SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Wireless Ad Hoc Network
Done By
Sultan A. Al-Ghamdi (200335210)
Feras Al-Shahwan (200323750)
•http://www.tutorialspoint.com
•http://en.kioskea.net
•http://www.tomax7.com
•http://www.tutorialspoint.com
•http://www.ecsl.cs.sunysb.edu
•http://www.computingunplugged.com
•http://en.wikipedia.org
•http://www.computingunplugged.com
•http://common.ziffdavisinternet.com
King Fahd University of Petroleum and Minerals
Electrical Engineering Department
EE 400 – Communication Networks
OUTLINE
 Introduction
 IEEE802.11 standards
 Open system interconnection model
 Physical layer
 Datalink layer
 Network Layer
 Transport Layer
 Comparsion Between Ad hoc and
Infrastructure Network Topologies
 Applications and future implantation
 Conclusion
OUTLINE
 Introduction
 IEEE802.11 standards
 Open system interconnection model
 Physical layer
 Datalink layer
 Network Layer
 Transport Layer
 Comparsion Between Ad hoc and
Infrastructure Network Topologies
 Applications and future implantation
 Conclusion
Introduction
 Wireless Network Topology
Basic Service Set
Independent Basic Service Set
Introduction
What is Ad hoc Networks?
 Peer to peer communication by use of Wi-Fi
technology without passing through an access
point (AP)
Introduction
Why Ad hoc Networks?
 No infrastructure needed
 Can be deployed quickly, where there is no
wireless communication infrastructure present
 Can act as an extension to existing networks
 Cost-effective
 Adaptive computing and self-configuring
IEEE802.11 standards
Wi-Fi 802.11a/g)
Wi-Fi (802.11b)
Freature
Wireless LAN
Wireless LAN
Primary Application
2.4 GHz ISM (g) 5 GHz U-NII(a)
2.4 GHz ISM
Frequency Band
20 MHz
25 MHz
Channel Bandwidth
Half
Half
Half/Full Duplex
OFDM (64-channels)
Direct Sequence Spread Spectrum
Radio Technology
<=2.7 bps/Hz
<=0.44 bps/Hz
Bandwidth Efficiency
BPSK, QPSK,16-, 64-QAM
QPSK
Modulation
Convolution Code
None
FEC
Optional- RC4 (AES in 802.11i)
Optional- RC4 (AES in 802.11i)
Encryption
In development
In development
Mobility
Vendor Proprietary
Vendor Proprietary
Mesh
CSMA/CA
CSMA/CA
Access Protocol
OUTLINE
 Introduction
 IEEE802.11 standards
 Open system interconnection model
 Physical layer
 Datalink layer
 Network Layer
 Transport Layer
 Comparsion Between Ad hoc and
Infrastructure Network Topologies
 Applications and future implantation
 Conclusion
Open System Interconnection
Model
OUTLINE
 Introduction
 IEEE802.11 standards
 Open system interconnection model
 Physical layer
 Datalink layer
 Network Layer
 Transport Layer
 Comparsion Between Ad hoc and
Infrastructure Network Topologies
 Applications and future implantation
 Conclusion
Physical Layer
 Function
 Modulation
 Types of Modulation
 Quadrature Phase Shift Keying (QPSK)
 Binary Phase Shift Keying (BPSK)
 Quadrature Amplitude Modulation(QAM)
OUTLINE
 Introduction
 IEEE802.11 standards
 Open system interconnection model
 Physical layer
 Datalink layer
 Network Layer
 Transport Layer
 Comparsion Between Ad hoc and
Infrastructure Network Topologies
 Applications and future implantation
 Conclusion
Datalink layer
 Functions
 Ensures that data is transferred correctly
between adjacent network nodes
 Detect and correct errors that may occur in the
Physical layer.
 Protocols
 The Logical Link Control layer (LLC)
 provides multiplexing and flow control mechanisms that make it
possible for multi network protocols to correlate with multipoint
network
 The Media Access Control layer (MAC)
 The carrier sense multiple access collision avoidance method
(CSMA/CA)
 Point Coordination Function (PCF)
OUTLINE
 Introduction
 IEEE802.11 standards
 Open system interconnection model
 Physical layer
 Datalink layer
 Network Layer
 Transport Layer
 Comparsion Between Ad hoc and
Infrastructure Network Topologies
 Applications and future implantation
 Conclusion
Network Layer
 Functions
 performs the process of exchanging
information from one node to the other
nodes of the network.

 Protocols
 Pro-active routing protocol (table-driven)
 on demand routing protocol
 Adaptive routing (situation-aware)
 Flooding routing protocol
 Deflection routing protocol
OUTLINE
 Introduction
 IEEE802.11 standards
 Open system interconnection model
 Physical layer
 Datalink layer
 Network Layer
 Transport Layer
 Comparsion Between Ad hoc and
Infrastructure Network Topologies
 Applications and future implantation
 Conclusion
Transport Layer
 Functions
 The purpose of this layer is manipulating two processes
in two different nodes.

 Protocols
 User Datagram Protocol (UDP)
 UDP is a message-based connectionless protocol.
 no effort to set up a reserved end-to-end connection.
 Communication is done by transmitting information in one
direction
 Transmission Control Protocol (TCP)
 TCP is a connection oriented service
 TCP Provides reliable byte stream between two processes in two
different machines.
 Sequence number is attached to keep a track to ingoing and
outgoing packets.
 TCP protocols ensure that the data transfer is guaranteed.
OUTLINE
 Introduction
 IEEE802.11 standards
 Open system interconnection model
 Physical layer
 Datalink layer
 Network Layer
 Transport Layer
 Comparsion Between Ad hoc and Infrastructure
Network Topologies
 Applications and future implantation
 Conclusion
April 2, 2024 19
Comparison of Ad hoc and Infrastructure
Network Topologies
 Scalability:
 To scale up a wireless infrastructure network, the number of APs
is increased to expand the coverage area or to increase the
capacity
 In ad hoc networks, it depends on the routing protocol
 Flexibility:
 Operation of infrastructure networks is very expensive
 Ad hoc network is very flexible
 Controllability:
 Infrastructure network centrally controlled and synchronized
 In ad hoc networks there is no centralized administration
 Therefore, infrastructure network is more controllable than ad
hoc
April 2, 2024 20
 Routing Complexity:
 In ad hoc network, each node must act a router. There is a need for
routing algorithms that directs the info to the appropriate next hop
 This problem does not exist in infrastructure network
 Coverage:
 In ad hoc, coverage of the network is an issue of concern
 The max distance between two nodes is the max transmission range
of the nodes
 In infrastructure network, two nodes communicate through AP
 The max distance is twice range of the coverage of a single wireless
modem
Comparison of Ad hoc and Infrastructure
Network Topologies
OUTLINE
 Introduction
 IEEE802.11 standards
 Open system interconnection model
 Physical layer
 Datalink layer
 Network Layer
 Transport Layer
 Comparsion Between Ad hoc and Infrastructure
Network Topologies
 Applications and future implantation
 Conclusion
April 2, 2024 22
Applications and future implantation
 Personal area networking
 cell phone, laptop, ear phone, wrist watch
 Military environments
 soldiers, tanks, planes
 Civilian environments
 taxi cab network
 meeting rooms
 sports stadiums
 boats, small aircraft
 Emergency operations
 search-and-rescue
 policing and fire fighting
OUTLINE
 Introduction
 IEEE802.11 standards
 Open system interconnection model
 Physical layer
 Datalink layer
 Network Layer
 Transport Layer
 Comparsion Between Ad hoc and Infrastructure
Network Topologies
 Applications and future implantation
 Conclusion
Conclusion
 Ad hoc network is infrastructure
less networks
 Based on Wi-Fi technology
 Good solution for temporary
application
 Cost efficient.
Wireless Ad Hoc Networking Lecture Notes

Weitere ähnliche Inhalte

Ähnlich wie Wireless Ad Hoc Networking Lecture Notes

Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...ijtsrd
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPTAIRTEL
 
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...IJECEIAES
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos incaijjournal
 
Computer networks--networks
Computer networks--networksComputer networks--networks
Computer networks--networksNoor Azura Adnan
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Best strategy to control data on internet-of-robotic-things in heterogeneous ...
Best strategy to control data on internet-of-robotic-things in heterogeneous ...Best strategy to control data on internet-of-robotic-things in heterogeneous ...
Best strategy to control data on internet-of-robotic-things in heterogeneous ...IJECEIAES
 
Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Dân Chơi
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overviewscooby_doo
 
Wireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALAWireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALASaikiran Panjala
 
Orchestration of Ethernet Services in Software-Defined and Flexible Heterogen...
Orchestration of Ethernet Services in Software-Defined and Flexible Heterogen...Orchestration of Ethernet Services in Software-Defined and Flexible Heterogen...
Orchestration of Ethernet Services in Software-Defined and Flexible Heterogen...ADVA
 
Unit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfUnit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfArumugam90
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1Sujee Antony
 

Ähnlich wie Wireless Ad Hoc Networking Lecture Notes (20)

Ccna day1-130802165909-phpapp01
Ccna day1-130802165909-phpapp01Ccna day1-130802165909-phpapp01
Ccna day1-130802165909-phpapp01
 
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos in
 
Computer networks--networks
Computer networks--networksComputer networks--networks
Computer networks--networks
 
Mini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANsMini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANs
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Best strategy to control data on internet-of-robotic-things in heterogeneous ...
Best strategy to control data on internet-of-robotic-things in heterogeneous ...Best strategy to control data on internet-of-robotic-things in heterogeneous ...
Best strategy to control data on internet-of-robotic-things in heterogeneous ...
 
Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011
 
Osi model
Osi model Osi model
Osi model
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overview
 
Wireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALAWireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALA
 
Orchestration of Ethernet Services in Software-Defined and Flexible Heterogen...
Orchestration of Ethernet Services in Software-Defined and Flexible Heterogen...Orchestration of Ethernet Services in Software-Defined and Flexible Heterogen...
Orchestration of Ethernet Services in Software-Defined and Flexible Heterogen...
 
Unit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfUnit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdf
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
 
OSI Layering
OSI Layering OSI Layering
OSI Layering
 

Mehr von DrAdeelAkram2

Lec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless CommunicationLec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless CommunicationDrAdeelAkram2
 
Lec 2 Cell Planning Principles lecture notes
Lec 2 Cell Planning Principles lecture notesLec 2 Cell Planning Principles lecture notes
Lec 2 Cell Planning Principles lecture notesDrAdeelAkram2
 
Grid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptxGrid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptxDrAdeelAkram2
 
Grid and Cloud Computing Lecture 1a.pptx
Grid and Cloud Computing Lecture 1a.pptxGrid and Cloud Computing Lecture 1a.pptx
Grid and Cloud Computing Lecture 1a.pptxDrAdeelAkram2
 
Lecture on Internet Scale Sensor Systems
Lecture on Internet Scale Sensor SystemsLecture on Internet Scale Sensor Systems
Lecture on Internet Scale Sensor SystemsDrAdeelAkram2
 
08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf
08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf
08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdfDrAdeelAkram2
 
Amazon Echo Introduction, Capabilities and Vulnerabilities
Amazon Echo Introduction, Capabilities and VulnerabilitiesAmazon Echo Introduction, Capabilities and Vulnerabilities
Amazon Echo Introduction, Capabilities and VulnerabilitiesDrAdeelAkram2
 

Mehr von DrAdeelAkram2 (8)

Lec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless CommunicationLec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless Communication
 
Lec 2 Cell Planning Principles lecture notes
Lec 2 Cell Planning Principles lecture notesLec 2 Cell Planning Principles lecture notes
Lec 2 Cell Planning Principles lecture notes
 
Grid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptxGrid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptx
 
Grid and Cloud Computing Lecture 1a.pptx
Grid and Cloud Computing Lecture 1a.pptxGrid and Cloud Computing Lecture 1a.pptx
Grid and Cloud Computing Lecture 1a.pptx
 
Lecture on Internet Scale Sensor Systems
Lecture on Internet Scale Sensor SystemsLecture on Internet Scale Sensor Systems
Lecture on Internet Scale Sensor Systems
 
08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf
08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf
08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf
 
Amazon Echo Introduction, Capabilities and Vulnerabilities
Amazon Echo Introduction, Capabilities and VulnerabilitiesAmazon Echo Introduction, Capabilities and Vulnerabilities
Amazon Echo Introduction, Capabilities and Vulnerabilities
 
OpenMosix.ppt
OpenMosix.pptOpenMosix.ppt
OpenMosix.ppt
 

Kürzlich hochgeladen

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Kürzlich hochgeladen (20)

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 

Wireless Ad Hoc Networking Lecture Notes

  • 1. Wireless Ad Hoc Network Done By Sultan A. Al-Ghamdi (200335210) Feras Al-Shahwan (200323750) •http://www.tutorialspoint.com •http://en.kioskea.net •http://www.tomax7.com •http://www.tutorialspoint.com •http://www.ecsl.cs.sunysb.edu •http://www.computingunplugged.com •http://en.wikipedia.org •http://www.computingunplugged.com •http://common.ziffdavisinternet.com King Fahd University of Petroleum and Minerals Electrical Engineering Department EE 400 – Communication Networks
  • 2. OUTLINE  Introduction  IEEE802.11 standards  Open system interconnection model  Physical layer  Datalink layer  Network Layer  Transport Layer  Comparsion Between Ad hoc and Infrastructure Network Topologies  Applications and future implantation  Conclusion
  • 3. OUTLINE  Introduction  IEEE802.11 standards  Open system interconnection model  Physical layer  Datalink layer  Network Layer  Transport Layer  Comparsion Between Ad hoc and Infrastructure Network Topologies  Applications and future implantation  Conclusion
  • 4. Introduction  Wireless Network Topology Basic Service Set Independent Basic Service Set
  • 5. Introduction What is Ad hoc Networks?  Peer to peer communication by use of Wi-Fi technology without passing through an access point (AP)
  • 6. Introduction Why Ad hoc Networks?  No infrastructure needed  Can be deployed quickly, where there is no wireless communication infrastructure present  Can act as an extension to existing networks  Cost-effective  Adaptive computing and self-configuring
  • 7. IEEE802.11 standards Wi-Fi 802.11a/g) Wi-Fi (802.11b) Freature Wireless LAN Wireless LAN Primary Application 2.4 GHz ISM (g) 5 GHz U-NII(a) 2.4 GHz ISM Frequency Band 20 MHz 25 MHz Channel Bandwidth Half Half Half/Full Duplex OFDM (64-channels) Direct Sequence Spread Spectrum Radio Technology <=2.7 bps/Hz <=0.44 bps/Hz Bandwidth Efficiency BPSK, QPSK,16-, 64-QAM QPSK Modulation Convolution Code None FEC Optional- RC4 (AES in 802.11i) Optional- RC4 (AES in 802.11i) Encryption In development In development Mobility Vendor Proprietary Vendor Proprietary Mesh CSMA/CA CSMA/CA Access Protocol
  • 8. OUTLINE  Introduction  IEEE802.11 standards  Open system interconnection model  Physical layer  Datalink layer  Network Layer  Transport Layer  Comparsion Between Ad hoc and Infrastructure Network Topologies  Applications and future implantation  Conclusion
  • 10. OUTLINE  Introduction  IEEE802.11 standards  Open system interconnection model  Physical layer  Datalink layer  Network Layer  Transport Layer  Comparsion Between Ad hoc and Infrastructure Network Topologies  Applications and future implantation  Conclusion
  • 11. Physical Layer  Function  Modulation  Types of Modulation  Quadrature Phase Shift Keying (QPSK)  Binary Phase Shift Keying (BPSK)  Quadrature Amplitude Modulation(QAM)
  • 12. OUTLINE  Introduction  IEEE802.11 standards  Open system interconnection model  Physical layer  Datalink layer  Network Layer  Transport Layer  Comparsion Between Ad hoc and Infrastructure Network Topologies  Applications and future implantation  Conclusion
  • 13. Datalink layer  Functions  Ensures that data is transferred correctly between adjacent network nodes  Detect and correct errors that may occur in the Physical layer.  Protocols  The Logical Link Control layer (LLC)  provides multiplexing and flow control mechanisms that make it possible for multi network protocols to correlate with multipoint network  The Media Access Control layer (MAC)  The carrier sense multiple access collision avoidance method (CSMA/CA)  Point Coordination Function (PCF)
  • 14. OUTLINE  Introduction  IEEE802.11 standards  Open system interconnection model  Physical layer  Datalink layer  Network Layer  Transport Layer  Comparsion Between Ad hoc and Infrastructure Network Topologies  Applications and future implantation  Conclusion
  • 15. Network Layer  Functions  performs the process of exchanging information from one node to the other nodes of the network.   Protocols  Pro-active routing protocol (table-driven)  on demand routing protocol  Adaptive routing (situation-aware)  Flooding routing protocol  Deflection routing protocol
  • 16. OUTLINE  Introduction  IEEE802.11 standards  Open system interconnection model  Physical layer  Datalink layer  Network Layer  Transport Layer  Comparsion Between Ad hoc and Infrastructure Network Topologies  Applications and future implantation  Conclusion
  • 17. Transport Layer  Functions  The purpose of this layer is manipulating two processes in two different nodes.   Protocols  User Datagram Protocol (UDP)  UDP is a message-based connectionless protocol.  no effort to set up a reserved end-to-end connection.  Communication is done by transmitting information in one direction  Transmission Control Protocol (TCP)  TCP is a connection oriented service  TCP Provides reliable byte stream between two processes in two different machines.  Sequence number is attached to keep a track to ingoing and outgoing packets.  TCP protocols ensure that the data transfer is guaranteed.
  • 18. OUTLINE  Introduction  IEEE802.11 standards  Open system interconnection model  Physical layer  Datalink layer  Network Layer  Transport Layer  Comparsion Between Ad hoc and Infrastructure Network Topologies  Applications and future implantation  Conclusion
  • 19. April 2, 2024 19 Comparison of Ad hoc and Infrastructure Network Topologies  Scalability:  To scale up a wireless infrastructure network, the number of APs is increased to expand the coverage area or to increase the capacity  In ad hoc networks, it depends on the routing protocol  Flexibility:  Operation of infrastructure networks is very expensive  Ad hoc network is very flexible  Controllability:  Infrastructure network centrally controlled and synchronized  In ad hoc networks there is no centralized administration  Therefore, infrastructure network is more controllable than ad hoc
  • 20. April 2, 2024 20  Routing Complexity:  In ad hoc network, each node must act a router. There is a need for routing algorithms that directs the info to the appropriate next hop  This problem does not exist in infrastructure network  Coverage:  In ad hoc, coverage of the network is an issue of concern  The max distance between two nodes is the max transmission range of the nodes  In infrastructure network, two nodes communicate through AP  The max distance is twice range of the coverage of a single wireless modem Comparison of Ad hoc and Infrastructure Network Topologies
  • 21. OUTLINE  Introduction  IEEE802.11 standards  Open system interconnection model  Physical layer  Datalink layer  Network Layer  Transport Layer  Comparsion Between Ad hoc and Infrastructure Network Topologies  Applications and future implantation  Conclusion
  • 22. April 2, 2024 22 Applications and future implantation  Personal area networking  cell phone, laptop, ear phone, wrist watch  Military environments  soldiers, tanks, planes  Civilian environments  taxi cab network  meeting rooms  sports stadiums  boats, small aircraft  Emergency operations  search-and-rescue  policing and fire fighting
  • 23. OUTLINE  Introduction  IEEE802.11 standards  Open system interconnection model  Physical layer  Datalink layer  Network Layer  Transport Layer  Comparsion Between Ad hoc and Infrastructure Network Topologies  Applications and future implantation  Conclusion
  • 24. Conclusion  Ad hoc network is infrastructure less networks  Based on Wi-Fi technology  Good solution for temporary application  Cost efficient.