SlideShare a Scribd company logo
1 of 25
Wireless Ad Hoc Network
Done By
Sultan A. Al-Ghamdi (200335210)
Feras Al-Shahwan (200323750)
•http://www.tutorialspoint.com
•http://en.kioskea.net
•http://www.tomax7.com
•http://www.tutorialspoint.com
•http://www.ecsl.cs.sunysb.edu
•http://www.computingunplugged.com
•http://en.wikipedia.org
•http://www.computingunplugged.com
•http://common.ziffdavisinternet.com
King Fahd University of Petroleum and Minerals
Electrical Engineering Department
EE 400 – Communication Networks
OUTLINE
 Introduction
 IEEE802.11 standards
 Open system interconnection model
 Physical layer
 Datalink layer
 Network Layer
 Transport Layer
 Comparsion Between Ad hoc and
Infrastructure Network Topologies
 Applications and future implantation
 Conclusion
OUTLINE
 Introduction
 IEEE802.11 standards
 Open system interconnection model
 Physical layer
 Datalink layer
 Network Layer
 Transport Layer
 Comparsion Between Ad hoc and
Infrastructure Network Topologies
 Applications and future implantation
 Conclusion
Introduction
 Wireless Network Topology
Basic Service Set
Independent Basic Service Set
Introduction
What is Ad hoc Networks?
 Peer to peer communication by use of Wi-Fi
technology without passing through an access
point (AP)
Introduction
Why Ad hoc Networks?
 No infrastructure needed
 Can be deployed quickly, where there is no
wireless communication infrastructure present
 Can act as an extension to existing networks
 Cost-effective
 Adaptive computing and self-configuring
IEEE802.11 standards
Wi-Fi 802.11a/g)
Wi-Fi (802.11b)
Freature
Wireless LAN
Wireless LAN
Primary Application
2.4 GHz ISM (g) 5 GHz U-NII(a)
2.4 GHz ISM
Frequency Band
20 MHz
25 MHz
Channel Bandwidth
Half
Half
Half/Full Duplex
OFDM (64-channels)
Direct Sequence Spread Spectrum
Radio Technology
<=2.7 bps/Hz
<=0.44 bps/Hz
Bandwidth Efficiency
BPSK, QPSK,16-, 64-QAM
QPSK
Modulation
Convolution Code
None
FEC
Optional- RC4 (AES in 802.11i)
Optional- RC4 (AES in 802.11i)
Encryption
In development
In development
Mobility
Vendor Proprietary
Vendor Proprietary
Mesh
CSMA/CA
CSMA/CA
Access Protocol
OUTLINE
 Introduction
 IEEE802.11 standards
 Open system interconnection model
 Physical layer
 Datalink layer
 Network Layer
 Transport Layer
 Comparsion Between Ad hoc and
Infrastructure Network Topologies
 Applications and future implantation
 Conclusion
Open System Interconnection
Model
OUTLINE
 Introduction
 IEEE802.11 standards
 Open system interconnection model
 Physical layer
 Datalink layer
 Network Layer
 Transport Layer
 Comparsion Between Ad hoc and
Infrastructure Network Topologies
 Applications and future implantation
 Conclusion
Physical Layer
 Function
 Modulation
 Types of Modulation
 Quadrature Phase Shift Keying (QPSK)
 Binary Phase Shift Keying (BPSK)
 Quadrature Amplitude Modulation(QAM)
OUTLINE
 Introduction
 IEEE802.11 standards
 Open system interconnection model
 Physical layer
 Datalink layer
 Network Layer
 Transport Layer
 Comparsion Between Ad hoc and
Infrastructure Network Topologies
 Applications and future implantation
 Conclusion
Datalink layer
 Functions
 Ensures that data is transferred correctly
between adjacent network nodes
 Detect and correct errors that may occur in the
Physical layer.
 Protocols
 The Logical Link Control layer (LLC)
 provides multiplexing and flow control mechanisms that make it
possible for multi network protocols to correlate with multipoint
network
 The Media Access Control layer (MAC)
 The carrier sense multiple access collision avoidance method
(CSMA/CA)
 Point Coordination Function (PCF)
OUTLINE
 Introduction
 IEEE802.11 standards
 Open system interconnection model
 Physical layer
 Datalink layer
 Network Layer
 Transport Layer
 Comparsion Between Ad hoc and
Infrastructure Network Topologies
 Applications and future implantation
 Conclusion
Network Layer
 Functions
 performs the process of exchanging
information from one node to the other
nodes of the network.

 Protocols
 Pro-active routing protocol (table-driven)
 on demand routing protocol
 Adaptive routing (situation-aware)
 Flooding routing protocol
 Deflection routing protocol
OUTLINE
 Introduction
 IEEE802.11 standards
 Open system interconnection model
 Physical layer
 Datalink layer
 Network Layer
 Transport Layer
 Comparsion Between Ad hoc and
Infrastructure Network Topologies
 Applications and future implantation
 Conclusion
Transport Layer
 Functions
 The purpose of this layer is manipulating two processes
in two different nodes.

 Protocols
 User Datagram Protocol (UDP)
 UDP is a message-based connectionless protocol.
 no effort to set up a reserved end-to-end connection.
 Communication is done by transmitting information in one
direction
 Transmission Control Protocol (TCP)
 TCP is a connection oriented service
 TCP Provides reliable byte stream between two processes in two
different machines.
 Sequence number is attached to keep a track to ingoing and
outgoing packets.
 TCP protocols ensure that the data transfer is guaranteed.
OUTLINE
 Introduction
 IEEE802.11 standards
 Open system interconnection model
 Physical layer
 Datalink layer
 Network Layer
 Transport Layer
 Comparsion Between Ad hoc and Infrastructure
Network Topologies
 Applications and future implantation
 Conclusion
April 2, 2024 19
Comparison of Ad hoc and Infrastructure
Network Topologies
 Scalability:
 To scale up a wireless infrastructure network, the number of APs
is increased to expand the coverage area or to increase the
capacity
 In ad hoc networks, it depends on the routing protocol
 Flexibility:
 Operation of infrastructure networks is very expensive
 Ad hoc network is very flexible
 Controllability:
 Infrastructure network centrally controlled and synchronized
 In ad hoc networks there is no centralized administration
 Therefore, infrastructure network is more controllable than ad
hoc
April 2, 2024 20
 Routing Complexity:
 In ad hoc network, each node must act a router. There is a need for
routing algorithms that directs the info to the appropriate next hop
 This problem does not exist in infrastructure network
 Coverage:
 In ad hoc, coverage of the network is an issue of concern
 The max distance between two nodes is the max transmission range
of the nodes
 In infrastructure network, two nodes communicate through AP
 The max distance is twice range of the coverage of a single wireless
modem
Comparison of Ad hoc and Infrastructure
Network Topologies
OUTLINE
 Introduction
 IEEE802.11 standards
 Open system interconnection model
 Physical layer
 Datalink layer
 Network Layer
 Transport Layer
 Comparsion Between Ad hoc and Infrastructure
Network Topologies
 Applications and future implantation
 Conclusion
April 2, 2024 22
Applications and future implantation
 Personal area networking
 cell phone, laptop, ear phone, wrist watch
 Military environments
 soldiers, tanks, planes
 Civilian environments
 taxi cab network
 meeting rooms
 sports stadiums
 boats, small aircraft
 Emergency operations
 search-and-rescue
 policing and fire fighting
OUTLINE
 Introduction
 IEEE802.11 standards
 Open system interconnection model
 Physical layer
 Datalink layer
 Network Layer
 Transport Layer
 Comparsion Between Ad hoc and Infrastructure
Network Topologies
 Applications and future implantation
 Conclusion
Conclusion
 Ad hoc network is infrastructure
less networks
 Based on Wi-Fi technology
 Good solution for temporary
application
 Cost efficient.
Wireless Ad Hoc Networking Lecture Notes

More Related Content

Similar to Wireless Ad Hoc Networking Lecture Notes

Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...ijtsrd
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPTAIRTEL
 
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...IJECEIAES
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos incaijjournal
 
Computer networks--networks
Computer networks--networksComputer networks--networks
Computer networks--networksNoor Azura Adnan
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Best strategy to control data on internet-of-robotic-things in heterogeneous ...
Best strategy to control data on internet-of-robotic-things in heterogeneous ...Best strategy to control data on internet-of-robotic-things in heterogeneous ...
Best strategy to control data on internet-of-robotic-things in heterogeneous ...IJECEIAES
 
Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Dân Chơi
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overviewscooby_doo
 
Wireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALAWireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALASaikiran Panjala
 
Orchestration of Ethernet Services in Software-Defined and Flexible Heterogen...
Orchestration of Ethernet Services in Software-Defined and Flexible Heterogen...Orchestration of Ethernet Services in Software-Defined and Flexible Heterogen...
Orchestration of Ethernet Services in Software-Defined and Flexible Heterogen...ADVA
 
Unit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfUnit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfArumugam90
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1Sujee Antony
 

Similar to Wireless Ad Hoc Networking Lecture Notes (20)

Ccna day1-130802165909-phpapp01
Ccna day1-130802165909-phpapp01Ccna day1-130802165909-phpapp01
Ccna day1-130802165909-phpapp01
 
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
Design and Evaluation of MAC Protocol Strategies Techniques in Wireless Ad Ho...
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
Performance evaluation of the IEEE 802.11n random topology WLAN with QoS appl...
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos in
 
Computer networks--networks
Computer networks--networksComputer networks--networks
Computer networks--networks
 
Mini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANsMini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANs
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Best strategy to control data on internet-of-robotic-things in heterogeneous ...
Best strategy to control data on internet-of-robotic-things in heterogeneous ...Best strategy to control data on internet-of-robotic-things in heterogeneous ...
Best strategy to control data on internet-of-robotic-things in heterogeneous ...
 
Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011
 
Osi model
Osi model Osi model
Osi model
 
Internetworking Overview
Internetworking OverviewInternetworking Overview
Internetworking Overview
 
Wireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALAWireless LAN By SAIKIRAN PANJALA
Wireless LAN By SAIKIRAN PANJALA
 
Orchestration of Ethernet Services in Software-Defined and Flexible Heterogen...
Orchestration of Ethernet Services in Software-Defined and Flexible Heterogen...Orchestration of Ethernet Services in Software-Defined and Flexible Heterogen...
Orchestration of Ethernet Services in Software-Defined and Flexible Heterogen...
 
Unit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfUnit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdf
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
 
OSI Layering
OSI Layering OSI Layering
OSI Layering
 

More from DrAdeelAkram2

Lec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless CommunicationLec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless CommunicationDrAdeelAkram2
 
Lec 2 Cell Planning Principles lecture notes
Lec 2 Cell Planning Principles lecture notesLec 2 Cell Planning Principles lecture notes
Lec 2 Cell Planning Principles lecture notesDrAdeelAkram2
 
Grid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptxGrid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptxDrAdeelAkram2
 
Grid and Cloud Computing Lecture 1a.pptx
Grid and Cloud Computing Lecture 1a.pptxGrid and Cloud Computing Lecture 1a.pptx
Grid and Cloud Computing Lecture 1a.pptxDrAdeelAkram2
 
Lecture on Internet Scale Sensor Systems
Lecture on Internet Scale Sensor SystemsLecture on Internet Scale Sensor Systems
Lecture on Internet Scale Sensor SystemsDrAdeelAkram2
 
08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf
08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf
08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdfDrAdeelAkram2
 
Amazon Echo Introduction, Capabilities and Vulnerabilities
Amazon Echo Introduction, Capabilities and VulnerabilitiesAmazon Echo Introduction, Capabilities and Vulnerabilities
Amazon Echo Introduction, Capabilities and VulnerabilitiesDrAdeelAkram2
 

More from DrAdeelAkram2 (8)

Lec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless CommunicationLec 12 Wi-Fi Indoor Wireless Communication
Lec 12 Wi-Fi Indoor Wireless Communication
 
Lec 2 Cell Planning Principles lecture notes
Lec 2 Cell Planning Principles lecture notesLec 2 Cell Planning Principles lecture notes
Lec 2 Cell Planning Principles lecture notes
 
Grid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptxGrid and Cloud Computing Lecture-2a.pptx
Grid and Cloud Computing Lecture-2a.pptx
 
Grid and Cloud Computing Lecture 1a.pptx
Grid and Cloud Computing Lecture 1a.pptxGrid and Cloud Computing Lecture 1a.pptx
Grid and Cloud Computing Lecture 1a.pptx
 
Lecture on Internet Scale Sensor Systems
Lecture on Internet Scale Sensor SystemsLecture on Internet Scale Sensor Systems
Lecture on Internet Scale Sensor Systems
 
08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf
08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf
08_-_Masamichi_Tanaka_-_Bigdata_and_AI_in_IOT.pdf
 
Amazon Echo Introduction, Capabilities and Vulnerabilities
Amazon Echo Introduction, Capabilities and VulnerabilitiesAmazon Echo Introduction, Capabilities and Vulnerabilities
Amazon Echo Introduction, Capabilities and Vulnerabilities
 
OpenMosix.ppt
OpenMosix.pptOpenMosix.ppt
OpenMosix.ppt
 

Recently uploaded

Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 

Recently uploaded (20)

Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 

Wireless Ad Hoc Networking Lecture Notes

  • 1. Wireless Ad Hoc Network Done By Sultan A. Al-Ghamdi (200335210) Feras Al-Shahwan (200323750) •http://www.tutorialspoint.com •http://en.kioskea.net •http://www.tomax7.com •http://www.tutorialspoint.com •http://www.ecsl.cs.sunysb.edu •http://www.computingunplugged.com •http://en.wikipedia.org •http://www.computingunplugged.com •http://common.ziffdavisinternet.com King Fahd University of Petroleum and Minerals Electrical Engineering Department EE 400 – Communication Networks
  • 2. OUTLINE  Introduction  IEEE802.11 standards  Open system interconnection model  Physical layer  Datalink layer  Network Layer  Transport Layer  Comparsion Between Ad hoc and Infrastructure Network Topologies  Applications and future implantation  Conclusion
  • 3. OUTLINE  Introduction  IEEE802.11 standards  Open system interconnection model  Physical layer  Datalink layer  Network Layer  Transport Layer  Comparsion Between Ad hoc and Infrastructure Network Topologies  Applications and future implantation  Conclusion
  • 4. Introduction  Wireless Network Topology Basic Service Set Independent Basic Service Set
  • 5. Introduction What is Ad hoc Networks?  Peer to peer communication by use of Wi-Fi technology without passing through an access point (AP)
  • 6. Introduction Why Ad hoc Networks?  No infrastructure needed  Can be deployed quickly, where there is no wireless communication infrastructure present  Can act as an extension to existing networks  Cost-effective  Adaptive computing and self-configuring
  • 7. IEEE802.11 standards Wi-Fi 802.11a/g) Wi-Fi (802.11b) Freature Wireless LAN Wireless LAN Primary Application 2.4 GHz ISM (g) 5 GHz U-NII(a) 2.4 GHz ISM Frequency Band 20 MHz 25 MHz Channel Bandwidth Half Half Half/Full Duplex OFDM (64-channels) Direct Sequence Spread Spectrum Radio Technology <=2.7 bps/Hz <=0.44 bps/Hz Bandwidth Efficiency BPSK, QPSK,16-, 64-QAM QPSK Modulation Convolution Code None FEC Optional- RC4 (AES in 802.11i) Optional- RC4 (AES in 802.11i) Encryption In development In development Mobility Vendor Proprietary Vendor Proprietary Mesh CSMA/CA CSMA/CA Access Protocol
  • 8. OUTLINE  Introduction  IEEE802.11 standards  Open system interconnection model  Physical layer  Datalink layer  Network Layer  Transport Layer  Comparsion Between Ad hoc and Infrastructure Network Topologies  Applications and future implantation  Conclusion
  • 10. OUTLINE  Introduction  IEEE802.11 standards  Open system interconnection model  Physical layer  Datalink layer  Network Layer  Transport Layer  Comparsion Between Ad hoc and Infrastructure Network Topologies  Applications and future implantation  Conclusion
  • 11. Physical Layer  Function  Modulation  Types of Modulation  Quadrature Phase Shift Keying (QPSK)  Binary Phase Shift Keying (BPSK)  Quadrature Amplitude Modulation(QAM)
  • 12. OUTLINE  Introduction  IEEE802.11 standards  Open system interconnection model  Physical layer  Datalink layer  Network Layer  Transport Layer  Comparsion Between Ad hoc and Infrastructure Network Topologies  Applications and future implantation  Conclusion
  • 13. Datalink layer  Functions  Ensures that data is transferred correctly between adjacent network nodes  Detect and correct errors that may occur in the Physical layer.  Protocols  The Logical Link Control layer (LLC)  provides multiplexing and flow control mechanisms that make it possible for multi network protocols to correlate with multipoint network  The Media Access Control layer (MAC)  The carrier sense multiple access collision avoidance method (CSMA/CA)  Point Coordination Function (PCF)
  • 14. OUTLINE  Introduction  IEEE802.11 standards  Open system interconnection model  Physical layer  Datalink layer  Network Layer  Transport Layer  Comparsion Between Ad hoc and Infrastructure Network Topologies  Applications and future implantation  Conclusion
  • 15. Network Layer  Functions  performs the process of exchanging information from one node to the other nodes of the network.   Protocols  Pro-active routing protocol (table-driven)  on demand routing protocol  Adaptive routing (situation-aware)  Flooding routing protocol  Deflection routing protocol
  • 16. OUTLINE  Introduction  IEEE802.11 standards  Open system interconnection model  Physical layer  Datalink layer  Network Layer  Transport Layer  Comparsion Between Ad hoc and Infrastructure Network Topologies  Applications and future implantation  Conclusion
  • 17. Transport Layer  Functions  The purpose of this layer is manipulating two processes in two different nodes.   Protocols  User Datagram Protocol (UDP)  UDP is a message-based connectionless protocol.  no effort to set up a reserved end-to-end connection.  Communication is done by transmitting information in one direction  Transmission Control Protocol (TCP)  TCP is a connection oriented service  TCP Provides reliable byte stream between two processes in two different machines.  Sequence number is attached to keep a track to ingoing and outgoing packets.  TCP protocols ensure that the data transfer is guaranteed.
  • 18. OUTLINE  Introduction  IEEE802.11 standards  Open system interconnection model  Physical layer  Datalink layer  Network Layer  Transport Layer  Comparsion Between Ad hoc and Infrastructure Network Topologies  Applications and future implantation  Conclusion
  • 19. April 2, 2024 19 Comparison of Ad hoc and Infrastructure Network Topologies  Scalability:  To scale up a wireless infrastructure network, the number of APs is increased to expand the coverage area or to increase the capacity  In ad hoc networks, it depends on the routing protocol  Flexibility:  Operation of infrastructure networks is very expensive  Ad hoc network is very flexible  Controllability:  Infrastructure network centrally controlled and synchronized  In ad hoc networks there is no centralized administration  Therefore, infrastructure network is more controllable than ad hoc
  • 20. April 2, 2024 20  Routing Complexity:  In ad hoc network, each node must act a router. There is a need for routing algorithms that directs the info to the appropriate next hop  This problem does not exist in infrastructure network  Coverage:  In ad hoc, coverage of the network is an issue of concern  The max distance between two nodes is the max transmission range of the nodes  In infrastructure network, two nodes communicate through AP  The max distance is twice range of the coverage of a single wireless modem Comparison of Ad hoc and Infrastructure Network Topologies
  • 21. OUTLINE  Introduction  IEEE802.11 standards  Open system interconnection model  Physical layer  Datalink layer  Network Layer  Transport Layer  Comparsion Between Ad hoc and Infrastructure Network Topologies  Applications and future implantation  Conclusion
  • 22. April 2, 2024 22 Applications and future implantation  Personal area networking  cell phone, laptop, ear phone, wrist watch  Military environments  soldiers, tanks, planes  Civilian environments  taxi cab network  meeting rooms  sports stadiums  boats, small aircraft  Emergency operations  search-and-rescue  policing and fire fighting
  • 23. OUTLINE  Introduction  IEEE802.11 standards  Open system interconnection model  Physical layer  Datalink layer  Network Layer  Transport Layer  Comparsion Between Ad hoc and Infrastructure Network Topologies  Applications and future implantation  Conclusion
  • 24. Conclusion  Ad hoc network is infrastructure less networks  Based on Wi-Fi technology  Good solution for temporary application  Cost efficient.