0% found this document useful (0 votes)
18 views6 pages

Salihu Yakubu Chapter One

Uploaded by

Aaron Kure
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views6 pages

Salihu Yakubu Chapter One

Uploaded by

Aaron Kure
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

CHAPTER ONE

1.0 BACKGROUND OF THE STUDY:

Wireless networks have significantly impacted the world, since their initial
deployment. Wireless networks have continued to develop and their uses have
significantly grown. Cellular phones are nowadays part of huge wireless network
systems and people use mobile phones on a daily basis in order to communicate
with each other and exchange information. Recently, wireless networks have been
used for positioning as well in order to enable the provision of location oriented
services to the end-user. Different types of measurements available during standard
network and terminal operation, mainly for resource management and
synchronization purposes, can be employed to derive the user’s location. With
these numerous uses of wireless network, this project will focus on resources
sharing dedicated network. A professor at the University of Hawaii, Norman
Abramson developed the world’s first wireless computer communication network,
ALOHAnet (operational in 1971), using low-cost ham-like radios. The system
included seven computers deployed over four islands to communicate with the
central computer on the Oahu Island without using phone lines. WLAN hardware
initially cost so much that it was only used as an alternative to cabled LAN in
places where cabling was difficult or impossible. Early development included
industry-specific solutions and proprietary protocols, but at the end of the 1990s
these were replaced by standards, primarily the various versions of IEEE 802.11
(in products using the Wi-Fi brand name). An alternative ATM-like 5 GHz
standardized technology, HiperLAN/2, has so far not succeeded in the market, and
with the release of the faster 54 Mbit/s 802.11a (5 GHz) and 802.11g (2.4 GHz)
standards, it is even more unlikely that it will ever succeed. In 2009 802.11n was
1
added to 802.11. It operates in both the 2.4 GHz and 5 GHz bands at a maximum
data transfer rate of 600 Mbit/s.
Most new routers are able to utilize both wireless bands, known as dualband.
This allows data communications to avoid the crowded 2.4 GHz band, which is
also shared with Bluetooth devices and microwave ovens. The 5 GHz band is also
wider than the 2.4 GHz band, with more channels, which permits a greater number
of devices to share the space. Not all channels are available in all regions.

A wireless local area network (WLAN) links two or more devices using some
wireless distribution method (typically spread-spectrum or OFDM radio), and
usually providing a connection through an access point to the wider Internet. This
gives users the ability to move around within a local coverage area and still be
connected to the network. Most modern WLANs are based on IEEE 802.11
standards, marketed under the Wi-Fi brand name.

1.1 STATEMENT OF PROBLEM

Lack of availability of wireless network has made most of us accustomed to the


limitations that come with a wired network. Especially when we want to check our
email or print a report we find ourselves confined to a certain location or cramped
space.

1.2 AIMS OF THE STUDY

The aim of this project is to design a distributed application to improve search


efficiency in unstructured wireless network using NS-2 simulator.

2
1.3 OBJECTIVES OF THE STUDY

- To design a distributed application in unstructured wireless network using


NS-2 simulator
- To take an advantage of based random walk algorithm in going distributed
search application for avoiding number of transmissions.
- To calculate time taken to cover the entire network after initiation of a
search from a randomly selected initial node in designed network

1.4 SCOPE OF STUDY


WSN is one of the demanding needs in today’s time due to its ubiquitous nature. In
the near future, WSNs can be deployed as underwater acoustic sensor systems,
cognitive sensing and spectrum management, and security and privacy
management.

1.5 SIGNIFICANT OF STUDY


Wireless sensor networks (WSNs), as distributed networks of sensors with the

capacity to detect, process and communicate have been progressively utilized in

different fields including designing, health and environment. This study is

answerable to four significant assignments; information collection, sending and

getting information and in network information handling.

1.6 LIMITATIONS

- Security: WSNs are vulnerable to various types of attacks, such as eavesdropping

3
jamming, and spoofing. Ensuring the security of the network and the data it

collects is a major challenge.

- Interference: WSNs are often deployed in environments where there is a lot of

interference from other wireless devices

1.7 TERMINOLOGIES

- ROUTER
A router is a piece of hardware or software that receives, filters, and sends data
packets across networks. A router is connected to at least two networks, commonly
LANs (Local Area Networks) or WANs (Wide Area Network).
-PROTOCOL:
These are set of rules outlining how connected devices communication across a
network to exchange information easily and safely.

-DUALBAND:

These are routers which are capable of transmitting and receiving data using both
2.4 GHz and 5GHz frequencies either simultaneously or one at a time.
Dual band also incorporate multiple-In Multiple-Out radio configurations. The
combination of several radios on one band with dual-band support provides higher
performance for home networking than single-band routers offers.

-RADIO MODEMS:

4
These are modems that transfer data wirelessly across a range of up to tens of
kilometers. Radio modems encode, transmit, receive and decode serial data using
radio waves. They connect to serial ports on devices such as video cameras and
data acquisition systems, and send signals to receive signals from other radio
modems
1.6.5 NETWORK SWITCH:

This is a computer networking device that connects devices together on a computer


network, by using a form of packet switching to forward data to the destination
device. A network switch is considered more advanced than a (repeater) hub
because a switch will only forward a message to one or multiple devices that need
to receive it, rather than broadcasting the same message out of each of its ports.

1.6.6 HUB

It is a node or physical layer networking device for connecting multiple Ethernet


devices together and making them act as a single network segment. It has multiple
input/output (I/O) ports, in which a signal introduced at the input of any port
appears at the output of every port except the original incoming.

1.6.7 NETWORK BRIDGE:

A network bridge is a computer networking device that creates a single, aggregate


network from multiple communication networks or network segments. This
function is called network bridging. (Changjin March 3, 2011)

5
1.6.8 NETWORK ANTENNA:

It is an electrical device which converts electric currents into radio waves, and vice
versa. It is usually used with a radio transmitter or radio receiver. In transmission, a
radio transmitter supplies an electric current oscillating at radio frequency (i.e. high
frequency AC) to the antenna's terminals, and the antenna radiates the energy from
the current as electromagnetic waves (radio waves). In reception, an antenna
intercepts some of the power of an electromagnetic wave in order to produce a tiny
voltage at its terminals that is applied to a receiver to be amplified. An antenna can
be used for both transmitting and receiving.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy