SlideShare ist ein Scribd-Unternehmen logo
1 von 6
A
                             Seminar Report
                                  on

                     WIRELESS ADHOC NETWORK

                                  Submitted
                             In partial fulfillment
                       for the award of the Degree of

                         Bachelor of Technology

          In the Department of Computer Science & Engineering

Seminar In-charge                                       Submitted By:
Mr. Ashwani Kumar                                       Name: Rohit Kuamr
Asst. Prof. CSE/IT                                      Roll No:1050110040




             Department of Computer Science & Engineering
             R. V. Institute of Technology, Bijnor
ABSTRACT

When n identical randomly located nodes, each capable of transmitting at W bits per second and

using a fixed range, form a wireless network, the throughput λ(n) obtainable by each node for a

randomly chosen destination is Θ(W/√(nlogn)) bits per second under a noninterference protocol.

If the nodes are optimally placed in a disk of unit area, traffic patterns are optimally assigned,

and each transmission's range is optimally chosen, the bit-distance product that can be

transported by the network per second is Θ(W√An) bit-meters per second. Thus even under

optimal circumstances, the throughput is only Θ(W/√n) bits per second for each node for a

destination nonvanishingly far away. Similar results also hold under an alternate physical model

where a required signal-to-interference ratio is specified for successful receptions.

Fundamentally, it is the need for every node all over the domain to share whatever portion of the

channel it is utilizing with nodes in its local neighborhood that is the reason for the constriction

in capacity. Splitting the channel into several subchannels does not change any of the results.

Some implications may be worth considering by designers. Since the throughput furnished to

each user diminishes to zero as the number of users is increased, perhaps networks connecting

smaller numbers of users, or featuring connections mostly with nearby neighbors, may be more

likely to be find acceptance.
ACKNOWLEDGEMENT

The seminar report on “WIRELESS ADHOC NETWORK” is outcome of guidance, moral
support and devotion bestowed on us throughout our work. For this we acknowledge and express
our profound sense of gratitude and thanks to everybody who have been a source of inspiration
during the project preparation.
It is with profound gratitude that we express our deep indebtedness to our Seminar Guide Mr.
Ashwani Kumar & Mr.Amit Ravi without whose support and guidance it would not have been
possible for this Seminar to have materialized and taken a concrete shape.


We offer our sincere phrases of thanks with innate humility to Ms. Pooja Verma H.O.D.
CSE/IT for providing their precious ideas, suggestions and help that enabled in shaping the
Seminar work.
Last but not the least we are indebted to our parents and friends for their constant encouragement
and helping us in our endeavor.
Candidate’s Declaration

I hereby declare that the work, which is being presented in the Seminar, entitle”…
……WIRELESS ADHOC NETWORK………” in partial fulfillment for the award of Degree
of “Bachelor of Technology” in Department Of Computer Science & Engineering and submitted
to the Department of Computer Science & Engineering, R. V. Institute of Technology Bijnor, is
a record of my own investigations carried under the Guidance of Mr. Ashwani Kumar, Asst
Prof. CSE/IT R. V. Institute of Technology Bijnor.
I have not submitted the matter presented in this seminar anywhere for the award of any other
Degree.



Name:Rohit Kumar
Branch: Computer Science & Engineering
Roll No:1050110040
R. V. Institute of Technology Bijnor
Contents
Chapter- 1 Wireless Ad-Hoc Network Introduction1               1

Chapter- 2 Set Up A Computer-To-Computer (Ad Hoc) Network      4
2.1advantages                                                  6
2.2disadvantages                                               6

Chapter- 3 Security In Wireless Network Connections            7
3.1 Other Limitations To Wireless Networks                     7
3.2 Cost Associated With Wireless Network                      8

Chapter- 4 Application                                         9

Chapter- 5 Technical Requirements                              10
5.1 Medium-Access Control                                      10
5.2 Simulation Of Wireless Ad Hoc Networks                     10
5.3 Routing Protocols                                          12

Chapter- 6 Security                                            16

Chapter- 7 The Future Of Ad Hoc Networks                       19
7.1 The Future Of Ad-Hoc Networks                              19
7.2 Wand                                                       20

Chapter- 8 Wireless Network Architectures                      24
8.1 Standalone Architecture (Ad Hoc Mode)                      24
8.2 Centrally Coordinated Architecture (Infrastructure Mode)   25
8.3 Ad Hoc Networks And The Internet                           27

Chapter- 9 Advantage And Disadvantage                          28
9.1 Advantage                                                  28
9.2 Main Disadvantage                                          28
Chapter- 10 Automatic Ip Address Configuration   29
10.1 Windows Vista                               29
10.2 Network Access Points                       31
10.3 Group Ad-Hoc Networks                       32
10.4 Pan Scenarios Stack                         32
10.5 Network Access Point Profile Stack          33
10.6 Roles/Configurations                        33

Chapter- 11 Conclusion                           35

Chapter- 12 References                           36

Weitere ähnliche Inhalte

Was ist angesagt?

IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET Journal
 
9 Aab32 Dd Bdb9 137 E Ca2184 F057753212 154710
9 Aab32 Dd Bdb9 137 E Ca2184 F057753212 1547109 Aab32 Dd Bdb9 137 E Ca2184 F057753212 154710
9 Aab32 Dd Bdb9 137 E Ca2184 F057753212 154710guestbd2263
 
IRJET- Vanet Connection Performance Analysis using GPSR Protocol
IRJET- Vanet Connection Performance Analysis using GPSR ProtocolIRJET- Vanet Connection Performance Analysis using GPSR Protocol
IRJET- Vanet Connection Performance Analysis using GPSR ProtocolIRJET Journal
 
Wsn topologies intro
Wsn topologies introWsn topologies intro
Wsn topologies introRishu Seth
 
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksiosrjce
 
Broadband Wireless 802.16
Broadband Wireless 802.16Broadband Wireless 802.16
Broadband Wireless 802.16coolbp
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksKarthik
 
Zigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart CampusZigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart CampusIJMER
 
Low Power Wireless Technologies and Standards for the Internet of Things
Low Power Wireless Technologies and Standards for the Internet of ThingsLow Power Wireless Technologies and Standards for the Internet of Things
Low Power Wireless Technologies and Standards for the Internet of ThingsDuncan Purves
 
Serial Communication Interface with Error Detection
Serial Communication Interface with Error DetectionSerial Communication Interface with Error Detection
Serial Communication Interface with Error Detectioniosrjce
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkMuhammad Kaife Uddin
 
High Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
High Fault Coverage For On Chip Network Using Priority Based Routing AlgorithmHigh Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
High Fault Coverage For On Chip Network Using Priority Based Routing AlgorithmIJSRD
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkKarthik
 
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...IJAAS Team
 

Was ist angesagt? (19)

Br33421423
Br33421423Br33421423
Br33421423
 
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
 
9 Aab32 Dd Bdb9 137 E Ca2184 F057753212 154710
9 Aab32 Dd Bdb9 137 E Ca2184 F057753212 1547109 Aab32 Dd Bdb9 137 E Ca2184 F057753212 154710
9 Aab32 Dd Bdb9 137 E Ca2184 F057753212 154710
 
IRJET- Vanet Connection Performance Analysis using GPSR Protocol
IRJET- Vanet Connection Performance Analysis using GPSR ProtocolIRJET- Vanet Connection Performance Analysis using GPSR Protocol
IRJET- Vanet Connection Performance Analysis using GPSR Protocol
 
Wsn topologies intro
Wsn topologies introWsn topologies intro
Wsn topologies intro
 
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networks
 
Broadband Wireless 802.16
Broadband Wireless 802.16Broadband Wireless 802.16
Broadband Wireless 802.16
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless Multimedia Sensor Networks
Wireless Multimedia Sensor NetworksWireless Multimedia Sensor Networks
Wireless Multimedia Sensor Networks
 
Zigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart CampusZigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart Campus
 
Low Power Wireless Technologies and Standards for the Internet of Things
Low Power Wireless Technologies and Standards for the Internet of ThingsLow Power Wireless Technologies and Standards for the Internet of Things
Low Power Wireless Technologies and Standards for the Internet of Things
 
Serial Communication Interface with Error Detection
Serial Communication Interface with Error DetectionSerial Communication Interface with Error Detection
Serial Communication Interface with Error Detection
 
Introduction to MANETs
Introduction to MANETsIntroduction to MANETs
Introduction to MANETs
 
Ppt taken workshoponwsn_withns2
Ppt taken workshoponwsn_withns2Ppt taken workshoponwsn_withns2
Ppt taken workshoponwsn_withns2
 
680 684
680 684680 684
680 684
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
 
High Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
High Fault Coverage For On Chip Network Using Priority Based Routing AlgorithmHigh Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
High Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
 
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
 

Ähnlich wie A

Accelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assuranceAccelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assuranceADVA
 
Digital Twin-based Software-defined UAV Networks Using Queuing Model
Digital Twin-based Software-defined UAV Networks Using Queuing ModelDigital Twin-based Software-defined UAV Networks Using Queuing Model
Digital Twin-based Software-defined UAV Networks Using Queuing Modelabir641
 
Ccna 2nd Edition
Ccna 2nd EditionCcna 2nd Edition
Ccna 2nd Editiondznet
 
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...IRJET Journal
 
Border security
Border securityBorder security
Border securityFarah Naaz
 
Network Virtualization Architectural & Technological aspects
Network Virtualization Architectural & Technological aspectsNetwork Virtualization Architectural & Technological aspects
Network Virtualization Architectural & Technological aspectsdeshpandeamrut
 
Orchestration of Ethernet Services in Software-Defined and Flexible Heterogen...
Orchestration of Ethernet Services in Software-Defined and Flexible Heterogen...Orchestration of Ethernet Services in Software-Defined and Flexible Heterogen...
Orchestration of Ethernet Services in Software-Defined and Flexible Heterogen...ADVA
 
What Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkWhat Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkPatricia Viljoen
 
Paper id 21201485
Paper id 21201485Paper id 21201485
Paper id 21201485IJRAT
 
Project Dissertation - ZigBee Based Wireless Sensor Network
Project Dissertation - ZigBee Based Wireless Sensor NetworkProject Dissertation - ZigBee Based Wireless Sensor Network
Project Dissertation - ZigBee Based Wireless Sensor NetworkAnand Agrawal
 
Design And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPNDesign And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPNgandhimb
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Dân Chơi
 
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...
Interference-Aware Multipath Routing In  Wireless Sensor NetworksMinor  projr...Interference-Aware Multipath Routing In  Wireless Sensor NetworksMinor  projr...
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...Rakesh Behera
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 

Ähnlich wie A (20)

Wimax vsWi-fi
Wimax vsWi-fiWimax vsWi-fi
Wimax vsWi-fi
 
Mini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANsMini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANs
 
3rd sem atm basics for wcdma networks M.TECH ( PDF FILE )
3rd sem atm basics for wcdma networks M.TECH ( PDF FILE )3rd sem atm basics for wcdma networks M.TECH ( PDF FILE )
3rd sem atm basics for wcdma networks M.TECH ( PDF FILE )
 
Accelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assuranceAccelerating 5G enterprise networks with edge computing and latency assurance
Accelerating 5G enterprise networks with edge computing and latency assurance
 
Digital Twin-based Software-defined UAV Networks Using Queuing Model
Digital Twin-based Software-defined UAV Networks Using Queuing ModelDigital Twin-based Software-defined UAV Networks Using Queuing Model
Digital Twin-based Software-defined UAV Networks Using Queuing Model
 
3rd sem atm basics for wcdma networks M.TECH ( M S WORD FILE )
3rd sem atm basics for wcdma networks M.TECH ( M S WORD FILE )3rd sem atm basics for wcdma networks M.TECH ( M S WORD FILE )
3rd sem atm basics for wcdma networks M.TECH ( M S WORD FILE )
 
Ccna 2nd Edition
Ccna 2nd EditionCcna 2nd Edition
Ccna 2nd Edition
 
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
 
Ax24329333
Ax24329333Ax24329333
Ax24329333
 
Border security
Border securityBorder security
Border security
 
Network Virtualization Architectural & Technological aspects
Network Virtualization Architectural & Technological aspectsNetwork Virtualization Architectural & Technological aspects
Network Virtualization Architectural & Technological aspects
 
Orchestration of Ethernet Services in Software-Defined and Flexible Heterogen...
Orchestration of Ethernet Services in Software-Defined and Flexible Heterogen...Orchestration of Ethernet Services in Software-Defined and Flexible Heterogen...
Orchestration of Ethernet Services in Software-Defined and Flexible Heterogen...
 
Subnet
SubnetSubnet
Subnet
 
What Is Routing Overhead Of The Network
What Is Routing Overhead Of The NetworkWhat Is Routing Overhead Of The Network
What Is Routing Overhead Of The Network
 
Paper id 21201485
Paper id 21201485Paper id 21201485
Paper id 21201485
 
Project Dissertation - ZigBee Based Wireless Sensor Network
Project Dissertation - ZigBee Based Wireless Sensor NetworkProject Dissertation - ZigBee Based Wireless Sensor Network
Project Dissertation - ZigBee Based Wireless Sensor Network
 
Design And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPNDesign And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPN
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011
 
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...
Interference-Aware Multipath Routing In  Wireless Sensor NetworksMinor  projr...Interference-Aware Multipath Routing In  Wireless Sensor NetworksMinor  projr...
Interference-Aware Multipath Routing In Wireless Sensor NetworksMinor projr...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 

A

  • 1. A Seminar Report on WIRELESS ADHOC NETWORK Submitted In partial fulfillment for the award of the Degree of Bachelor of Technology In the Department of Computer Science & Engineering Seminar In-charge Submitted By: Mr. Ashwani Kumar Name: Rohit Kuamr Asst. Prof. CSE/IT Roll No:1050110040 Department of Computer Science & Engineering R. V. Institute of Technology, Bijnor
  • 2. ABSTRACT When n identical randomly located nodes, each capable of transmitting at W bits per second and using a fixed range, form a wireless network, the throughput λ(n) obtainable by each node for a randomly chosen destination is Θ(W/√(nlogn)) bits per second under a noninterference protocol. If the nodes are optimally placed in a disk of unit area, traffic patterns are optimally assigned, and each transmission's range is optimally chosen, the bit-distance product that can be transported by the network per second is Θ(W√An) bit-meters per second. Thus even under optimal circumstances, the throughput is only Θ(W/√n) bits per second for each node for a destination nonvanishingly far away. Similar results also hold under an alternate physical model where a required signal-to-interference ratio is specified for successful receptions. Fundamentally, it is the need for every node all over the domain to share whatever portion of the channel it is utilizing with nodes in its local neighborhood that is the reason for the constriction in capacity. Splitting the channel into several subchannels does not change any of the results. Some implications may be worth considering by designers. Since the throughput furnished to each user diminishes to zero as the number of users is increased, perhaps networks connecting smaller numbers of users, or featuring connections mostly with nearby neighbors, may be more likely to be find acceptance.
  • 3. ACKNOWLEDGEMENT The seminar report on “WIRELESS ADHOC NETWORK” is outcome of guidance, moral support and devotion bestowed on us throughout our work. For this we acknowledge and express our profound sense of gratitude and thanks to everybody who have been a source of inspiration during the project preparation. It is with profound gratitude that we express our deep indebtedness to our Seminar Guide Mr. Ashwani Kumar & Mr.Amit Ravi without whose support and guidance it would not have been possible for this Seminar to have materialized and taken a concrete shape. We offer our sincere phrases of thanks with innate humility to Ms. Pooja Verma H.O.D. CSE/IT for providing their precious ideas, suggestions and help that enabled in shaping the Seminar work. Last but not the least we are indebted to our parents and friends for their constant encouragement and helping us in our endeavor.
  • 4. Candidate’s Declaration I hereby declare that the work, which is being presented in the Seminar, entitle”… ……WIRELESS ADHOC NETWORK………” in partial fulfillment for the award of Degree of “Bachelor of Technology” in Department Of Computer Science & Engineering and submitted to the Department of Computer Science & Engineering, R. V. Institute of Technology Bijnor, is a record of my own investigations carried under the Guidance of Mr. Ashwani Kumar, Asst Prof. CSE/IT R. V. Institute of Technology Bijnor. I have not submitted the matter presented in this seminar anywhere for the award of any other Degree. Name:Rohit Kumar Branch: Computer Science & Engineering Roll No:1050110040 R. V. Institute of Technology Bijnor
  • 5. Contents Chapter- 1 Wireless Ad-Hoc Network Introduction1 1 Chapter- 2 Set Up A Computer-To-Computer (Ad Hoc) Network 4 2.1advantages 6 2.2disadvantages 6 Chapter- 3 Security In Wireless Network Connections 7 3.1 Other Limitations To Wireless Networks 7 3.2 Cost Associated With Wireless Network 8 Chapter- 4 Application 9 Chapter- 5 Technical Requirements 10 5.1 Medium-Access Control 10 5.2 Simulation Of Wireless Ad Hoc Networks 10 5.3 Routing Protocols 12 Chapter- 6 Security 16 Chapter- 7 The Future Of Ad Hoc Networks 19 7.1 The Future Of Ad-Hoc Networks 19 7.2 Wand 20 Chapter- 8 Wireless Network Architectures 24 8.1 Standalone Architecture (Ad Hoc Mode) 24 8.2 Centrally Coordinated Architecture (Infrastructure Mode) 25 8.3 Ad Hoc Networks And The Internet 27 Chapter- 9 Advantage And Disadvantage 28 9.1 Advantage 28 9.2 Main Disadvantage 28
  • 6. Chapter- 10 Automatic Ip Address Configuration 29 10.1 Windows Vista 29 10.2 Network Access Points 31 10.3 Group Ad-Hoc Networks 32 10.4 Pan Scenarios Stack 32 10.5 Network Access Point Profile Stack 33 10.6 Roles/Configurations 33 Chapter- 11 Conclusion 35 Chapter- 12 References 36