adhoc unit 1
adhoc unit 1
networks. power-aware
protocols,
routing
protocols,
networks: protocols
ContentionMAC
Routingprotocols wireless
in WLANs,
Whatsystems, Bluetooth.techniques,
software,voice
ofIntroduction:
applications.
Security Transport
layer network Hoc inprotocols,
designing- Ad Ad
solutions, wireless Hoc
Protocols: wirelessis
security theWANs:The computer
QoS ad
Issues
in classification, on-demand
Protocols: using withbased Wireless localincellular
hoc
Transportlayer second Characteristics
networks,
hoc Scheduling Introduction
Network in
Ad
attacks,
wireless and designing
in directional Design internet?loop,
protocols network
coding,
Networks, generation
Hoc routingDesign IEEE and
other security
layer, Tree
layer
Wireless issues, Mobile SYLLABUS
networks:
Key mechanisms, with
antennas, 802.11 architecture, error of to
transport
classification based protocols,
a issues, concept, Ad
solutions. mechanisms,
reservation and goals Ad cellular Wireless
Wireless
management, protocols multicast protocols. I P . control, Hoc
networks: multicast Hoc standard,
Ad
issues layer goals Other cellular networks
routing Hybrid MAC
and Wireless Hoc systems, IEEE channel,
lOMoARcPSD|34727502
UNIT
INTRODUCTION
VERYSHORT ANSWER QUESTIONS
Q.1. What do you mean by Ad Hoc networks?
Ans. "Ad Hoc" is actually a Latin phrase that means "for this purpose." It is often used to
describesolutionsthat are developedon-the-flyfor a specificpurpose.In computernetworking,
an ad hoc network refers to a network connection established fora single session and does
not require a router or a wireless base station.
Q.2. How Ad Hoc networks are characterized?
Ans. Ad hoc networks are characterized by need for low power consumptionand low levels
of physical security and broadcast physical medium. Asymmetric techniqueslike RSA are
not to be used as are inefficient and consume too much power.
Q.3.What is the main applicationof ad hoc networks?
Ans. An ad hoc networking will give access to the army to maintain an network among all
the soldiers,vehiclesand headquarters.It is a short range, local network where each nodes
are usually related with a given range. Because it is fairly easy to create it can be used in
time of crisis to send emergency signals.
Q.4. What are the Wi-Fi channels?
Ans. Wi-Fi channels are smaller bands within Wi-Fi frequency bands that are used by your
wireless network tosend and receive data. Dependingon which frequency band your router
s using, you have a certainnumber of Wi-Fichannelsto choose from 45 Wi-Fichannelsare
in the 5 GHz frequency band.
Q.5. What are the types of ad hoc networks?
Ans. Based on the utilizations, ad hoc networksare categorizedinto, Mobile ad hoc networks
(MANET), Wireless sensor networks (WSN),wirelessmesh networks(WMN)and vehicular
ad hoc networks (VANET).
Q.6. Why network is called ad hoc?
Ans. The network is called ad hoc because it does not rely on a pre-existinginfrastructure,
such as routers in wired networks or access points in wirelessnetworks.In the Windows
Pperating system,ad hocis acommunicationmode (setting)that allows computersto directly
communicate with each other without a router.
Introduction 7
Mobile Station
Laptop
Introduction 9
This carrier wave can be DCorAC or pulse chain dependingon the applicationused. Usually,
a high-frequencysine wave is used as a carrier wav signal.
These modulation techniques are classified into two major types: analog and digital
or pulse modulation.
Q.7. How many types of Modulation?Discuss in brief.
Ans. Types of Modulation: Their are two types of modulationdiscussedas follows:
1. Analog Modulation: In this modulation,a continuouslyvaryingsine wave is used
as a carrier wave that modulatesthe message signal or data signal. The Sinusoidal
wave's general function is shown in the figure below, in which, three parameters
can be alteredto get modulation- they are mainly amplitude,frequency,and phase,
so the types of analog modulationare:
1. Amplitude modulation (AM)
2. Frequency modulation (FM)
3. Phase modulation(PM).
2. DigitalModulation:For better quality and efficient communication,the digital
modulationtechniqueis employed.The main advantagesof digital modulationover
analog modulationinclude permissiblepower, available bandwidth,and high noise
immunity.In digitalmodulation,a message signalis convertedfrom analog to digital
message and then modulatedby using a carrier wave.
The carrier wave is keyed or switchedon and off to create pulses such that the signal is
modulated.Similarto the analog,here the parameterslike amplitude,frequency,and phase
variation of the carrier wave decides the type of digital modulation.
Q. 8. Why Modulation is used in Communication?
Ans. In the modulationtechnique,the message signalfrequencyis raised to a range so that
it is more useful for transmission.The followingpoints describe modulation'simportancein
the communication system.
In signal transmission,the signaisfrom varioussourcesare transmittedthrougha com
mon channel simultaneousiyby using multiplexers.If these signalsare transmittedsimul.
taneouslywith a certainbandwidth,they cause interference.To overcome this, speech sig
nals are modulatedto various carrier frequenciesin order for the receiver to tune them to
the desired bandwidthof his own choice within the range of transmission.
Another technicalreason is antenna size; the antenna size is inverselyproportionalto
the frequencyof the radiatedsignal. The order of the antenna aperture size is at least one
by a tenth of the wavelengthof the signal. Its size is not practicableif the signal is 5kHz;
therefore,raising frequency by modulatingprocess willcertainlyreduce the height of the
antenna.
Modulationis importantto transferthe signals over large distancessince it is not pos
sible to send low-frequencysignals for longer distances.
Similarly, modulationis also important to allocate more channels for users and to in
crease noise immunity.
Q.9. What do you mean by multiple access?
Ans. Multipleaccess is a techniquethat lets multiplemobile users share the allottedspectrum
in the most effective manner. Since the spectrum is limited, the sharing is necessary to
improve the overallcapacity over a geographicalarea. This is carried out by permitting the
available bandwidth to be used simultaneously by different users. In computer networks
and telecommunications, the multiple access method permits various terminals to connect
to the same multi-point transmission medium to transmit over it and share its capacity.A
few examplesof shared physicalmedia include bus networks,wirelessnetworks,star networks,
ring networks, half-duplex point-to-point links, etc.
Q. 10.Describe the speech or voice coding. How many type of voice coding?
Ans. Specch coding is an application of data compressionof digital audio signals
containingspeech. Speech coding uses speech-specificparameterestimationusing audio signal
processingtechniquesto model the speech signal, combined with generic data compression
algorithns torepresentthe resultingmodeled parametersin a compact bit stream.
Some applicationsof speech coding are mobile telephonyand voice over IP (VolP).The
most widely used speech coding techniquein mobile telephony islinear predictive coding(LPC),
while the most widely used in VolP applicationsare the LPC andmodified discrete cosine
transform (MDCT) techniques[citation needed].
The techniques employed in speech coding are similar to those used in audio data
compressionand audio coding where knowledgein psychoacousticsis used to transmitonly
data that is relevantto the human auditorysystem. For example, in voice band speech cod.
ing,only informationin the frequencyband 400 Hz to 3500Hz is transmittedbut the recon
structed signal is still adequate for intelligibility.
Speech coding differs from other forms of audio coding in that speech is a simplersignal
than most other audio signals,and a lot more statisticalinformationis availableabout the
properties of speech.As a result, some auditory information which is relevant in audio
coding can beunnecessaryin the speech coding context. In speech coding, the most impor
tant criterionis preservationof intelligibilityand "pleasantness"of speech, with aconstrained
amount of transmitted data.
Speech codes are of two types:
Waveform coders: Time-domain: PCM, ADPCM.
Frequency-domain: Sub-band coding, ATRACVO coders.
Linear predictive coding (LPC): Formant coding.
Q. 11. Discuss about the history of error control.
Ans. ln acomputer system or in a communicationsystem, of error-detecting and/or error
correctingcodes with the intention of removing the effects of error and/or recording the
prevalenceof error in the system.The effects of errors may be removed by correctingthem
in all but anegligible proportion of cases. Error control aims.to cope with errors owing
to noise or to equipmentmalfunction,in which caseitoverlapswith fault tolerance(see fault
tolerant system) but not usually with the effects of errors in the design of hardware or
software.An importantaspect is the preventionof mistakes by users. Checkingof data by
software as it is entered is an essential feature of the design of reliable application programs.
Q. 12.What do you know about Computernetwork?
Ans. Acomputer network is a set of computerssharing resources located on or provided
by network nodes. The computers use common communication protocolsover digital
interconnections to communicate with each other. These interconnections are made up
Introduction 11
Advantages of Peer-To-PeerNetwork:
1. It is less costly as it does not contain any dedicated server.
2. lf one computerstops working but, other computerswill not stop working.
3. It is easy to set up and maintain as each computer manages itself.
Introduction 13
Introduction 15
ability to move around within the area and remain connected to the network. Through
a gateway, a WLAN can also provide a connection to the wider Internet.
Wireless LANs based on the IEEE 802. 11 standards are the mOst widely used computer
networksin the world. These are commonlycalled Wi-Fi, which is a trademark belongingto
the Wi-FiAlliance.They are used for home and smalloffice networksthat link togetherlaptop
computers,printers,Smartphone's,Web TVs and gamingdeviceswith a wirelessrouter which
links them to the internet. Hotspots provided by routers at restaurants, coffee shops, ho
tels, libraries,and airports allow consumers to access the internet with portable wireless
devices.
WirelessLAN hardware initiallycost so much that it was only used as an alternativeto
cabled LAN inplaces where cabling wasdifficultor impossible.Early developmentincluded
industry-specific solutions and proprietary protocols,but at the end of the 1990s these were
replaced by technical standards, primarily the various versions of IEEE 802.
Q. 22. What are the advantagesand disadvantagesof WLAN?
Ans. Advantages of wireless local area network (WLAN).
1. It's a reliable sort of communication.
2. As WLAN reduces physical wires so it's a versatile way of communication.WLAN
also reduces the value of ownership.
3. It's easier to feature or remove workstation.
4. It provides high rate thanks to small area coverage.
5. You'llalso move workstationwhile maintaining the connectivity.
6. For propagation,the sunshineof sight isn't required.
7. The direction of connectivity is often anywhere i.e., youll connect devices in any
direction unless it's within the range of access point.
8. Easy installation and you would like don't need extra cables for installation.
9. WLAN are often usefulin disasters situation e.g., earthquake and fire. Wireles$
network can connect peole in any disaster.
10. It's economicaldue to the tiny area access.
11. The amount of powerit requires is more as it uses transmitter; therefore, the battery
life of laptops can be affected.
Disadvantages of wireless local area network (WLAN):
1. WLAN requires license.
2. It's a limited area to hide.
3. The Governmentagenciescan control the flow of signals of WLAN and can also liait
it if required. Thiswill affect data transfer from connecteddevices to the web.
4. If the amount of connected devices increases then data transfer rate decreases.
5. WLAN uses frequency which may interferewith other deviceswhich use frequency
6. If there's rain or thunder then communication may interfere.
7. Due to low security as attackers can get access to the transmitted data.
8. Signals could also be suffering from the environment as compared to using fiber
optics.
environment.
9. The radiation of WILAN are often harmful to the
Downloaded by Mohd Nadeem (mn7119281@gmail.com)
lOMoARcPSD|34727502
Introduction 17