters' data. carrier signal An RF wave used to carry information. page_211 Page 212 cell A geographic area in a cellular network that contains radio base stations, antennas, power sources, and communications to a central switching facility. cellular network A network that uses a series of overlapping cells as a way to allow wireless devices within it to communicate. client A piece of software running on a local computer or device that communicates with a central server. cloning Copying information from a cell phone so that other people can make phone calls from a cell phone and charge them to the cloned phone. Code Division Multiple Access (CDMA) A digital technique that allows several cell phones to share the same channel simultaneously by assigning each phone its own code, and having each phone receive coded messages at the same time. Compact HTML (cHTML) A markup language similar to HTML used to build Internet sites for the i-mode service. control channel A cellular communications channel that transmits system information and gives instructions to cell phones. deck A group of related cards on the Internet built using the Wireless Markup Language, designed to be viewed by cell phones. decryption A method of unscrambling encrypted data so that it can be understood. demodulation The act of separating information from a carrier wave. demodulator A device that separates information from a carrier wave. digital data Data represented as bits that are either on or off. All data in computers is digital data. digital signal processor A programmable chip that processes signals in a variety of ways so they can be sent or decoded more easily. digital TV (DTV) A technique in which TV broadcasters and receivers use digital technologies. Digital TV offers a much higher resolution than analog television, and also allows for extra interactive features. digital-to-analog converter (DAC) A device that converts digital data to analog data. directional antenna An antenna that transmits in a single direction.
electromagnetic radiation Waves of energy of varying wavelengths and frequencies propagated through space. electromagnetic spectrum The entire range of wavelengths or frequencies of electromagnetic radiation, such as visible light, the radio frequency, X-rays, infrared, and so on. page_212 Page 213 electromagnetic waves See electromagnetic radiation. electronic serial number (ESN) A cell phone's serial number, programmed into the phone's number assignment module, that uniquely identifies the cell phone to the cellular system. It also helps guard against cell phone fraud. encryption A method of scrambling data so it can be read only by its intended recipient. Ethernet The most common local area networking standard. eXtensible Markup Language (XML) An extension of HTML that separates the content of a Web page from its display. It can be used to allow designers to easily create Web pages to be displayed on many different devices, such as computers, cell phones, and PDAs. extremely high frequency (EHF) Electromagnetic waves between 30 and 300 GHz; used for satellite transmissions and for radar. extremely low frequency (ELF) Electromagnetic waves below 3 kHz; used for submarine communications. family radio service (FRS) A walkie-talkie type of radio with extra features that allows people to easily talk with each other within an area of several miles. Federal Communications Commission (FCC) The government agency that regulates the airwaves. filter A device, often used in a receiver or tuner, that discards all signals except select ones. firewall A hardware or hardware/software combination that protects computers on a network from being attacked by hackers or snoopers. frequency The number of times per second that wave cycles occur. frequency modulation (FM) A method of modulation in which an information signal is superimposed over a carrier signal by varying the frequency of the carrier signal. frequency reuse A technique that allows cell phone networks to use the same frequency for different subscribers in different cells. gateway mobile switching center (GMSC) A center that routes calls to and from a cellular network to the public phone system and other cellular networks. geostationary satellite A satellite that orbits at the same speed as the earth so it stays over the same location on earth. gigahertz One billion hertz; one billion cycles per second. global positioning system (GPS) A system that allows you to pinpoint your location on earth using satellites. page_213 Page 214 Global System for Mobile Communications (GSM) A standard for digital cellular communications developed in Europe that allows European countries to have a single cellular standard. It uses TDMA as its way of communicating, and operates in different frequencies in different countries. handoff A technique in which, when a cell phone subscriber travels from one cell to another, the communications with the network are transferred from one base station to another. hertz A measurement of frequency that equals one cycle per second. high frequency (HF) Another term for short wave. See short wave. High-Definition TV (HDTV) The highest resolution of digital TV. It includes high-quality Dolby Digital surround sound. home location register (HLR) The database in a cellular network that keeps tracks of all subscribers' current locations in the network. HTTP (Hypertext Transfer Protocol) An Internet protocol that defines the way Web browsers and Web servers communicate with each other. hub A device that connects several computers to one another on a network. hub/router A combination of a hub and router that connects computers, routes data among them, and provides access to the Internet or other networks. Home networks commonly use a hub/router. Hypertext Markup Language (HTML) The language used to build Web pages. i-mode A way of sending data and interactive services over the Internet through cell phones; used primarily in Japan. infrared port A port on a computer or other device through which infrared signals are sent. Internet service provider (ISP) A company that provides Internet access to people for a fee.
IrDA (Infrared Data Association) A standard for using an infrared port on a computer or other device for communications. IP address An Internet address, such as 126.168.5.22, that computers need to get onto the Internet. kilohertz One thousand hertz; one thousand cycles per second. landline A telephone line that uses wires. line of sight A method of transmission in which the sending and receiving devices must be in a line with each other, with no obstacles between them. page_214 Page 215 local area network (LAN) A network that allows computers to send and receive information among each other, and to do other communications tasks. low frequency or long wave (LW) Electromagnetic waves between 20 and 300 kHz; used in AM radio broadcasting. low-earth orbit (LEO) satellites Satellites that orbit at a height of 100 kilometers to 1,000 kilometers. They can be used for satellite phones as well as for various sensing applications, telemetry, navigation, and spying. low-noise amplifier An amplifier that amplifies very weak signals; often used in receivers. low-power FM radio (LPFM) A method of FM radio broadcasting that allows nonprofit groups to broadcast to a small geographic area, such as a neighborhood, city, or town. mail server A server that delivers or receives e-mail. mCommerce (mobile commerce) Using a cell phone or other cellular device to shop or do other kinds of commerce. medium frequency (MF) or medium wave (MW) Electromagnetic waves between 300 and 3000 kHz; used in AM radio broadcasting. megahertz One million hertz; one million cycles per second. microbrowser A browser that a cell phone or similar devices uses to browse the World Wide Web. microwaves Electromagnetic waves in the UHF, SHF, and EHF spectrum. They have the highest frequencies in the RF band and, because of that, they have the smallest wavelengths. middle-earth orbit (MEO) satellites Satellites that orbit between 5,000 and 15,000 kilometers above the earth. They can be used in the global positioning system (GPS). mixer A device that combines signals as a way to separate information from carrier waves or to add information to carrier waves. mobile electronic identity number (MEIN) A serial number that identifies someone in a GSM system. It is programmed into a SID card. mobile electronic transactions (MET) A standard for mCommerce that includes encryption and other ways of protecting people's privacy and data. mobile identification number (MIN) A number, programmed into a cell phone's number assignment module, that identifies a cell phone subscriber. mobile subscriber unit (MSU) or mobile system (MS) Another term for a cell phone. page_215 Page 216 mobile switching center (MSC) The ''brains" of a cellular network; it handles the processing and routing of cell calls. Each MSC is in charge of several cells and base stations. They sometimes are referred to as mobile telephone switching office (MTSO), mobile-service switching center (MSC), or mobile telephone exchange (MTX). modulation The process or technique of modifying waves to transmit information. modulator A device that modifies carrier waves to transmit information. MPEG-2 A method of compressing digital animation and TV signals that reduces their size but still retains their high quality. Digital TV and HDTV use MPEG-2. network address translation (NAT) A technique in a local area network that provides an internal IP address to computers inside the network, while masking the IP address to the outside world. network card An add-in card put into a computer so it can get onto a network. number assignment module (NAM) Internal memory in a cell phone that has programmed into it identifying information about the phone, including the mobile identification number, the system ID, and the features that a subscriber has paid for. omnidirectional antenna An antenna that transmits or receives equally well in all directions. oscillator A device that creates a wave at a specific wavelength. overhead signal A communications channel in a cellular network that contains identifying information about the network, as well as commands to cell phones. packet Data that has been broken down into pieces for transmission over the Internet or another network.
palm query application (PDA) A small piece of software on a wireless Palm device that allows it to get information from the Internet using Web clipping. palmtop computer A small computer, such as the Palm, that fits in the palm of your hand, and often is used for keeping track of schedules, to-do lists, and a calendar. It also can be used for wireless communications. PCMCIA A standard for allowing laptop computers to use add-in cards such as network cards. PCS (personal communications services) A digital cellular network operating in the U.S. in the 1900 Mhz band. It offers a variety of communications services that analog systems can't offer. peer-to-peer network A network that allows computers or other devices to connect directly with one another without having to use a server or other hardware to connect them. page_216 Page 217 personal digital assistant (PDA) A small handheld computer, such as a Palm device or Windows CE device. petahertz One quadrillion hertz; one trillion cycles per second. phase modulation (PM) A variant of FM. It's useful for sending digital data over cellular networks, in which the phase of a wave is continually shifted as a means of modulation. piconet A network formed by the connection of two or more Bluetooth devices with one another. POP3 (Post Office 3) An Internet communications standard used to receive e-mail. propagation loss The weakening of a signal as it travels through the atmosphere. radio frequency (RF) The portion of the electromagnetic spectrum used to transmit information. receiver A device that receives information from an antenna and processes the information so that it can be used in some way. router A piece of hardware that sends data to its proper destination on the Internet or on a local area network. Routers work by examining the destination address of each piece of data and sending it toward its final destination. server A computer, especially on the Internet, that performs some task for other computers, such as sending or receiving e-mail or delivering Web pages. short message service (SMS) A service that allows people with cell phones to send text messages to each other. short wave (SW) Electromagnetic waves between 3 and 30 MHz; used in AM broadcasting and in shortwave and amateur radio. signal processing The act of manipulating a signal to make it transmit more effectively, or, after it's received, to be understood by a device more effectively. Simple Mail Transfer Protocol (SMTP) An Internet communications standard used to send e-mail. subscriber identity card (SIM) In a GSM system, a card that identifies a cell phone user and allows him to use other people's cell phones, in other countries, while billing him for his use. subscription satellite radio A business in which many high-quality radio broadcasts are delivered by satellite to subscribers for a monthly fee. super-high frequency (SHF) Electromagnetic waves between 3 and 30 GHz; used in fixed wireless communications and for satellite transmissions. page_217 Page 218 system ID (SID) A number that identifies a cellular network. It is programmed into a cell phone's number assignment module. TCP/IP (Transmission Control Protocol/Internet Protocol) The communications protocols that underlie the Internet. terahertz One trillion hertz; one trillion cycles per second. Time Division Multiple Access (TDMA) A digital technique that allows several cell phones to use the same channel simultaneously by giving each phone its own dedicated time slot in the channel. transceiver A device that includes both a transmitter and a receiver. transmitter A device that sends RF signals carrying information. two-way pager A pager that allows someone to both send and receive messages and pages. Some two-way pagers are used to receive and send e-mail. UART (Universal Asynchronous Receiver and Transmitter) chip A chip that handles communications in computers and palmtop computers. ultra high frequency (UHF) Electromagnetic waves between 300 and 3,000 MHz; used in television broadcasting and by cellular telephones. uniform resource locator (URL) An address on the Internet, such as www.zdnet.com, that allows computers and other devices to visit it. very high frequency (VHF) waves Electromagnetic waves between 30 and 300 MHz; used in FM radio and
television broadcasting. very low frequency (VLF) waves Electromagnetic waves between 3 and 30 kHz; used in maritime communications. virtual private network (VPN) An encryption technique that allows people to connect to their corporation's network over the Internet, while protecting the data from being seen by anyone else. voice channel The channel in a cellular network used for transmitting voice signals. voice coding The compression of a digital voice signal so that it can be transmitted using less bandwidth than if it weren't compressed. Voice eXtensible Markup Language (VXML) An extension of XML that allows people to get information from, and interact with, the Internet, by using their voice. WAP Transaction Protocol (WTP) A communications protocol, part of the Wireless Access Protocol (WAP), that is the equivalent of the Internet's TCP/IP protocols. It allows cell phones and similar devices to access the Internet. page_218 Page 219 wavelength The length of an electromagnetic wave; in other words, the length between the wave's peaks. Web browser A piece of software that allows people to browse the World Wide Web. Web clipping A technique that allows Palm devices to get information from the Internet. whip antenna A kind of antenna often used in automobiles. wireless access point A device that connects wireless devices, such as a computer equipped with a wireless network card, to a network. Wireless Access Protocol (WAP) An Internet protocol that defines the way in which cell phones and similar devices can access the Internet. wireless bridge See wireless point-to-point networks . Wireless Markup Language (WML) A markup language related to HTML that is used to create Web sites that cell phones and similar devices can visit. wireless network A network of computers, phones, or other devices that can communicate without wires. wireless point-to-point networks Networks that use fixed transmitters and receivers with a clear line of sight between them to send and receive network communications. It allows companies with more than one building to extend their networks across the buildings. Also called a wireless bridge. Wireless Transport Layer Security (WTLS) A communications protocol that allows cellular phones to send and receive encrypted information over the Internet. WMLScript A scripting language that allows for interaction between the cell phone and the Internet. Yagi antenna A kind of antenna often used for TV reception and amateur radio. It's also known as the YagiUda antenna. It was designed to provide high gain for VHF and UHF RF signals. page_219 Page 220 Index Numbers 1G (first generation) technologies, 199 2G (second generation) technologies, 199 3G (third generation) technologies CDMA (Code Division Multiple Access), 200 GPRS (General Packet Radio Service), 201 GPS (Global Positioning Satellites), 201 IMT-2000 (International Mobile Communication-2000), 199 NTT DoCoMo, 199 W-CDMA (Wideband Code Division Multiple Access), 200 A absorption microwave ovens, 33 RF waves, 31 signals, 32 access point (AP), 112, 126-127 ad hoc networks (Bluetooth and IEEE 802.11), 123 addresses IP (Internet Protocol), home wireless networks, 117 NAT (Network Address Translation), 119 Advanced Mobile Phone Service (AMPS), 73
aerials, 23 AKC packets, 126 alerts, tone (pagers), 100 ALUs (Arithmetic Logic Units), pagers, 101 AM (amplitude modulation) BASK (Binary Amplitude Shift Keying), 25-26 radios, 49-51 signals, 51 transmissions, ionosphere, 27 amplifiers, 23 cell phones, 87 HPAs (high-power amplifiers), 41 low-noise, 42, 100 pagers, 101 Satellite TV, 67 signals, 40-43 transmitters, 40-41 amplitude, 14-15, 25-26. See also AM AMPS (Advanced Mobile Phone Service), 73 analog cell phones, cloning, 196-197 data comparing with digital data, 31 converting to digital data, 34-35 networks, AMPS (Advanced Mobile Phone Service), 73 signals, 34-35, 67 systems, cell phones, 90-91 television, 65 transmissions, 34-35 waves, 25 analog-to-digital cell phones, 87 converters, 66, 101 antennas, 23, 37 cell phones, 87 directional, 38 MF (Medium Frequency) reception, 39 omnidirectional, 38 pagers, 100 palmtops, 171 radios, 50 signals, 33, 38-39 sizes, 39 Yagi, 39 AP (access point), 112, 126-127 appliances (Internet), Web site, 117 applications, PQA (Palm Query Application), 172-173 Arithmetic Logic Units (ALUs), pagers, 101 ASR (automated speech recognition), 156-157 audio, 33, 64-65 audio-to-digital converters, 35 automated speech recognition (ASR), 156-157 B bandpass filters, 41 bands KA, 207 L, 206 reject filters, 41 RF (radio frequency), 63 Vestigial Sideband, 63 bandwidths, television signals, 63
base stations cell phones, 9, 77-81 cellular, 73-74 handoffs, 9 pagers, 105
page_220
Page 221 Base Transceiver Station (BTS), 74 Basic Input/Output System (BIOS), 165 BASK (Binary Amplitude Shift Keying), 25-27 batteries cell phones, 87 palmtops, 170 Beam functions, 176-177 beaming data to palmtops, 176-177 Binary Amplitude Shift Keying (BASK), 25-27 BIOS (Basic Input/Output System), 165 bits per second (bps), 35 Blackberry (two-way pagers), 105 Blatand, Harald (Bluetooth), 125 blocking conversations on FRS (Family Radio Service), 58-59 frequencies, 50 Bluetooth standard, 123-125 Boot ROM (Read Only Memory), 114-115 boxes (set-top), Satellite TV, 67 bps (bits per second), 35 broadcasts LPFM (low-power FM) radio, 52-53 radio, 49-51 television, 62-63 browsers, Web, 133, 138-139, 146-148, 160 BTS (Base Transceiver Station), 74 business enterprise systems, wireless access, 186-187 mCommerce (Mobile Commerce), 183-185 bytes bits, 35 codes, WMLScript, 148-149 C cable modems, home wireless neteworks, 118 systems, television channels, 61-63 calls on cell phones making, 78-79 receiving, 80-81 cameras television, colors, 62 Webcams, 120 cards, wireless network, 114-119 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), 126 carrier waves, 22, 25-27, 40-41 cathode-ray tubes, 61 CB (citizen's band) radios, 57-59 CDMA (Code Division Multiple Access), 85, 94-95, 200 cell base stations, 73-74 cell phones, 8-10, 85. See also telephones (traditional) 1G (first generation) technologies, 199 2G (second generation) technologies, 199 3G (third generation) technologies, 199-201
amplifiers, 87 AMPS (Advanced Mobile Phone Service), 73 analog cloning, 196-197 systems, 90-91 analog-to-digital, 87 antennas, 87 ASR (automated speech recognition), 156-157 base stations, 9, 77 batteries, 87 BTS (Base Transceiver Station), 74 calls, monitoring power levels, 83 CDMA (Code Division Multiple Access), 85, 94-95 cell base stations, 73-74 cells handoffs, 82-83 size, determining, 83 cellular channels, 88-89 cellular networks, 74-75 circuit boards, 87 communications channels, 88-89 compression technology, 91 control channels, 88-89 cutaway view, 86-87 dialing, 78 digital security, 197 systems, 90-91 digital-to-analog, 87 DSP (Digital Signal Processor), 87 e-mail, sending and receiving, 150-151 enterprise systems, wireless access, 186-187 ESN (Electronic Serial Number), 76-77, 196-197 flash memory, 87 frequencies, 83 full duplex, 194 reuse, 82 gateways, 150-151 GMSC (Gateway Mobile Switching Center), 74-75 GSM (Global System for Mobile Communications), 85, 94-95 handoffs, 9 HLR (Home Location Register), 75-77, 81 i-mode, 159-161 identities, stealing, 196-197 IMAP (Internet Message Access Protocol), 150-151 Internet, 133 keyboards, 86 page_221 Page 222 LCD (Liquid Crystal Display), 86 linked cards, 147 making calls, 78-79 mCommerce (Mobile Commerce), 183-185 MEIN (mobile electronic identity number), 95 MET (Mobile Electronic Transactions), 183-184 microphones, 87 microprocessors, 87 MIN (Mobile Identification Number), 76 MSC (Mobile Switching Center), 74-77, 96 MTX (Mobile Telephone Exchange), 75
NAM (Number Assignment Module), 76 networks, 73 connecting to, 76-77 holes, 82 overhead signals, 76-77 pagers, 99 PCS (Personal Communications Services), 73, 92-93 POP3 servers, 150-151 pre-origination dialing, 78 privacy, 191 receiving calls, 80-81 ROM (Read Only Memory), 87 security, 191 SEND key, 78 SID, 77 SIM (subscriber identity module) card, 95 SMS (Short Message Service), 75, 85, 96-99, 192-193 SMTP (Simple Mail Transfer Protocol), 151 snoopers, 191 speakers, 86 tapping, 194-195 TDMA (Time Division Multiple Access), 85, 94-95 Telefonica cell phone service, 192-193 towers, 73 TTS (text to speech), 156-157 VXML (Voice eXtensible Markup Language), 153, 156-157 Web pages, 144-145 WML (Wireless Markup Language), 144-147 WMLScript, 147-149 XML (eXtensible Markup Language), 155 cells, 8 base stations, 9 handoffs, 82-83 sizes, determining, 83 cellular base stations, 73-74 cellular channels, 88-89 cellular networks, 74-75, 82-83 cellular telephones. See cell phones centers, paging, 102, 104 channels cellular, 88 cellular networks, 82 communications, 88-89 control, 88-89 television, cable systems, 63 checksum, packets, 137 chips, UART (Universal Asynchronous Receiver and Transmitter), palmtops, 170 chrominance signals, 63 circuit boards (cell phones), 87 circuit-switched networks, 133 citizen's band (CB) radios, 57 client/server model, WWW (World Wide Web), 138 clients, e-mail or Internet, 133 clipping, Web, 169, 172-173 cloning (analog cell phones), 196-197 code, Morse, 7, 35 Code Division Multiple Access (CDMA), 85, 94-95, 200 codes, paging, 103 colors electromagnetic spectrum, 16-17
television, 61-62 comments, WML (Wireless Markup Language), 146 communications channels (cell phones), 88-89 comparing analog and digital data, 31 cell phones and traditional phones, 7 compilers, WMLScript, 148-149 compressing HDTV (High Definition TV) signals, 64-65 compression technology, cell phones, 91 computer compresssion, MPEG-2, 64-65 computers keyboards, Logitech wireless, 164-165 mice, wireless, 164-165 palmtops, 11 PCs, wireless technology, 119, 163 printing, infrared, 166-167 connections cell phones to networks, 76-77 Internet, 117-118, 134 Continuous Tone Coded Squelch System (CTSS), 58-59 continuums, digital signals, 35 control channels (cell phones), 88-89 controllers, microcontrollers (pagers), 101 controls, remote, 10 conversations on FRS (Family Radio Service), blocking, 58-59 conversions, down (pagers), 100 page_222 Page 223 converters analog-to-digital data, 34-35 pagers, 101 Satellite TV, 66-67 audio-to-digital, 35 digital-to-analog, 67 corporate wireless networks, 112-113 corrupted packets, 137 CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance), 126 CTSS (Continuous Tone Coded Squelch System), 58-59 cutaway views (cell phones), 86-87 cycles, electromagnetic waves, 14-15 D data, 8 analog comparing with digital data, 31 converting to digital data, 34-35 beaming to palmtops, 176-177 bits, bytes, 35 digital, 25 analog data, comparing, 31 bps (bits per second), 35 transmissions, 32-35 decks, WML (Wireless Markup Language), 146-147 decryption, subscription satellite radio, 55 demodulation carrier waves, 22, 25 signals, 43 descramblers, Satellite TV, 67 designing Web sites, 153 dialing cell phones, 78
digital cell phones, security, 197 digital communication, Morse code, 35 digital data, 25 analog data, comparing, 31 audio-to-digital converters, 35 bps (bits per second), 35 transmitting, 7 digital networks, 73 Digital Signal Processor (DSP), cell phones, 87 digital signals, 34 analog-to-digital converter, 66-67 continuum, 35 processors, 33 digital systems cell phones, 90-91 compressed, 91 digital transmissions processing, 33 satellite signals, 61 Digital TV (DTV), 61, 64-65 digital-to-analog cell phones, 87 converters, 67 directional antennas, 38 dishes, satellite, 66-67 display drivers (pagers), 100 doors, garage door openers, 11 down conversion (pagers), 100 downlinks, Satellite TV, 67 drivers, display (pagers), 100 DSP (Digital Signal Processor), cell phones, 87 DTV (Digital TV), 64-65 E e-mail cell phones, sending and receiving, 150-151 clients, 133 IMAP (Internet Message Access Protocol), 150-151 iMessenger, 174 packets, 141 pagers, two-way, 104-105 palmtops, 169 POP3 servers, 140-141, 150-151, 175 receiving, 140-141, 174 retrieving from Internet mail accounts, 175 sending, 140-141, 174 servers, 133 SMTP (Simple Mail Transfer Protocol), 141, 151, 175 TCP/IP protocol, 140-141 terminals, 121 ThinAir Mail, 175 two-way pagers, 99, 104-105 EHF (Extremely High Frequency), 18 electricity, 14 electromagnetic spectrum, 7, 11-19, 32 Electronic Serial Number (ESN), 76-77, 196-197 ELF (Extremely Low Frequency), 18 encoding systems (pagers), 102 encryption, subscription satellite radio, 54-55 enterprise systems, wireless access, 186-187 ESN (Electronic Serial Number), 76-77, 196-197 ESS (Extended Service Set), 127
Extended Service Set (ESS), 127 eXtensible Markup Language (XML), 153 Extremely High Frequency (EHF), 18 Extremely Low Frequency (ELF), 18 F Family Radio Service (FRS), 57-59 FCC (Federal Communications Commission) beginning of, 53 frequencies, 4, 591
page_223
Page 224 PCS (Personal Communications Service) systems, 92 radio stations, 49 fields (magnetic), wires, 14 files, wireless viruses, 192 filters, 41-43, 50 firewalls, home wireless networks, 118 first generation (1G) technologies, 199 flash memory (cell phones), 87 FM (frequency modulation), 25 LPFM (low-power FM) radio, 52-53 modulator, 50 noise, handling, 29 PM (Phase Modulation), 28-29 radios, 49-51 signals, 51 food, heating in microwave ovens, 33 frequencies AM (amplitude modulation), 49 blocking, 50 cellular networks, frequencies, 82-83 EHF (Extremely High Frequency), 18 electromagnetic waves, 13-14 ELF (Extremely Low Frequency), 18 FCC (Federal Communications Commission), 41, 59 FM (frequency modulation), 49 full duplex, 194 GHz (gigahertz), 13-14 HF (High Frequency), 18 Hz (hertz), 13-14 kHz (kilohertz), 13-14 LF (Low Frequency), 18 MF (Medium Frequency), 18 MHz (megahertz), 13-14 pagers, 103 PHz (petahertz), 13-14 radio waves, 13 reuse, 82 RF (radio frequency), 7, 13, 18-19 SHF (Super High Frequency), 18 THz (terahertz), 13-14 UHF (Ultra High Frequency), 18, 58 VHF (Very High Frequency), 18 VLF (Very Low Frequency), 18 wavelengths, 13 FRS (Family Radio Service), 57-59 full duplex frequencies, 194 full-power radio stations, 52 functions, Beam, 176-177 G
gain (signals), 33 gamma rays, 17 garage door openers, 11 Gateway Mobile Switching Center (GMSC), 74-75, 78-81 gateways cell phones, 150-151 i-mode, 160-161 Iridium satellites, 207 SMS (Short Message Service), 75, 85, 96-99, 192-193 VXML (Voice eXtensible Markup Language), 156-157 WAP (Wireless Access Protocol), 145, 149 Wireless, corporate wireless networks, 113 General Packet Radio Service (GPRS), 160-161, 201 geostationary satellites, 67, 203 geosynchronous satellites, 67 GHz (gigahertz), 13-14 Global Positioning Satellite. See GPS Global System for Mobile Communications (GSM), 85, 94-95 global village, television, 61 GMSC (Gateway Mobile Switching Center), 74-75, 78-81 GPRS (General Packet Radio Service), 160-161, 201 GPS (Global Positioning Satellite), 57 3G (third generation) technologies, 201 satellites, 203 triangulation, 204-205 Gross, Al, 59 GSM (Global System for Mobile Communications), 85, 94-95 H hackers, home wireless networks, 118-119 handoffs, 9, 82-83 handy talkies (walkie-talkies), 11, 57-59 HDTV (High Definition TV), 61, 64-65 heating food in microwave ovens, 33 Hertz, Heinrich, 17 hertz (Hz), 13-14, 17 HF (High Frequency), 18 High Definition TV (HDTV), 61 High Frequency (HF), 18 high-pass filters, 41 high-power amplifiers (HPAs), 41 high-speed Internet connectons, 118 HLR (Home Location Register), 75-77, 81 holes (cell phone networks), 82 home control of Internet, 121 Home Location Register (HLR), 75-77, 81 home wireless networks, 117-121 HPAs (high-power amplifiers), 41 page_224 Page 225 HTML (Hypertext Markup Language) POA (Palm Query Application) queries, 173 XML (eXtensible Markup Language), 153 Web pages, 145 HTTP (Hypertext Transfer Protocol), 138-139 hubs, wireless hub/routers, 117-120 Hypertext Markup Language. See HTML Hypertext Transfer Protocol (HTTP), 138-139 Hz (hertz), 13-14, 17 I i-mode, 159-161
identities, stealing, 196-197 IEEE 802.11 standard, 123, 126-127 images, moving on television, 62 IMAP (Internet Message Access Protocol), 150-151 iMessenger e-mail, 174 impulse noise, 32 IMT-2000 (International Mobile Communication-2000), 3G (third generation) technologies, 199 information, managing, 7-8 Infrared Data Association (IrDA) ports, 163, 167 infrared ports data, beaming to palmtops, 177 palmtops, 170 infrared printing, 166-167 infrared rays, 17 International Mobile Communication-2000 (IMT-2000), 3G (third generation) technologies, 199 Internet appliances, Web site, 117 cell phones, 133 client/server model, 138 clients, 133 connecting to, 134 connections, home wireless networks, 117 corporate wireless networks, 113 e-mail, 133, 140-141 high-speed connections, 118 home control, 121 ISPs (Internet service providers), 134-135 LANs (local area networks), 135 mail accounts, retrieving mail with palmtops, 175 microwave ovens, 121 networks, 133 packet-switched networks, 133, 136-137 packets, 133 PDAs (personal digital assistants), 133 protocols, 133-134 radio tuners, 121 refrigerators, 121 routers, 135 servers, 133 TCP/IP (Transmission Control Protocol/Internet Protocol), 133, 136-137 VXML (Voice eXtensible Markup Language), 153 Web browsers, 133 Web clipping, 169, 172-173 Web servers, 135 wireless hub/router, 118-119 WWW (World Wide Web), 138-139 XML (eXtensible Markup Language), 153 Internet Message Access Protocol (IMAP), 151 Internet Protocol. See IP Internet service providers (ISPs), 118, 134-135 interpreters, WMLScript, 148 ionosphere, AM transmissions, 27 IP (Internet Protocol) addresses, home wireless networks, 117 NAT (Network Address Translation), 119 IrDA (Infrared Data Association) ports, 163, 167 Iridium satellites, satellite telephones, 206-207 ISPs (Internet service providers), 118, 134-135 J-K Japan, i-mode, 159-161 Ka band, 207
keyboards cell phones, 86 Logitech wireless, 164-165 keying, phase shift, 29 keypads, two-way pagers, 105 keys, SEND (cell phones), 78 kHz (kilohertz), 13-14 L L band, 206 landlines. See telephones languages HTML (Hypertext Markup Language), Web pages, 145 VXML (Voice eXtensible Markup Language), 153 WML (Wireless Markup Language), 144-145 WMLScript, 148-149 XML (eXtensible Markup Language), 153 LANs (local area networks), 111-112, 135 laptops, security and privacy, 195 LCD (Liquid Crystal Display) cell phones, 86 pagers, 100 palmtops, 171 LEO (Low Earth Orbit) satellites, 203, 206-207 LF (Low Frequency), 18 libraries, WMLScript, 148 page_225 Page 226 licenses, radio stations, 53 light, visible, 13, 17 line-of-sight systems (subscription satellite radio), 49, 54-55 linked cards, 147 Liquid Crystal Display. See LCD local area networks (LANs), 111-112, 135 Logitech wireless keyboards, 164-165 losses, propagation loss, 32 Low Earth Orbit (LEO) satellites, 203, 206-207 Low Frequency (LF), 18 low-noise amplifiers, 42, 100 low-pass filters, 41 low-power FM (LPFM), 49, 52-53 LPFM (low-power FM) radio, 49, 52-53 luminance signals, 63 M magnetic fields, wires, 14 man-made waves, 13 Marconi, Guglielmo (radio broadcasts), 7, 49-51 mCommerce (Mobile Commerce) MET (Mobile Electronic Transactions), 183-184 PIN (personal identification number), 184 WAP (Wireless Access Protocol), 183 WIM (Wireless Identity Module), 184 WTLS (Wireless Transport Layer Security), 185 Medium Frequency (MF), 18, 39 megahertz (MHz), 13-14 MEIN (mobile electronic identity number) , cell phones, 95 memory Boot ROM (Read Only Memory), 114-115 flash, cell phones, 87 RAM (Random Access Memory), palmtops, 170 ROM (Read Only Memory)
cell phones, 87 palmtops, 170 MEO (Middle Earth Orbit) satellites, 203 MET (Mobile Electronic Transactions), 183-184 MF (Medium Frequency), 18, 39 MHz (megahertz), 13-14 mice, wireless, 164-165 microbrowsers i-mode, 160 libraries, WMLScript, 148 WML (Wireless Markup Language) Web pages, 146-147 microcontrollers (pagers), 101 microphones (cell phones), 87 microprocessors cell phones, 87 palmtops, 170 microwave ovens, 11 absorption, 33 Internet connected, 121 microwaves, 17 Middle Earth Orbit (MEO) satellites, 203 MIN (Mobile Identification Number), 76 Mobile Commerce. See mCommerce mobile electronic identity number (MEIN), cell phones, 95 Mobile Identification Number (MIN), 76 Mobile Subscriber Unit (MSU). See cell phones Mobile Switching Center (MSC), 74-83, 96 Mobile System (MS). See cell phones Mobile Telephone Exchange (MTX), 75 modems (cable), home wireless networks, 118 modulation, 8, 25, 28-29 modulator/demodulator carrier waves, 22, 26 signals, 43 modulators, 7, 32, 50 Morse code, 7, 35 MPEG-1, 64-65 MS (Mobile System). See cell phones MSC (Mobile Switching Center), 74-83, 96 MSU (Mobile Subscriber Unit). See cell phones MTX (Mobile Telephone Exchange), 75 N NAM (Number Assignment Module), 76 NAT (Network Address Translation), 119 natural waves, 13 networks. See also wireless networks ad hoc (Bluetooth and IEEE 802.11), 123 AMPS (Advanced Mobile Phone Service), 73 AP (access point), 126-127 cards, wireless, 114-115 cell phones, 73 connecting to, 76-77 holes, 82 cellular, 74-75, 82-83 circuit-switched networks, 133 corporate wireless, 112-113 digital, PCS (Personal Communications Services), 73 home wireless, 117-121 Internet, 133 LANs (local area networks), 111, 135
packet-switched, 133, 136-137 PSTN (public switched telephone networks), 73 RF waves, 21 VPN (Virtual Private Network), 111 wireless network cards, 117-119 wireless technologies, 21 noise, 26, 29, 32 NTT DoCoMo 3G (third generation) technologies, 199 i-mode, 159-161 Number Assignment Module (NAM), 76
page_226
Page 227 numbers ESN (Electronic Serial Number), 76-77, 196-197 MEIN (mobile electronic identity number), 95 MIN (Mobile Identification Number), 76 NAM (Number Assignment Module), 76 PIN (personal identification number), 184 O omnidirectional antennas, 38 oscillators, 40, 100 ovens, microwave, 1, 331 overhead signals, 76-77 P packet-switched networks, 133, 136-137 packets AKC, 126 checksum, 137 corrupted, 137 e-mail, 141 Internet, 133 routers, 136-137 pagers, 10, 99 ALUs (Arithmetic Logic Unit), 101 amplifiers, 101 analog-to-digital converters, 101 antennas, 100 Blackberry, 105 cutaway view, 100-101 display drivers, 100 down conversions, 100 encoding systems, 102 frequencies, 103 Gross, Al, 59 liquid crystal displays, 100 low-noise amplifiers, 100 microcontollers, 101 oscillators, 100 paging centers, 102 paging codes, 103 services, 102 SMS (Short Message Service), 75, 85, 96-99, 192-193 transmitters, 103 two-way, 104-105 pages, Web, 144-147 paging centers, 102-104 codes, 103 two-way, 99
Palm, 169-171, 174 Palm Query Application (PQA), 169, 172-173 Palm VII e-mail, sending and receiving, 174-175 Internet access problems, 169 Web clipping, 173 palmtops, 144, 169-170. See also PDAs antennas, 171 computers, 11 cutaway view, 171 data beaming to palmtops, 176-177 centers, 173 e-mail, 169, 174-175 iMessenger e-mail, 174 infrared ports, beaming data, 177 LCD (Liquid Crystal Display) displays, 171 Palm, 171 palm data center, 173 PQA (Palm Query Application), 172-173 ThinAir Mail, 175 UART (Universal Asynchronous Receiver and Transmitter), beaming data, 176-177 Web clipping, 169, 172-173 Web servers, 173 PCMCIA cards, 114-115 PCs, 93 home wireless networks, 119 keyboards or mice, wireless, 164-165 printing, infrared, 166-167 wireless technology, 163 PCS (Personal Communication Services), 73, 85, 92-93 PDAs (Personal Digital Assistants), 169. See also palmtops enterprise systems, wireless access, 186-187 Internet, 133 mCommerce (Mobile Commerce), 183-185 MET (Mobile Electronic Transactions), 183-184 security, 189 wireless networks, 111 Personal Communications Services (PCS), 73, 85, 92-93 personal digital assistants. See PDAs personal identification number (PIN), 184 petahertz (PHz), 13-14 Phase Modulation (PM), 25, 28-29 phase shift keying, 29 PHz (petahertz), 13-14 piconets (Bluetooth), 125 piggybacking information, 7 pilot signals, 50 PIN (personal identification number), 184 pirate radio stations, 52 PM (Phase Modulation), 25, 28-29 POP3 (Post Office Protocol 3) server (e-mail), 104, 140-141, 150-151, 175 page_227 Page 228 ports infrared, 170, 177 IrDA (Infrared Data Association), 163 serial, palmtops, 170 USB, 119, 170 Post Office Protocol 3 (POP3) server (e-mail), 104, 140-141, 150-151, 175
power levels (cell phone calls), monitoring, 83 PQA (Palm Query Application), 169, 172-173 pre-origination dialing, 78 printers, infrared, 166-167 privacy, 189 cell phones identities, stealing, 196-197 tapping, 194-195 wireless networks, 190-191 wireless viruses, 192-193 processing digital transmissions or signals, 33 processors, 32-33, 87 propagation loss, 32 protocols HTTP (Hypertext Transfer Protocol), 138-139 IMAP (Internet Message Access Protocol), 151 Internet, 133-134 IrDA protocol stack, 167 POP3 (Post Office Protocol 3) server, 104, 140-141, 150-151, 175 SMTP (Simple Mail Transfer Protocol), 104, 141, 151, 175 TCP/IP (Transmission Control Protocol/Internet Protocol), 133, 136-137 WEP (Wired Equivalent Privacy) protocol, 123 PSTN (public switched telephone networks), 73 Q-R queries, PQA (Palm Query Application), 169, 172-173 radiation, 13 radio frequency. See RF radios AM (amplitude modulation), 49-51 antennas, 50 broadcasts, 49-51 CB (citizen's band), 57-59 filters, blocking frequencies, 50 FM (frequency modulation), 49-51 FRS (Family Radio Service), 57-59 LPFM (low-power FM), 49 Marconi, Guglielmo, 51 pilot signals, 50 pirate stations, 52 radio waves, 13, 17 speakers, 51 radio stations FCC (Federal Communications Commission), 49 full-power, 52 licenses, 53 LPFM (low-power FM), 52-53 pirate, 52 stereo systems, 50 subscription satellite, 49, 54-55 Tesla, Nikola, 51 tuners, Internet connected, 121 walkie-talkies, 57-59 wireless signals, 49 RAM (Random Access Memory), palmtops, 170 ratios, 10, 32 rays, 17 Read Only Memory. See ROM receivers, 9, 37, 42-43 receiving calls on cell phones, 80-81 e-mail, 140-141, 150-151, 174
signals, antennas, 38-39 refrigerators, Internet connected, 121 remote controls, 10 Request to Send (RTS), 126 resolution (television), 64-65 retrieving e-mail from Internet mail accounts, 175 RF (radio frequency), 7, 13, 17 bands, television broadcasts, 63 PCS (Personal Communications Service) systems, 93 PM (Phase Modulation), 25 radio broadcasts, 49 receivers, 9 signals, antennas, 38-39 spectrum, frequencies, 18-19 transmitters, 9 waves, 8, 21, 31-33, 63 wireless devices, 163 ROM (Read Only Memory) cell phones, 87 palmtops, 170 routers Internet, 135 packets, 136-137 wireless hub/routers, 117-120 RTS (Request to Send), 126 S salespeople (enterprise systems), wireless access, 186-187 Satellite TV, 66-67 satellites dishes, 66-67 geostationary, 67, 203 page_228 Page 229 geosynchronous, 67 GPS (Global Positioning Satellites), 57, 201-205 Iridium, satellite telephones, 206-207 LEO (Low Earth Orbit), 203, 206-207 MEO (Middle Earth Orbit), 203 signals, television, 61 space exploration, 208-209 subscription satellite radio, 49, 54-55 telephones, 206-207 triangulation, 204-205 Voyager 1 or Voyager 2, 209 scanners cell phones, tapping, 194-195 FRS (Family Radio Service), 58 scramblers, Satellite TV, 66 scripts, WMLScript, 148-149 second generation (2G) technologies, 199 security cell phones identities, stealing, 196-197 tapping, 194-195 monitoring systems (home wireless networks), 120 PDAs (personal digital assistants), 189 subscription satellite radio. 54-55 wireless networks, 190-191 wireless viruses, 192-193 SEND key (cell phones), 78
sending e-mail, 140-141 cell phones, 150-151 palmtops, 174 separating television signals, 62 serial ports, palmtops, 170 servers client/server model, WWW (World Wide Web), 138 e-mail, 133 IMAP (Internet Message Access Protocol), e-mail, 150-151 Internet, 133 ISPs (Internet service providers), home wireless networks, 118 POP3 (Post Office Protocol 3), e-mail, 104, 140-141, 150-151 proxy, Web clipping, 173 SMTP (Simple Mail Transfer Protocol), 104 Web, 135, 139, 173 services, pagers, 102 set-top box (Satellite TV), 67 SHF (Super High Frequency), 18 Short Message Service (SMS), 75, 85, 96-99, 192-193 SID, cell phones, 77 signal-to-noise ratio, 32 signals absorption, 32 AM (amplitude modulation), 49, 51 amplifiers, 40-43 analog, 34-35 analog-to-digital converters, 66 antennas, 33, 37-39 audio signal processors, 33 audio transmissions, 33 band reject filters, 41 bandpass filters, 41 carrier waves, 40-41 chrominance, 63 data, transmissing by waves, 32-33 demodulation, 43 digital, 33-35 digital-to-analog converters, 67 electromagnetic noise, 32 FCC (Federal Communications Commission) frequency rules, 41 filters, 41-43 FM (frequency modulation), 49, 51 gain, 33 HDTV (High Definition TV), compressing, 64-65 high-pass filters, 41 HPAs (high-power amplifiers), 41 impulse noise, 32 low-noise amplifiers, 42 low-pass filters, 41 luminance, 63 modulator/demodulator, 43 oscillators, 40 overhead, 76-77 pilot, 50 processing, 33 processors, 32 propagation loss, 32 receivers, 37-39, 42-43 satellite, television, 61 SOS wireless, 49 speakers, 43
subscription satellite radio, 55 synchronization, 63 television, 61-63 thermal noise, 32 transmitters. 37, 40-41 watt power, 53 wireless networks, 22-23 wireless systems, 21 SIM (subscriber identity module), 95, 206 Simple Mail Transfer Protocol (SMTP), 104, 141, 151, 175 sites. See Web sites page_229 Page 230 sizes antennas, 39 cells, determining, 83 SMS (Short Message Service), 75, 85, 96-99, 192-193 SMTP (Simple Mail Transfer Protocol), 104, 141, 151, 175 snoopers (cell phones), 191 software, ThinAir Mail, 175 SOS (distress signal), 49 sound, 33, 64-65 space exploration, satellites, 208-209 speakers cell phones, 86 radios, 51 receivers, 43 signals, 43 spectrums, electromagnetic, 7, 11-19, 32 standards Bluetooth, 123-125 IEEE 802.11, 123, 126-127 wireless networks, 123 stations AKC packets, 126 base, 9, 105 cell base, 73-74 CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance), 126 ESS (Extended Service Set), 127 radio, full-power, 52 RTS (Request to Send), 126 stealing identities, 196-197 stereo systems, radio broadcasts, 50 subscriber identity module (SIM), 95, 206 subscription satellite radio, 49, 54-55 Super High Frequency (SHF), 18 synchronization signals, 63 systems analog or digital (cell phones), 90-91 cable, television channels, 61-63 encoding, pagers, 102-103 enterprise, wireless access, 186-187 PCS (Personal Communications Service) systems (cell phones), 92-93 RF (radio frequency), 93 wireless, signals, 21 T tags, WML (Wireless Markup Language), 146 tapping cell phones, 194-195 TCP/IP (Transmission Control Protocol/Internet Protocol), 133 checksum, 137
e-mail, 140-141 packets, 136-137 TDMA (Time Division Multiple Access), 85, 94-95 technologies 1G (first generation), 199 2G (second generation), 199 3G (third generation), 199-201 compression, cell phones, 91 wireless, 7, 21 Telefonica cell phone service, viruses, 192-193 telephones (traditional). See also cell phones cell phones, comparing, 7 circuit-switched networks, 133 PSTN (public switched telephone networks), 73 satellite telephones, 206-207 television, 11 analog, 65 broadcasts, 62-63 cable systems, 61 cameras, colors, 62 cathode-ray tubes, 61 channels, cable systems, 63 chrominance signals, 63 colors, 61 digital, 61 downlinks, 67 DTV (Digital TV), 64-65 geostationary satellites, 67 geosynchronous satellites, 67 global village, 61 HDTV (High Definition TV), 61, 64-65 images, moving, 62 luminance signals, 63 resolution, 64-65 satellite dishes, 66-67 satellite signals, 61 Satellite TV, 66-67 signals, 61-63 sound, 64-65 synchronization signals, 63 television cameras, colors, 62 uplinks, 67 Vestigial Sideband, 63 Zworykin, Vladimir Kosma, 61 terahertz (THz), 13-14 terminals (e-mail), 121 Tesla, Nikola, 51 text to speech (TTS), 156-157 Thalia Products Web site, 117 thermal noice, 32 ThinAir Mail, 175 third generation. See 3G THz (terahertz), 13-14 Time Division Multiple Access (TDMA), 85, 94-95 tone alerts (pagers), 100 towers (cell phones), 73 toys, remote-controlled, 10 Page 231 transceivers
page_230
palmtops, 170 walkie-talkies, 57 Transmission Control Protocol/Internet Protocol. See TCP/IP transmissions AM (amplitude modulation), ionosphere, 27 analog, 34-35 audio, 33 data, 32-35 digital data, 7 processing, 33 satellite signals, 61 wireless, 7 transmitters, 9, 23, 37, 40-41, 103 transponders (Satellite TV), 67 triangulation, GPS (global positioning satellites), 204-205 TTS (text to speech), 156-157 tubes, cathode-ray, 61 tuners (radio), Internet connected, 121 TV. See television two-way pagers, 99, 104-105 U UART (Universal Asynchronous Receiver and Transmitter), 167 data, beaming, 176-177 palmtops, 170 UHF (Ultra High Frequency), 18, 58 ultraviolet rays, 17 uniform resource locators (URLs), 138-139 Universal Asynchronous Receiver and Transmitter. See UART uplinks (Satellite TV), 67 URLs (uniform resource locators), 138-139 USB ports home wireless networks, 119 palmtops, 170 V vandals, wireless networks, 191 Very High Frequency (VHF), 18 Very Low Frequency (VLF), 18 Vestigial Sideband, 63 VHF (Very High Frequency), 18 views (cutaway) cell phones, 86-87 pagers, 100-101 villages (global), television, 61 virtual machines, WMLScript, 148 Virtual Private Network (VPN), 111-113 viruses, 190-193 visible light, 13, 17 VLF (Very Low Frequency), 18 voice, ASR (automated speech recognition), 156-157 Voyager 1 or Voyager 2, 209 VPN (Virtual Private Network), 111-113 VXML (Voice eXtensible Markup Language), 153, 156-157 W W-CDMA (Wideband Code Division Multiple Access), 200 walkie-talkies, 11, 57-59 WAP (Wireless Access Protocol) gateways, 145, 149 mCommerce (Mobile Commerce), 183 Web pages, 144-145 watt power, radio station licenses, 53
waves absorption, 31 analog, 25 carrier, 22, 25-27, 40-41 data, transmitting, 32-33 demodulators, 7 electromagnetic, 11-15 information, piggybacking, 7 lengths, 13-15 man-made, 13 microwaves, 17 modulators, 7 natural, 13 radio frequencies, 13 Hertz, Heinrich, 17 RF (radio frequency) analog and digital data, 31 modulation, 8 networks, 21 Vestigial Sideband, 63 Web browsers, 133, 138-139, 146-148, 160 Web clipping, 169, 172-173 Web designers, 153 Web pages, 144-147 Web servers, 135, 139 palmtops, 173 Web pages, 145 WMLScript, 149 Web sites i-mode, 161 Internet appliances, 117 Thalia Products, 117 XML (eXtensible Markup Language), 154-155 Webcams, 120
page_231