Please use this identifier to cite or link to this item:
Title: Comparative study of wireless protocol in security systems
Researcher: Jangra, Om Parkash
Guide(s): Bhargava, Ruchira
Keywords: Computer science
Wireless protocol
Security systems
Upload Date: 12-Dec-2013
University: Shri Jagdishprasad Jhabarmal Tibarewala University
Completed Date: 27/06/2012
Abstract: Wireless networks represent a rapidly emerging area of growth and importance for providing ubiquitous networking connections. The common technologies can be classified into different categories according to the range of the service area. On a world - Wide scale, telecommunication companies have been making significant progress in carrying voice and data traffic over their cellular networks; furthermore, the next generation infrastructure, under development all over the world, aims to provide higher bandwidth and better quality for multimedia traffic. In a metropolitan area, Wi MAX (IEEE 802.16) can provide users with high-speed broadband access to the Internet. In a local area, WiFi (IEEE 802.11) enables users to establish wireless connections within a corporate or campus building. Moreover, in a personal area (often less than 10 meters); bluetooth (IEEE 802.15) can provide low-cost and short-range connectivity for portable devices. newlineBluetooth (over IEEE 802.15.1), ultra-wideband (UWB, over IEEE 802.15.3), ZigBee (over IEEE 802.15.4), and Wi-Fi (over IEEE 802.11) are four protocol standards for short-range wireless communications with low power consumption. From an application point of view, Bluetooth is intended for a cordless mouse, keyboard, and hands-free headset, UWB is oriented to high-bandwidth multimedia links, ZigBee is designed for reliable wirelessly networked monitoring and control networks, while Wi-Fi is directed at computer-to-computer connections as an extension or substitution of cabled networks. In this thesis, we provide a study of these popular wireless communication standards, evaluating their main features and behaviors in terms of various metrics, including the transmission time, data coding efficiency, complexity, and power consumption. It is believed that the comparison presented in this study would benefit application engineers in selecting an appropriate protocol.
Pagination: 125p.
Appears in Departments:Faculty of Computer Science & Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File10.8 kBAdobe PDFView/Open
02_declaration.pdf11.81 kBAdobe PDFView/Open
03_certificate.pdf12.36 kBAdobe PDFView/Open
04_aknowledgement.pdf17.21 kBAdobe PDFView/Open
05_contents.pdf15.41 kBAdobe PDFView/Open
06_list of tables.pdf3.86 kBAdobe PDFView/Open
07_list of figures.pdf4.64 kBAdobe PDFView/Open
08_abbreviations.pdf7.05 kBAdobe PDFView/Open
09_abstract.pdf6.72 kBAdobe PDFView/Open
10_chapter 1.pdf183.81 kBAdobe PDFView/Open
11_chapter 2.pdf57.87 kBAdobe PDFView/Open
12_chapter 3.pdf179.87 kBAdobe PDFView/Open
13_chapter 4.pdf219.63 kBAdobe PDFView/Open
14_chapter 5.pdf116.24 kBAdobe PDFView/Open
15_chapter 6.pdf53.01 kBAdobe PDFView/Open
16_bibliography.pdf70.48 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.