Unit 1 Ad Hoc Wireless Network Notes
Unit 1 Ad Hoc Wireless Network Notes
UNIT- 1
OR
An ad hoc network is a temporary type of Local Area Network (LAN). If you set up an ad
hoc network permanently, it becomes a LAN. Multiple devices can use an ad hoc network at
the same time, but this might cause a lull in performance. With an ad hoc network, several
devices can share the host device's internet access.
A wireless ad hoc network (WANET) is a type of local area network (LAN) that is
built spontaneously to enable two or more wireless devices to be connected to each
other without requiring typical network infrastructure equipment, such as a wireless
router or access point. When Wi-Fi networks are in ad hoc mode, each device in the
network forwards data that is not intended for itself to the other devices.
Because the devices in the ad hoc network can access each other's resources
directly through a basic peer-to-peer (P2P) wireless connection, central servers are
unnecessary for functions such as file sharing or printing. In a WANET, a collection
of devices, or nodes, is responsible for network operations, such as routing, security,
addressing and key management.
Devices in the ad hoc network require a wireless network adapter or chip, and they
need to be able to act as a wireless router when connected. When setting up a
wireless ad hoc network, each wireless adapter must be configured for ad hoc mode
instead of infrastructure mode. All wireless adapters need to use the same service
set identifier (SSID) and wireless frequency channel number.
Instead of relying on a wireless base station to coordinate the flow of messages to
each node in the network, the individual nodes in ad hoc networks forward packets
to and from each other. Makeshift by nature, ad hoc wireless networks are useful
where there is not a wireless structure built -- for example, if there aren't any access
points or routers within range and cabling cannot be extended to reach the location
where additional wireless communication is needed.
However, not all Wi-Fi networks are the same. In fact, Wi-Fi access points work in
either ad hoc or infrastructure mode. Typically, Wi-Fi networks in infrastructure mode
are created and managed using equipment such as Wi-Fi routers, wireless access
points (WAPs) and wireless controllers. Ad hoc networks are also often short-lived
networks created by a laptop or other device. The use of more sophisticated network
protocols and network services found on infrastructure-based wireless networks
usually are not suitable for ad hoc networks.
An ad hoc network is one that is spontaneously formed when devices connect and
communicate with each other. The term ad hoc is a Latin word that literally means
"for this," implying improvised or impromptu.
Ad hoc networks are mostly wireless local area networks (LANs). The devices
communicate with each other directly instead of relying on a base station or access
points as in wireless LANs for data transfer co-ordination. Each device participates in
routing activity, by determining the route using the routing algorithm and forwarding
data to other devices via this route.
Classifications of Ad Hoc Networks
Ad hoc networks can be classified into several types depending upon the nature of
their applications. The most prominent ad hoc networks that are commonly
incorporated are illustrated in the diagram below −
SPANs. Smartphone ad hoc networks employ existing hardware, such as Wi-Fi and
Bluetooth, and software protocols built into a smartphone operating system (OS) to
create P2P networks without relying on cellular carrier networks, wireless access
points or other traditional network infrastructure equipment. Different from traditional
hub-and-spoke networks, such as Wi-Fi Direct, SPANs support multi-hop relays.
Multi-hop relay is the process of sending traffic from device A to device C using
intermediary device B. Therefore, device A and C do not need to have a direct P2P
connection established for traffic to reach its destination. And because SPANs are
fully dynamic in nature, there is no notion of a group leader in this type of application
and, thus, peers can join or leave without harming the network.
Vehicular ad hoc network. This network type involves devices in vehicles that are
used for communicating between them and roadside equipment. An example is the
in-vehicle safety and security system, OnStar.
Other types of ad hoc wireless networks include wireless sensor networks, ad hoc
smart home lighting, ad hoc streetlight networks, ad hoc networks of robots, disaster
rescue ad hoc networks and hospital ad hoc networks. Wireless ad hoc networks
also have a number of military applications, such as Army tactical MANETs, Air
Force UAV (unmanned aerial vehicle) ad hoc networks and Navy ad hoc networks.
Advantages of a WANET
Ad hoc mode can be easier to set up than infrastructure mode when just connecting
two devices without requiring a centralized access point. For example, if a user has
two laptops and is in a hotel room without Wi-Fi, they can be connected directly in ad
hoc mode to create a temporary Wi-Fi network without a router. The Wi-Fi Direct
standard -- a specification that allows devices certified for Wi-Fi Direct to exchange
data without an internet connection or a wireless router -- also builds on ad hoc mode
and enables devices to communicate directly over Wi-Fi signals.
Ad hoc networks are easy to configure and offer an effective way to communicate
with devices nearby when time is of the essence and running cabling is not
feasible.
Ad hoc networks are often secured to protect against attacks, as their temporary,
often impromptu qualities can make them vulnerable to security threats.
An ad hoc network linking a small number of devices might be a more practical
choice compared to a traditional infrastructure-based network that can connect
many more devices.
Disadvantages of ad hoc networks
One major drawback of wireless ad hoc networking is that some Wi-Fi-enabled
technology, including certain Android devices, wireless printers and custom IoT
sensors, don't support ad hoc mode because of its limitations and will only connect to
networks in infrastructure mode by default. In some cases, third-party software can be
installed on endpoint devices to enable ad hoc communications.
Infrastructure mode is a better option than ad hoc mode for setting up a larger and
more permanent network that can support far more endpoints. Wireless routers that
serve as access points typically have higher-power wireless radios and antennas that
provide coverage of a wider area. Ad hoc networks often suffer from poor wireless
communication range issues, as antennas built into endpoints were not designed to be
as powerful as purpose-built WAPs.
Ad hoc networks also do not scale well. As the number of devices in an ad hoc
network increases, it becomes harder to manage because there is not a central device
through which all traffic flows. When several devices are connected to the ad hoc
network, more wireless interference will occur, as each device must establish a direct
P2P connection to each of the other devices, instead of going through a single access
point in a hub-and-spoke architecture. When a device is out of range of a device to
which it needs to connect, it will pass the data through other devices on the way; this
is slower than passing it through a single access point.
Wireless ad hoc networks cannot bridge wired LANs or to the internet without
installing a special-purpose network gateway.
Devices can only use the internet if one of them is connected to and sharing it with
the others. When internet sharing is enabled, the client performing this function
may face performance problems, especially if there are many interconnected
devices.
Ad hoc mode requires the use of more endpoint system resources, as the physical
network layout changes when devices are moved around; in contrast, an access
point in infrastructure mode typically remains stationary from an end-device
perspective.
Types of Paths
The extent to which these factors affect the transmission depends upon the environmental
conditions and the mobility of the transmitter and receiver. The path followed by the signals
to get to the receiver, are two types, such as −
Direct-path
The transmitted signal, when reaches the receiver directly, can be termed as
a directpath and the components presents that are present in the signal are called
as directpath components.
Multi-path
The transmitted signal when reaches the receiver, through different directions undergoing
different phenomenon, such a path is termed as multi-path and the components of the
transmitted signal are called as multi-path components.
They are reflected, diffracted and scattered by the environment, and arrive at the receiver
shifted in amplitude, frequency and phase with respect to the direct path component.
Characteristics of Wireless Channel
The most important characteristics of wireless channel are −
Path loss
Fading
Interference
Doppler shift
In the following sections, we will discuss these channel characteristics one by one.
Path Loss
Path loss can be expressed as the ratio of the power of the transmitted signal to the power of
the same signal received by the receiver, on a given path. It is a function of the propagation
distance.
Estimation of path loss is very important for designing and deploying wireless
communication networks
Path loss is dependent on a number of factors such as the radio frequency used and
the nature of the terrain.
The free space propagation model is the simplest path loss model in which there is a
direct-path signal between the transmitter and the receiver, with no atmosphere
attenuation or multipath components.
In this model, the relationship between the transmitted power Pt and the received power Pr is
given by
$$P_{r} = P_{t}G_{t}G_{r}(\frac{\lambda}{4\Pi d})^2$$
Where
Gt is the transmitter antenna gain
Gr is the receiver antenna gain
d is the distance between the transmitter and receiver
λ is the wavelength of the signal
Two-way model also called as two path models is widely used path loss model. The free
space model described above assumes that there is only one single path from the transmitter
to the receiver.
In reality, the signal reaches the receiver through multiple paths. The two path model tries to
capture this phenomenon. The model assumes that the signal reaches the receiver through
two paths, one a line-of-sight and the other the path through which the reflected wave is
received.
According to the two-path model, the received power is given by
$$P_{r} = P_{t}G_{t}G_{r}(\frac{h_{t}h_{r}}{d^2})^2$$
Where
pt is the transmitted power
Gt represent the antenna gain at the transmitter
Gr represent the antenna gain at the receiver
d is the distance between the transmitter and receiver
ht is the height of the transmitter
hr are the height of the receiver
Fading
Fading refers to the fluctuations in signal strength when received at the receiver. Fading can
be classified in to two types −
Reflection
Diffraction
Scattering
The multiple signal paths may sometimes add constructively or sometimes destructively at
the receiver causing a variation in the power level of the received signal. The received single
envelope of a fast fading signal is said to follow a Rayleigh distribution to see if there is no
line-of-sight path between the transmitter and the receiver.
Slow Fading
The name Slow Fading itself implies that the signal fades away slowly. The features of slow
fading are as given below.
Slow fading occurs when objects that partially absorb the transmission lie between
the transmitter and receiver.
Slow fading is so called because the duration of the fade may last for multiple
seconds or minutes.
Slow fading may occur when the receiver is inside a building and the radio wave
must pass through the walls of a building, or when the receiver is temporarily
shielded from the transmitter by a building. The obstructing objects cause a random
variation in the received signal power.
Slow fading may cause the received signal power to vary, though the distance
between the transmitter and receiver remains the same.
Slow fading is also referred to as shadow fading since the objects that cause the fade,
which may be large buildings or other structures, block the direct transmission path
from the transmitter to the receiver.
Interference
Wireless transmissions have to counter interference from a wide variety of sources. Two
main forms of interference are −
Adjacent channel interference and
Co-channel interference.
In Adjacent channel interference case, signals in nearby frequencies have components
outside their allocated ranges, and these components may interfere with on-going
transmission in the adjacent frequencies. It can be avoided by carefully introducing guard
bands between the allocated frequency ranges.
Co-channel interference, sometimes also referred to as narrow band interference, is due
to other nearby systems using the same transmission frequency.
Inter-symbol interference is another type of interference, where distortion in the received
signal is caused by the temporal spreading and the consequent overlapping of individual
pulses in the signal.
Adaptive equalization is a commonly used technique for combating inter symbol
interference. It involves gathering the dispersed symbol energy into its original time interval.
Complex digital processing algorithms are used in the equalization process.
Modulation techniques
What is Modulation?
Modulation is nothing but, a carrier signal that varies in accordance with the message signal.
Modulation technique is used to change the signal characteristics. Basically, the modulation
is of following two types:
Analog Modulation
Digital Modulation
Amplitude modulation (AM): The height (i.e., the strength or intensity) of the signal
carrier is varied to represent the data being added to the signal.
Frequency modulation (FM): The frequency of the carrier waveform is varied to reflect
the frequency of the data.
Phase modulation (PM): The phase of the carrier waveform is varied to reflect changes
in the frequency of the data. In PM, the frequency is unchanged while the phase is
changed relative to the base carrier frequency. It is similar to FM.
Pulse-code modulation: An analog signal is sampled to derive a data stream that is used
to modulate a digital carrier signal.
Radio and television broadcasts and satellite radio typically use AM or FM. Most short-range
two-way radios -- up to tens of miles -- use FM, while longer-range two-way radios -- up to
hundreds or thousands of miles -- typically employ a mode known as single sideband (SSB).
More complex forms of modulation include phase-shift keying (PSK) and QAM. Modern
Wi-Fi modulation uses a combination of PSK and QAM64 or QAM256 to encode multiple
bits of information into each transmitted symbol.
PSK conveys data by modulating the phase of the carrier signal by varying the sine and
cosine inputs at precise times. PSK is used widely for wireless LANs, RFID and Bluetooth
communications. The demodulator determines the phase of the signal received and translates
it back to the symbol it represents.
A device that performs both modulation and demodulation is called a modem -- a name
created by combining the first letters of MOdulator and DEModulator.
Sometimes a carrier signal can carry more than one modulating information
stream. Multiplexing combines the streams onto a single carrier -- e.g., by encoding a fixed-
duration segment of one, then of the next, for example, cycling through all the channels
before returning to the first -- a process called time-division multiplexing (TDM). Another
form is frequency-division multiplexing (FDM), where multiple carriers of different
frequencies are used on the same medium.
Analog Modulation
In analog modulation, analog signal (sinusoidal signal) is used as a carrier signal that
modulates the message signal or data signal. The general function Sinusoidal wave’s is
shown in the figure below, in which, three parameters can be altered to get modulation – they
are amplitude, frequency and phase; so, the types of analog modulation are:
Amplitude Modulation
Amplitude modulation was developed in the beginning of the 20th century. It was the earliest
modulation technique used to transmit voice by radio. This type of modulation technique is
used in electronic communication. In this modulation, the amplitude of the carrier signal
varies in accordance with the message signal, and other factors like phase and frequency
remain constant.
The modulated signal is shown in the below figure, and its spectrum consists of the lower
frequency band, upper frequency band and carrier frequency components. This type of
modulation requires more power and greater bandwidth; filtering is very difficult. Amplitude
modulation is used in computer modems, VHF aircraft radio, and in portable two-way radio
Frequency Modulation
In this type of modulation, the frequency of the carrier signal varies in accordance with the
message signal, and other parameters like amplitude and phase remain constant. Frequency
modulation is used in different applications like radar, radio and telemetry, seismic
prospecting and monitoring new borns for seizures via EEG, etc.
This type of modulation is commonly used for broadcasting music and speech, magnetic tape
recording systems, two way radio systems and video transmission systems. When noise
occurs naturally in radio systems, frequency modulation with sufficient bandwidth provides
an advantage in cancelling the noise.
Phase Modulation
In this type of modulation, the phase of the carrier signal varies in accordance with the
message signal. When the phase of the signal is changed, then it affects the frequency. So, for
this reason, this modulation is also comes under the frequency modulation.
Generally, phase modulation is used for transmitting waves. It is an essential part of many
digital transmission coding schemes that underlie a wide range of technologies like GSM,
WiFi, and satellite television. This type of modulation is used for signal generation in al
synthesizers, such as the Yamaha DX7 to implement FM synthesis.
Therefore, Analog modulation includes AM, FM and PM and these are more sensitive to
noise. If noise enters into a system, it persists and gets carried up to the end receiver. So, this
drawback can be overcome by the digital modulation technique.
Digital Modulation
For a better quality and efficient communication, digital modulation technique is employed.
The main advantages of the digital modulation over analog modulation include available
bandwidth , high noise immunity and permissible power. In digital modulation, a message
signal is converted from analog to digital message, and then modulated by using a carrier
wave.
Digital Modulation
The carrier wave is switched on and off to create pulses such that the signal is modulated.
Similar to the analog, in this system, the type of the digital modulation is decided by the
variation of the carrier wave parameters like amplitude, phase and frequency.
The most important digital modulation techniques are based on keying such as
Amplitude Shift Keying, Frequency Shift Keying, Phase Shift Keying, Differential Phase
Shift Keying, Quadrature Phase Shift Keying, Minimum Shift Keying, Gaussian Minimum
Shift Keying, Orthogonal Frequency Division Multiplexing, etc., as shown in the figure.
Narrowband Systems
Systems operating with channels substantially narrower than the coherence
bandwidth are called as Narrow band systems. Narrow band TDMA allows users to
use the same channel but allocates a unique time slot to each user on the channel,
thus separating a small number of users in time on a single channel.
Wideband Systems
In wideband systems, the transmission bandwidth of a single channel is much larger
than the coherence bandwidth of the channel. Thus, multipath fading doesn’t greatly
affect the received signal within a wideband channel, and frequency selective fades
occur only in a small fraction of the signal bandwidth.
FDMA allots a different sub-band of frequency to each different user to access the
network.
If FDMA is not in use, the channel is left idle instead of allotting to the other users.
FDMA is implemented in Narrowband systems and it is less complex than TDMA.
Tight filtering is done here to reduce adjacent channel interference.
The base station BS and mobile station MS, transmit and receive simultaneously and
continuously in FDMA.
TDMA shares a single carrier frequency with several users where each users makes
use of non-overlapping time slots.
Data transmission in TDMA is not continuous, but occurs in bursts. Hence handsoff
process is simpler.
TDMA uses different time slots for transmission and reception thus duplexers are not
required.
TDMA has an advantage that is possible to allocate different numbers of time slots
per frame to different users.
Bandwidth can be supplied on demand to different users by concatenating or
reassigning time slot based on priority.
Code Division Multiple Access (CDMA)
Code division multiple access technique is an example of multiple access where
several transmitters use a single channel to send information simultaneously. Its
features are as follows.
In CDMA every user uses the full available spectrum instead of getting allotted by
separate frequency.
CDMA is much recommended for voice and data communications.
While multiple codes occupy the same channel in CDMA, the users having same
code can communicate with each other.
CDMA offers more air-space capacity than TDMA.
The hands-off between base stations is very well handled by CDMA.
All users can communicate at the same time using the same channel.
SDMA is completely free from interference.
A single satellite can communicate with more satellites receivers of the same
frequency.
The directional spot-beam antennas are used and hence the base station in SDMA,
can track a moving user.
Controls the radiated energy for each user in space.
Error Control
Network is responsible for transmission of data from one device to another device. The end to
end transfer of data from a transmitting application to a receiving application involves many
steps, each subject to error. With the error control process, we can be confident that the
transmitted and received data are identical. Data can be corrupted during transmission. For
reliable communication, error must be detected and corrected.
Error control is the process of detecting and correcting both the bit level and packet level
errors.
Types of Errors
Single Bit Error
The term single bit error means that only one bit of the data unit was changed from 1 to 0 and
0 to 1.
Burst Error
In term burst error means that two or more bits in the data unit were changed. Burst error is
also called packet level error, where errors like packet loss, duplication, reordering.
Error Detection
Error detection is the process of detecting the error during the transmission between the
sender and the receiver.
Types of error detection
Parity checking
Cyclic Redundancy Check (CRC)
Checksum
Redundancy
Redundancy allows a receiver to check whether received data was corrupted during
transmission. So that he can request a retransmission. Redundancy is the concept of using
extra bits for use in error detection. As shown in the figure sender adds redundant bits (R) to
the data unit and sends to receiver, when receiver gets bits stream and passes through
checking function. If no error then data portion of the data unit is accepted and redundant bits
are discarded. otherwise asks for the retransmission.
Parity checking
Parity adds a single bit that indicates whether the number of 1 bits in the preceding data is
even or odd. If a single bit is changed in transmission, the message will change parity and the
error can be detected at this point. Parity checking is not very robust, since if the number of
bits changed is even, the check bit will be invalid and the error will not be detected.
Data unit is composite by number of 0s, which is one less than the divisor.
Then it is divided by the predefined divisor using binary division technique. The
remainder is called CRC. CRC is appended to the data unit and is sent to the receiver.
Receiver follows following steps.
When data unit arrives followed by the CRC it is divided by the same divisor which was
used to find the CRC (remainder).
If the remainder result in this division process is zero then it is error free data, otherwise
it is corrupted.
Diagram shows how to CRC process works.
[a] sender CRC generator [b] receiver CRC checker
Checksum
Check sum is the third method for error detection mechanism. Checksum is used in the upper
layers, while Parity checking and CRC is used in the physical layer. Checksum is also on the
concept of redundancy.
In the checksum mechanism two operations to perform.
Checksum generator
Sender uses checksum generator mechanism. First data unit is divided into equal segments of
n bits. Then all segments are added together using 1’s complement. Then it is complemented
ones again. It becomes Checksum and sends along with data unit.
Exp:
If 16 bits 10001010 00100011 is to be sent to receiver.
So the checksum is added to the data unit and sends to the receiver. Final data unit is
10001010 00100011 01010000.
Checksum checker
Receiver receives the data unit and divides into segments of equal size of segments. All
segments are added using 1’s complement. The result is complemented once again. If the result
is zero, data will be accepted, otherwise rejected.
Exp:
The final data is nonzero then it is rejected.
Error Correction
This type of error control allows a receiver to reconstruct the original information when it has
been corrupted during transmission.
Hamming Code
It is a single bit error correction method using redundant bits.
In this method redundant bits are included with the original data. Now, the bits are arranged such
that different incorrect bits produce different error results and the corrupt bit can be identified.
Once the bit is identified, the receiver can reverse its value and correct the error. Hamming code
can be applied to any length of data unit and uses the relationships between the data and the
redundancy bits.
Algorithm:
If the error occurred at bit 7 which is changed from 1 to 0, then receiver recalculates the same
sets of bits used by the sender. By this we can identify the perfect location of error occurrence.
once the bit is identified the receiver can reverse its value and correct the error.
NIC is a device that helps the computer to communicate with another device. The network
interface card contains the hardware addresses, the data-link layer protocol use this address to
identify the system on the network so that it transfers the data to the correct destination.
There are two types of NIC: wireless NIC and wired NIC.
o Wireless NIC: All the modern laptops use the wireless NIC. In Wireless NIC, a
connection is made using the antenna that employs the radio wave technology.
o Wired NIC: Cables use the wired NIC to transfer the data over the medium.
Hub
Hub is a central device that splits the network connection into multiple devices. When
computer requests for information from a computer, it sends the request to the Hub. Hub
distributes this request to all the interconnected computers.
Switches
Switch is a networking device that groups all the devices over the network to transfer the data
to another device. A switch is better than Hub as it does not broadcast the message over the
network, i.e., it sends the message to the device for which it belongs to. Therefore, we can
say that switch sends the message directly from source to the destination.
18.9M4C++
Cable is a transmission media that transmits the communication signals. There are three
types of cables:
o Twisted pair cable: It is a high-speed cable that transmits the data over 1Gbps or
more.
o Coaxial cable: Coaxial cable resembles like a TV installation cable. Coaxial cable is
more expensive than twisted pair cable, but it provides the high data transmission
speed.
o Fibre optic cable: Fibre optic cable is a high-speed cable that transmits the data using
light beams. It provides high data transmission speed as compared to other cables. It is
more expensive as compared to other cables, so it is installed at the government level.
Router
Router is a device that connects the LAN to the internet. The router is mainly used to connect
the distinct networks or connect the internet to multiple computers.
Modem
Modem connects the computer to the internet over the existing telephone line. A modem is
not integrated with the computer motherboard. A modem is a separate part on the PC slot
found on the motherboard.
Uses Of Computer Network
o Resource sharing: Resource sharing is the sharing of resources such as programs,
printers, and data among the users on the network without the requirement of the
physical location of the resource and user.
o Server-Client model: Computer networking is used in the server-client model. A
server is a central computer used to store the information and maintained by the
system administrator. Clients are the machines used to access the information stored
in the server remotely.
o Communication medium: Computer network behaves as a communication medium
among the users. For example, a company contains more than one computer has an
email system which the employees use for daily communication.
o E-commerce: Computer network is also important in businesses. We can do the
business over the internet. For example, amazon.com is doing their business over the
internet, i.e., they are doing their business over the internet.
IEEE 802 is a family of Institute of Electrical and Electronics Engineers (IEEE) standards
for local area networks (LAN), personal area network (PAN), and metropolitan area
networks (MAN). The IEEE 802 LAN/MAN Standards Committee (LMSC) maintains these
standards. The IEEE 802 family of standards has twelve members, numbered 802.1 through
802.12, with a focus group of the LMSC devoted to each.
The IEEE 802 standards are restricted to computer networks carrying variable-size packets,
unlike cell relay networks, for example, in which data is transmitted in short, uniformly sized
units called cells. Isochronous signal networks, in which data is transmitted as a steady
stream of octets, or groups of octets, at regular time intervals, are also outside the scope of the
IEEE 802 standards.
The number 802 has no significance: it was simply the next number in the sequence that the
IEEE used for standards projects.[1]
The services and protocols specified in IEEE 802 map to the lower two layers (data link and
physical) of the seven-layer Open Systems Interconnection (OSI) networking reference
model. IEEE 802 divides the OSI data link layer into two sub-layers: logical link
control (LLC) and medium access control (MAC), as follows:
Data-link Layer
Data-link Layer is the protocol layer that transfers data between adjacent network nodes in
a Wide Area Network (WAN) or between nodes on the same Local Area Network (LAN)
segment.
Several Network Protocols defines Data-link Layer as part of the Communication
Layers including:
OSI-Model
IEEE 802
Data-link Layer provides the functional and procedural means to transfer data between
network entities and might provide the means to detect and possibly correct errors that may
occur in the Physical Layer.
Data-link Layer is concerned with local delivery of frames between devices on the
same LAN. Data-link frames, as these Protocol Data Units are called, do not cross the
boundaries of a Local Area Network.
Inter-network routing and global addressing are higher-layer functions, allowing data-
link protocols to focus on local delivery, addressing, and media arbitration. This way, the
Data-link Layer is analogous to a neighborhood traffic cop; it endeavors to arbitrate between
parties contending for access to a medium, without concern for their ultimate destination.
When devices attempt to use a medium simultaneously, frame collisions occur. Data-
link protocols specify how devices detect and recover from such collisions, and may provide
mechanisms to reduce or prevent them.
IEEE 802
IEEE 802 defines two sub-layers within the Data-link Layer as:
Media Access Control sublayer that determines who is allowed to access the media at any
one time (e.g. CSMA/CD).
Media Access Control, generally, has two forms of media access control:
Physical Layer
o Communication speed
o File sharing
o Back up and Roll back is easy
o Software and Hardware sharing
o Security
o Scalability
o Reliability
Communication speed
Network provides us to communicate over the network in a fast and efficient manner. For
example, we can do video conferencing, email messaging, etc. over the internet. Therefore,
the computer network is a great way to share our knowledge and ideas.
File sharing
File sharing is one of the major advantage of the computer network. Computer network
provides us to share the files with each other.
Since the files are stored in the main server which is centrally located. Therefore, it is easy to
take the back up from the main server.
12.8M
254
History of Java
We can install the applications on the main server, therefore, the user can access the
applications centrally. So, we do not need to install the software on every machine. Similarly,
hardware can also be shared.
Security
Network allows the security by ensuring that the user has the right to access the certain files
and applications.
Scalability
Scalability means that we can add the new components on the network. Network must be
scalable so that we can extend the network by adding new devices. But, it decreases the speed
of the connection and data of the transmission speed also decreases, this increases the
chances of error occurring. This problem can be overcome by using the routing or switching
devices.
Reliability
Computer network can use the alternative source for the data communication in case of any
hardware failure.
Computer Network Architecture
Computer Network Architecture is defined as the physical and logical design of the software,
hardware, protocols, and media of the transmission of data. Simply we can say that how
computers are organized and how tasks are allocated to the computer.
o Peer-To-Peer network
o Client/Server network
Peer-To-Peer network
o Peer-To-Peer network is a network in which all the computers are linked together
with equal privilege and responsibilities for processing the data.
o Peer-To-Peer network is useful for small environments, usually up to 10 computers.
o Peer-To-Peer network has no dedicated server.
o Special permissions are assigned to each computer for sharing the resources, but this
can lead to a problem if the computer with the resource is down.
Advantages Of Peer-To-Peer Network:
o In the case of Peer-To-Peer network, it does not contain the centralized system .
Therefore, it cannot back up the data as the data is different in different locations.
o It has a security issue as the device is managed itself.
Client/Server Network
o Client/Server network is a network model designed for the end users called clients, to
access the resources such as songs, video, etc. from a central computer known as
Server.
o The central controller is known as a server while all other computers in the network
are called clients.
o A server performs all the major operations such as security and network management.
o A server is responsible for managing all the resources such as files, directories,
printer, etc.
o All the clients communicate with each other through a server. For example, if client1
wants to send some data to client 2, then it first sends the request to the server for the
permission. The server sends the response to the client 1 to initiate its communication
with the client 2.
A computer network is a group of computers linked to each other that enables the computer
to communicate with another computer and share their resources, data, and applications.
A computer network can be categorized by their size. A computer network is mainly of four
types:
o LAN(Local Area Network)
o PAN(Personal Area Network)
o MAN(Metropolitan Area Network)
o WAN(Wide Area Network)
Wireless Personal Area Network: Wireless Personal Area Network is developed by simply
using wireless technologies such as WiFi, Bluetooth. It is a low range network.
20.1M
383
Wired Personal Area Network: Wired Personal Area Network is created by using the USB.
o Body Area Network: Body Area Network is a network that moves with a
person. For example, a mobile network moves with a person. Suppose a person
establishes a network connection and then creates a connection with another device to
share the information.
o Offline Network: An offline network can be created inside the home, so it is also
known as a home network. A home network is designed to integrate the devices such
as printers, computer, television but they are not connected to the internet.
o Small Home Office: It is used to connect a variety of devices to the internet and to a
corporate network using a VPN
o Security issue: A WAN network has more security issues as compared to LAN and
MAN network as all the technologies are combined together that creates the security
problem.
o Needs Firewall & antivirus software: The data is transferred on the internet which
can be changed or hacked by the hackers, so the firewall needs to be used. Some
people can inject the virus in our system so antivirus is needed to protect from such a
virus.
o High Setup cost: An installation cost of the WAN network is high as it involves the
purchasing of routers, switches.
o Troubleshooting problems: It covers a large area so fixing the problem is difficult.
Internetwork
o An internetwork is defined as two or more computer network LANs or WAN or
computer network segments are connected using devices, and they are configured by
a local addressing scheme. This process is known as internetworking.
o An interconnection between public, private, commercial, industrial, or government
computer networks can also be defined as internetworking.
o An internetworking uses the internet protocol.
o The reference model used for internetworking is Open System
Interconnection(OSI).
Types Of Internetwork:
Intranet advantages:
o Communication: It provides a cheap and easy communication. An employee of the
organization can communicate with another employee through email, chat.
o Time-saving: Information on the intranet is shared in real time, so it is time-saving.
o Collaboration: Collaboration is one of the most important advantage of the intranet.
The information is distributed among the employees of the organization and can only
be accessed by the authorized user.
o Platform independency: It is a neutral architecture as the computer can be connected
to another device with different architecture.
o Cost effective: People can see the data and documents by using the browser and
distributes the duplicate copies over the intranet. This leads to a reduction in the cost.
WLANs
In the field of computers, the wide usage of group connections have become
inevitable, which lead to the introduction of LANs (Local Area Networks). These
LANs come under the category of small scale networks within a single building or
campus.
o WANs are Wide Area Networks which cover a wider area such a city, or a limited
area greater than LAN. Wireless Personal Area Networks (PANs) are the next step
down from WLANs, covering smaller areas with low power transmission, for
networking of portable and mobile computing devices such as PCs, Personal Digital
Assistants (PDAs).
Fundamentals of WLANs
The technical issues in WLANs must be understood in order to appreciate the difference
between wired networks and wireless networks. The use of WLANs and their design goals
are then studied. The types of WLANS, their components and their basic functionalities are
also detailed.
HIPERLAN Standard
This section describes another WLAN standard, HIPERLAN standard, which is a European
standard based on radio access.
Bluetooth
This section deals with the Bluetooth standard, which enables personal devices to
communicate with each other in the absence of infrastructure.
WLAN Fundamentals
While both portable terminals and mobile terminals can move from one place to another,
portable terminals are accessed only when they are stationary.
Mobile Terminals (MTs), on the other hand, are more powerful, and can be accessed when
they are in motion. WLANs aim to support truly mobile work stations.
WLAN Uses
Wireless computer networks are capable of offering versatile functionalities. WLANs are
very flexible and can be configured in a variety of topologies based on the application. Some
possible uses of WLANs are described below.
Users would be able to surf the Internet, check e-mail, and receive Instant Messages
on the move.
In areas affected by earthquakes or other disasters, no suitable infrastructure may be
available on the site. WLANs are handy in such locations to set up networks on the
fly.
There are many historic buildings where there has been a need to set up computer
networks. In such places, wiring may not be permitted or the building design may
not be conductive to efficient wiring. WLANs are very good solutions in such places.
Design Goals
The following are some of the goals which have to be achieved while designing WLANs −
Operational simplicity − Design of wireless LANS must incorporate features to
enable a mobile user to quickly set up and access network services in a simple and
efficient manner.
Power efficient operation − The power-constrained nature of mobile computing
devices such as laptops and PDAs necessitates the important requirement of WLANs
operating with minimal power consumption. Therefore, the design of WLAN must
incorporate power-saving features and use appropriate technologies and protocols to
achieve this.
License-free operation − One of the major factors that affects the cost of wireless
access is the license fee for the spectrum in which a particular wireless access
technology operates. Low cost of access is an important aspect for popularizing a
WLAN technology. Hence the design of WLAN should consider the parts of the
frequency spectrum. For its operation which does not require an
explicit<blicensing.< p=""></blicensing.<>
Tolerance to interference − The proliferation of different wireless networking
technologies both for civilian and military applications have led to a
significant increase in the interference level across the radio spectrum.
The WLAN design should account for this and take appropriate measures by way of
selecting technologies and protocols to operate in the presence of interference.
Global Usability − The design of the WLAN, the choice of technology, and the
selection of the operating frequency spectrum should take into account the
prevailing spectrum restriction in countries across the world. This ensures the
acceptability of the technology across the world.
Security − The inherent broadcast nature of wireless medium adds to the requirement
of security features to be included in the design of WLAN technology.
Safety requirements − The design of WLAN technology should follow the safety
requirements that can be classified into the following.
o Interference to medical and other instrumentation devices.
o Increased power level of transmitters that can lead to health hazards.
A well-designed WLAN should follow the power emission restrictions that are
applicable in the given frequency spectrum.
Quality of service requirements − Quality of Service (QoS) refers to the
provisioning of designated levels of performance for multimedia traffic. The design
of WLAN should take into consideration the possibility of supporting a wide
variety of traffic, including multimedia traffic.
Compatibility with other technologies and applications − The interoperability
among different LANS is important for efficient communication between hosts
operating with different LAN technologies.
Network Architecture
Network architecture describes the types of WLANs, the components of a typical WLAN
and the services offered by a WLAN.
WLANs can be broadly classified into two types, namely Infrastructure networks and Ad
hoc LANs, based on the underlying architecture.
Infrastructure networks
Infrastructure networks contain special nodes called Access Points (APs), which are
connected via existing networks.
APs are special in the sense that they can interact with wireless nodes as well as with
the existing wired network.
The other wireless nodes, also known as Mobile stations (STAs), communicate via
APs.
The APs also act as bridges with other networks.
Ad hoc LANs
Ad hoc LANs do not need any fixed infrastructure. These networks can be set up on the fly
at any place. Nodes communicate directly with each other for forward messages through
other nodes that are directly accessible.
Bluetooth
Bluetooth wireless technology is a short range communications technology intended to
replace the cables connecting portable unit and maintaining high levels of security.
Bluetooth technology is based on Ad-hoc technology also known as Ad-hoc Pico nets,
which is a local area network with a very limited coverage.
History of Bluetooth
WLAN technology enables device connectivity to infrastructure based services through a
wireless carrier provider. The need for personal devices to communicate wirelessly with one
another without an established infrastructure has led to the emergence of Personal Area
Networks (PANs).
Ericsson's Bluetooth project in 1994 defines the standard for PANs to enable
communication between mobile phones using low power and low cost radio
interfaces.
In May 1988, Companies such as IBM, Intel, Nokia and Toshiba joined Ericsson to
form the Bluetooth Special Interest Group (SIG) whose aim was to develop a defacto
standard for PANs.
IEEE has approved a Bluetooth based standard named IEEE 802.15.1 for Wireless
Personal Area Networks (WPANs). IEEE standard covers MAC and Physical layer
applications.
Bluetooth specification details the entire protocol stack. Bluetooth employs Radio
Frequency (RF) for communication. It makes use of frequency modulation to generate
radio waves in the ISM band.
The usage of Bluetooth has widely increased for its special features.
Bluetooth offers a uniform structure for a wide range of devices to connect and
communicate with each other.
Bluetooth technology has achieved global acceptance such that any Bluetooth
enabled device, almost everywhere in the world, can be connected with Bluetooth
enabled devices.
Low power consumption of Bluetooth technology and an offered range of up to ten
meters has paved the way for several usage models.
Bluetooth offers interactive conference by establishing an adhoc network of laptops.
Bluetooth usage model includes cordless computer, intercom, cordless phone and
mobile phones.
Spectrum
Bluetooth technology operates in the unlicensed industrial, scientific and medical (ISM)
band at 2.4 to 2.485 GHZ, using a spread spectrum hopping, full-duplex signal at a nominal
rate of 1600 hops/sec. the 2.4 GHZ ISM band is available and unlicensed in most countries.
Range
Bluetooth operating range depends on the device Class 3 radios have a range of up to 1
meter or 3 feet Class 2 radios are most commonly found in mobile devices have a range of
10 meters or 30 feet Class 1 radios are used primarily in industrial use cases have a range of
100 meters or 300 feet.
Data rate
Bluetooth supports 1Mbps data rate for version 1.2 and 3Mbps data rate for Version 2.0
combined with Error Data Rate.
OR
Fundamentals of WLANs
1. HiperLAN
o HiperLAN stands for High performance LAN. While all of the previous technologies
have been designed specifically for an adhoc environment, HiperLAN is derived from
traditional LAN environments and can support multimedia data and asynchronous
data effectively at high rates (23.5 Mbps).
o A LAN extension via access points can be implemented using standard features of the
HiperLAN/1 specification. However, HiperLAN does not necessarily require any type
of access point infrastructure for its operation.
o HiperLAN was started in 1992, and standards were published in 1995. It employs the
5.15GHz and 17.1 GHz frequency bands and has a data rate of 23.5 Mbps with
coverage of 50m and mobility< 10 m/s.
o It supports a packet-oriented structure, which can be used for networks with or
without a central control (BS-MS and ad-hoc). It supports 25 audio connections at
32kbps with a maximum latency of 10 ms, one video connection of 2 Mbps with 100
ms latency, and a data rate of 13.4 Mbps.
o HiperLAN/1 is specifically designed to support adhoc computing for multimedia
systems, where there is no requirement to deploy a centralized infrastructure. It
effectively supports MPEG or other state of the art real time digital audio and video
standards.
o The HiperLAN/1 MAC is compatible with the standard MAC service interface,
enabling support for existing applications to remain unchanged.
o HiperLAN 2 has been specifically developed to have a wired infrastructure, providing
short-range wireless access to wired networks such as IP and ATM.
The two main differences between HiperLAN types 1 and 2 are as follows:
o Type 1 has a distributed MAC with QoS provisions, whereas type 2 has a centralized
schedule MAC.
o Type 1 is based on Gaussian minimum shift keying (GMSK), whereas type 2 is based
on OFDM.
o HiperLAN/2 automatically performs handoff to the nearest access point. The access
point is basically a radio BS that covers an area of about 30 to 150 meters, depending
on the environment. MANETs can also be created easily.
One of the primary features of HiperLAN/2 is its high speed transmission rates (up to 54
Mbps). It uses a modulation method called OFDM to transmit analog signals. It is connection
oriented, and traffic is transmitted on bidirectional links for unicast traffic and unidirectional
links toward the MSs for multicast and broadcast traff
This connection oriented approach makes support for QoS easy, which in turn depends on
how the HiperLAN/2 network incorporates with the fixed network using Ethernet, ATM, or
IP.
The HiperLAN/2 architecture shown in the figure allows for interoperation with virtually any
type of fixed network, making the technology both network and application independent.
HiperLAN/2 networks can be deployed at "hot spot" areas such as airports and hotels, as an
easy way of offering remote access and internet services.
Skip Ad
2. Home RF Technology
o A typical home needs a network inside the house for access to a public network
telephone and internet, entertainment networks (cable television, digital audio and
video with the IEEE 1394), transfer and sharing of data and resources (printer,
internet connection), and home control and automation.
o The device should be able to self-configure and maintain connectivity with the
network. The devices need to be plug and play enabled so that they are available to all
other clients on the network as soon as they are switched on, which requires automatic
device discovery and identification in the system.
o Home networking technology should also be able to accommodate any and all lookup
services, such as Jini. Home RF products allow you to simultaneously share a single
internet connection with all of your computers - without the hassle of new wires,
cables or jacks.
o Home RF visualizes a home network as shown in the figure:
o In Home RF all devices can share the same connection, for voice or data at the same
time.
o Home RF provides the foundation for a broad range of interoperable consumer
devices for wireless digital communication between PCs and consumer electronic
devices anywhere in and around the home.
o The working group includes Compaq computer corp. Ericson enterprise network,
IBM Intel corp., Motorola corp. and other.
o A specification for wireless communication in the home called the shared wireless
access protocol (SWAP) has been developed.
IEEE 802.11 is a set of standards for the wireless area network (WLAN), which was
implemented in 1997 and was used in the industrial, scientific, and medical (ISM) band.
IEEE 802.11 was quickly implemented throughout a wide region, but under its standards the
network occasionally receives interference from devices such as cordless phones and
microwave ovens. The aim of IEEE 802.11 is to provide wireless network connection for
fixed, portable, and moving stations within ten to hundreds of meters with one medium
access control (MAC) and several physical layer specifications. This was later called
802.11a. The major protocols include IEEE 802.11n; their most significant differences lie in
the specification of the PHY layer.
4. Bluetooth
Bluetooth is one of the major wireless technologies developed to achieve WPAN (wireless
personal area network). It is used to connect devices of different functions such as telephones,
computers (laptop or desktop), notebooks, cameras, printers, and so on.
Architecture of Bluetooth
o Bluetooth devices can interact with other Bluetooth devices in several ways in the
figure. In the simplest scheme, one of the devices acts as the master and (up to) seven
other slaves.
o A network with a master and one or more slaves associated with it is known as a
piconet. A single channel (and bandwidth) is shared among all devices in the piconet.
o Each of the active slaves has an assigned 3-bit active member address. many other
slaves can remain synchronized to the master though remaining inactive slaves,
referred to as parked nodes.
o The master regulates channel access for all active nodes and parked nodes. Of two
piconets are close to each other, they have overlapping coverage areas.
o This scenario, in which nodes of two piconets intermingle, is called a scatternet.
Slaves in one piconet can participate in another piconet as either a master or slave
through time division multiplexing.
o In a scatternet, the two (or more) piconets are not synchronized in either time or
frequency. Each of the piconets operates in its own frequency hopping channel, and
any devices in multiple piconets participate at the appropriate time via time division
multiplexing.
o The Bluetooth baseband technology supports two link types. Synchronous connection
oriented (SCO) types, used primarily for voice, and asynchronous connectionless
(ACL) type, essentially for packet data.