Local loop is a circuit line from a subscriber’s phone to the local central office (LCO). But the implementation of local loop of wires is risky for the operators, especially in rural and remote areas due to less number of users and increased cost of installation. Hence, the solution for it is the usage of wireless local loop (WLL) which uses wireless links rather than copper wires to connect subscribers to the local central office.
It is Public Switched Telephone Network which is a circuit switched network. It is a collection of world’s interconnected circuit switched telephone networks.
- Switch Function:
Switch Function switches the PSTN among various WANUs.
It is short for Wireless Access Network Unit. It is present at the local exchange office. All local WASUs are connected to it. Its functions includes: Authentication, Operation & maintenance, Routing, Transceiving voice and data. It consists of following sub-components:
- Transceiver: It transmits/receives data.
- WLL Controller: It controls the wireless local loop component with WASU.
- AM: It is short for Access Manager. It is responsible for authentication.
- HLR: It is short for Home Location Register. It stores the details of all local WASUs.
It is short for Wireless Access Subscriber Units. It is present at the house of the subscriber. It connects the subscriber to WANU and the power supply for it is provided locally.
Advantages of WLL:
- It eliminates the first mile or last mile construction of the network connection.
- Low cost due to no use of conventional copper wires.
- Much more secure due to digital encryption techniques used in wireless communication.
- Highly scalable as it doesn’t require the installation of more wires for scaling it.
Features of WLL:
- Internet connection via modem
- Data service
- Voice service
- Fax service
- Collision Avoidance in wireless networks
- Modes of Wireless Connectivity
- What is Local Host?
- Traditional wireless mobile communication
- Bridges (local Internetworking device)
- Types of Wireless and Mobile Device Attacks
- Wireless Application Protocol
- Local Broadcast and Loopback Address
- Securing wireless and mobile devices
- Data Concealment Methods
- Difference between 4G and 5G
- Cyber Security in Context to Organisations
- What are Seedboxes?
- Protection of Servers
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.