SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Name – Aditya Pandey
Enrollment no. – 04613304409
M.C.A. 4th Sem
Contents:-
   Introduction
   Working
   Characteristics
   Types
   Applications
   Future research
   bibliography
INTRODUCTION-

What is multi hopping?

   If there is no direct communication link
    between the source and the target , it is
    possible to pass through one or more
    intermediate stages on the way to the
    target . This phenomenon known as multi-
    hopping.
WORKING-

                      BASE
                      STATIO
                      N




MS – Mobile Station
Asymmetry
Time – variation
Non - transitivity
Time variation


  communications may be “time-variant”,
  generally due to variability of the
  wireless medium, or due to node
  mobility.
Asymmetry
     communications may be “asymmetric”,
  often due to variability of the wireless
  medium.
Non-Transitivity
          If A=B, B=C & C=D
         It doesn’t mean A=D
There are two types of multi-hop
networks which use concept of multi-
hopping,
1.Mobile Ad - Hoc Networks
2.Multi - Hop Cellular Networks
Mobile Ad- Hoc Networks(MANETS)

     A mobile ad hoc network consists of a
  group of mobile nodes that communicate
  without requiring a fixed wireless
  infrastructure. Communication between
  nodes is performed by direct connection or
  through multiple hop relays.
Multi-Hop Cellular Networks

    A promising solution to the problem of
  improving coverage and throughput is the
  use of relays.
   The use of relays, though, impacts almost
  every aspect of cellular system design and
  optimization including: scheduling, handoff.
Some of the applications are given as,

 Battle-field Communication
 Emergency First Response
 Public Safety system
 Cellular Networks
 In Organizations
Emergency first response
Battle field communication
Public safety system
In cellular networks




       Base station
In organizations
 In fourth generation mobile networks
 In mobile computing
 In modulation
 In handoff
 In scheduling
   Minimal security -

            Due to transfer of information from
source to destination through several nodes
   Difficulty in Re-positioning –

      At the time of HANDOFF on shifting from
one node to another node
   Slower than Wi-Fi –

      WiFi - 54+ mbps
      WiFi(Ad-Hoc Mode) – 11 mbps
   Range limitation-

           Ad-hoc networks has a range limit, in
cellular networks it of 30 – 40 mtr
Partial
                               B
overlap-                   A



     In it the coverage
                           C   D
area of nodes partially
overlap,            this
phenomenon produce
redundancy at the
time of Handoff.
Hidden    node problem-

         Hidden nodes in a wireless network
refer to nodes that are out of range of other
nodes or a collection of nodes and still
communicates


   A               S                B

    Wireless irregularities –

      partial overlap causes communication to
be non-transitive and/or asymmetric, this
produce wireless irregularities.
http://users.ece.utexas.edu/~rheath/re
search/multihop/ofdm.php
Computingunplugged.com
Wikipedia.org
Google.co.in/images
Multi-Hopping

Weitere ähnliche Inhalte

Was ist angesagt?

9. parameters of mobile multipath channels
9. parameters of mobile multipath channels9. parameters of mobile multipath channels
9. parameters of mobile multipath channelsJAIGANESH SEKAR
 
Mimo in Wireless Communication
Mimo in Wireless CommunicationMimo in Wireless Communication
Mimo in Wireless Communicationkailash karki
 
Public Switched Telephone Network
Public Switched Telephone NetworkPublic Switched Telephone Network
Public Switched Telephone NetworkHaither Mithath
 
Traveling Wave Antenna
Traveling Wave Antenna  Traveling Wave Antenna
Traveling Wave Antenna Abdelaziz Said
 
Orthogonal Frequency Division Multiplexing (OFDM)
Orthogonal Frequency Division Multiplexing (OFDM)Orthogonal Frequency Division Multiplexing (OFDM)
Orthogonal Frequency Division Multiplexing (OFDM)Gagan Randhawa
 
Antenna presentation PPT
Antenna presentation PPTAntenna presentation PPT
Antenna presentation PPTSachin Kadam
 
optical time division multiplexing
optical time division multiplexingoptical time division multiplexing
optical time division multiplexingAmandeep kaur
 
2.1 introduction to cellular architecture
2.1   introduction to cellular architecture2.1   introduction to cellular architecture
2.1 introduction to cellular architectureJAIGANESH SEKAR
 
Large scale path loss 1
Large scale path loss 1Large scale path loss 1
Large scale path loss 1Vrince Vimal
 
Diversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationDiversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationSahar Foroughi
 
Power delay profile,delay spread and doppler spread
Power delay profile,delay spread and doppler spreadPower delay profile,delay spread and doppler spread
Power delay profile,delay spread and doppler spreadManish Srivastava
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loopSANJUU7
 

Was ist angesagt? (20)

Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
 
9. parameters of mobile multipath channels
9. parameters of mobile multipath channels9. parameters of mobile multipath channels
9. parameters of mobile multipath channels
 
Magic tee
Magic tee  Magic tee
Magic tee
 
Mimo in Wireless Communication
Mimo in Wireless CommunicationMimo in Wireless Communication
Mimo in Wireless Communication
 
Public Switched Telephone Network
Public Switched Telephone NetworkPublic Switched Telephone Network
Public Switched Telephone Network
 
Traveling Wave Antenna
Traveling Wave Antenna  Traveling Wave Antenna
Traveling Wave Antenna
 
Cellular communication
Cellular communicationCellular communication
Cellular communication
 
Orthogonal Frequency Division Multiplexing (OFDM)
Orthogonal Frequency Division Multiplexing (OFDM)Orthogonal Frequency Division Multiplexing (OFDM)
Orthogonal Frequency Division Multiplexing (OFDM)
 
Antenna presentation PPT
Antenna presentation PPTAntenna presentation PPT
Antenna presentation PPT
 
optical time division multiplexing
optical time division multiplexingoptical time division multiplexing
optical time division multiplexing
 
Antenna
AntennaAntenna
Antenna
 
2.1 introduction to cellular architecture
2.1   introduction to cellular architecture2.1   introduction to cellular architecture
2.1 introduction to cellular architecture
 
Satellite communication
Satellite communicationSatellite communication
Satellite communication
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
 
Large scale path loss 1
Large scale path loss 1Large scale path loss 1
Large scale path loss 1
 
Diversity Techniques in Wireless Communication
Diversity Techniques in Wireless CommunicationDiversity Techniques in Wireless Communication
Diversity Techniques in Wireless Communication
 
Power delay profile,delay spread and doppler spread
Power delay profile,delay spread and doppler spreadPower delay profile,delay spread and doppler spread
Power delay profile,delay spread and doppler spread
 
Propagation Models
Propagation ModelsPropagation Models
Propagation Models
 
IEEE 802 standards
IEEE 802 standardsIEEE 802 standards
IEEE 802 standards
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
 

Andere mochten auch

Channel assignment strategies
Channel assignment strategiesChannel assignment strategies
Channel assignment strategiesAJAL A J
 
PRIME BARCODE SOLUTIONS-PPT
PRIME BARCODE SOLUTIONS-PPTPRIME BARCODE SOLUTIONS-PPT
PRIME BARCODE SOLUTIONS-PPTPRIME BARCODE
 
Barcoding Regulations For Healthcare Products In India ppt
Barcoding Regulations For Healthcare Products In India pptBarcoding Regulations For Healthcare Products In India ppt
Barcoding Regulations For Healthcare Products In India pptneraja reddi amaram
 
Barcode & smart cards
Barcode & smart cardsBarcode & smart cards
Barcode & smart cardsMuhammad Ali
 
Barcode Scanner Project Instructions
Barcode Scanner Project InstructionsBarcode Scanner Project Instructions
Barcode Scanner Project InstructionsTCEAES
 
Lect 07 data replication
Lect 07 data replicationLect 07 data replication
Lect 07 data replicationBilal khan
 
Cellular Architecture Design Concepts
Cellular Architecture Design ConceptsCellular Architecture Design Concepts
Cellular Architecture Design ConceptsT. L. Singal
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card TechnologyAmit Gaur
 
Smart Card Presentation
Smart Card PresentationSmart Card Presentation
Smart Card Presentationjaclor0408
 
Barcode presentation 2013
Barcode presentation 2013Barcode presentation 2013
Barcode presentation 2013JASON WOODHOUSE
 
Smart card technology
Smart card technologySmart card technology
Smart card technologyLav Pratap
 
Cellular network presentation
Cellular network presentationCellular network presentation
Cellular network presentationAditya Pandey
 
Working of barcode reader Ppt - Unitedworld School of Business
Working of barcode reader Ppt - Unitedworld School of BusinessWorking of barcode reader Ppt - Unitedworld School of Business
Working of barcode reader Ppt - Unitedworld School of BusinessArnab Roy Chowdhury
 

Andere mochten auch (20)

Channel assignment strategies
Channel assignment strategiesChannel assignment strategies
Channel assignment strategies
 
PRIME BARCODE SOLUTIONS-PPT
PRIME BARCODE SOLUTIONS-PPTPRIME BARCODE SOLUTIONS-PPT
PRIME BARCODE SOLUTIONS-PPT
 
Barcoding Regulations For Healthcare Products In India ppt
Barcoding Regulations For Healthcare Products In India pptBarcoding Regulations For Healthcare Products In India ppt
Barcoding Regulations For Healthcare Products In India ppt
 
Layar
LayarLayar
Layar
 
Barcode & smart cards
Barcode & smart cardsBarcode & smart cards
Barcode & smart cards
 
Barcode Scanner Project Instructions
Barcode Scanner Project InstructionsBarcode Scanner Project Instructions
Barcode Scanner Project Instructions
 
Lect 07 data replication
Lect 07 data replicationLect 07 data replication
Lect 07 data replication
 
Cellular Architecture Design Concepts
Cellular Architecture Design ConceptsCellular Architecture Design Concepts
Cellular Architecture Design Concepts
 
Trolly ppt
Trolly pptTrolly ppt
Trolly ppt
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
 
Smart Card Presentation
Smart Card PresentationSmart Card Presentation
Smart Card Presentation
 
SMART Vehicle Secure PPT
SMART Vehicle Secure PPTSMART Vehicle Secure PPT
SMART Vehicle Secure PPT
 
RFID Shopping System
RFID Shopping SystemRFID Shopping System
RFID Shopping System
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
Barcode presentation 2013
Barcode presentation 2013Barcode presentation 2013
Barcode presentation 2013
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Cellular network presentation
Cellular network presentationCellular network presentation
Cellular network presentation
 
Smart cards
Smart cards Smart cards
Smart cards
 
Working of barcode reader Ppt - Unitedworld School of Business
Working of barcode reader Ppt - Unitedworld School of BusinessWorking of barcode reader Ppt - Unitedworld School of Business
Working of barcode reader Ppt - Unitedworld School of Business
 
Smart card system ppt
Smart card system ppt Smart card system ppt
Smart card system ppt
 

Ähnlich wie Multi-Hopping

Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in ManetProf Ansari
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc networkskobu
 
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...IOSR Journals
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Editor IJCATR
 
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...Jyoti Parashar
 
Different Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETDifferent Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETJasmine Culbreth
 

Ähnlich wie Multi-Hopping (20)

Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
 
Advanced Networking on GloMoSim
Advanced Networking on GloMoSimAdvanced Networking on GloMoSim
Advanced Networking on GloMoSim
 
Mobile adhoc networks
Mobile adhoc networksMobile adhoc networks
Mobile adhoc networks
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
Ns2422412247
Ns2422412247Ns2422412247
Ns2422412247
 
CS8601-IQ.pdf
CS8601-IQ.pdfCS8601-IQ.pdf
CS8601-IQ.pdf
 
CS8601-IQ.pdf
CS8601-IQ.pdfCS8601-IQ.pdf
CS8601-IQ.pdf
 
Ad hoc networks technical issues on radio links security & qo s
Ad hoc networks technical issues on radio links security & qo sAd hoc networks technical issues on radio links security & qo s
Ad hoc networks technical issues on radio links security & qo s
 
Secure routing Adhoc Networks
Secure routing Adhoc NetworksSecure routing Adhoc Networks
Secure routing Adhoc Networks
 
Rmdtn ppt
Rmdtn pptRmdtn ppt
Rmdtn ppt
 
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
 
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
 
12.7.2018
12.7.201812.7.2018
12.7.2018
 
Different Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETDifferent Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANET
 
CHAPTER-1234
CHAPTER-1234CHAPTER-1234
CHAPTER-1234
 
Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]
 

Kürzlich hochgeladen

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 

Kürzlich hochgeladen (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

Multi-Hopping

  • 1. Name – Aditya Pandey Enrollment no. – 04613304409 M.C.A. 4th Sem
  • 2. Contents:-  Introduction  Working  Characteristics  Types  Applications  Future research  bibliography
  • 3. INTRODUCTION- What is multi hopping?  If there is no direct communication link between the source and the target , it is possible to pass through one or more intermediate stages on the way to the target . This phenomenon known as multi- hopping.
  • 4. WORKING- BASE STATIO N MS – Mobile Station
  • 6. Time variation communications may be “time-variant”, generally due to variability of the wireless medium, or due to node mobility.
  • 7. Asymmetry communications may be “asymmetric”, often due to variability of the wireless medium.
  • 8. Non-Transitivity If A=B, B=C & C=D It doesn’t mean A=D
  • 9. There are two types of multi-hop networks which use concept of multi- hopping, 1.Mobile Ad - Hoc Networks 2.Multi - Hop Cellular Networks
  • 10. Mobile Ad- Hoc Networks(MANETS) A mobile ad hoc network consists of a group of mobile nodes that communicate without requiring a fixed wireless infrastructure. Communication between nodes is performed by direct connection or through multiple hop relays.
  • 11. Multi-Hop Cellular Networks A promising solution to the problem of improving coverage and throughput is the use of relays. The use of relays, though, impacts almost every aspect of cellular system design and optimization including: scheduling, handoff.
  • 12. Some of the applications are given as,  Battle-field Communication  Emergency First Response  Public Safety system  Cellular Networks  In Organizations
  • 16. In cellular networks Base station
  • 18.  In fourth generation mobile networks  In mobile computing  In modulation  In handoff  In scheduling
  • 19. Minimal security - Due to transfer of information from source to destination through several nodes
  • 20. Difficulty in Re-positioning – At the time of HANDOFF on shifting from one node to another node
  • 21. Slower than Wi-Fi – WiFi - 54+ mbps WiFi(Ad-Hoc Mode) – 11 mbps
  • 22. Range limitation- Ad-hoc networks has a range limit, in cellular networks it of 30 – 40 mtr
  • 23. Partial B overlap- A In it the coverage C D area of nodes partially overlap, this phenomenon produce redundancy at the time of Handoff.
  • 24. Hidden node problem- Hidden nodes in a wireless network refer to nodes that are out of range of other nodes or a collection of nodes and still communicates A S B
  • 25. Wireless irregularities – partial overlap causes communication to be non-transitive and/or asymmetric, this produce wireless irregularities.