0% found this document useful (0 votes)
18 views

adhoc unit 1

unit .net1

Uploaded by

Mohd Nadeem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

adhoc unit 1

unit .net1

Uploaded by

Mohd Nadeem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

lOMoARcPSD|34727502

Ad1st - fghjk fghj ghj

B.Tech (Uttarakhand Technical University)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by Mohd Nadeem (mn7119281@gmail.com)
UNIT-V: UNIT-IV: UNIT-IIl: Wireless
UNIT-I1: UNIT-:

networks. power-aware
protocols,
routing
protocols,
networks: protocols
ContentionMAC
Routingprotocols wireless
in WLANs,
Whatsystems, Bluetooth.techniques,
software,voice
ofIntroduction:
applications.
Security Transport
layer network Hoc inprotocols,
designing- Ad Ad
solutions, wireless Hoc
Protocols: wirelessis
security theWANs:The computer
QoS ad
Issues
in classification, on-demand
Protocols: using withbased Wireless localincellular
hoc
Transportlayer second Characteristics
networks,
hoc Scheduling Introduction
Network in
Ad
attacks,
wireless and designing
in directional Design internet?loop,
protocols network
coding,
Networks, generation
Hoc routingDesign IEEE and
other security
layer, Tree
layer
Wireless issues, Mobile SYLLABUS
networks:
Key mechanisms, with
antennas, 802.11 architecture, error of to
transport
classification based protocols,
a issues, concept, Ad
solutions. mechanisms,
reservation and goals Ad cellular Wireless
Wireless
management, protocols multicast protocols. I P . control, Hoc
networks: multicast Hoc standard,
Ad
issues layer goals Other cellular networks
routing Hybrid MAC
and Wireless Hoc systems, IEEE channel,
lOMoARcPSD|34727502

of for and MACclassification. WirelessIEEE computer


Classifications protocols
and routingMulticast protocols architecture, firstthe 802
secure Transport Ad protocols, routing
classification. t h e Modulation -
challenges protocols. Internet. 802.16 Networking definition,
third
fo r
Hocprotocols.
protocols, Networks: networks,Networks
routing Layer routing that
Contention
wireless operation
Ad generation
standard.
techniques,

Downloaded by Mohd Nadeem (mn7119281@gmail.com)


ofQoS inHoc Contention
usebased
MAC characteristics
standard,
security solutions,
in in Table directional Introduction, computer
networks
Adwireless networks: Ad
Hierarchical
of Wireless generation
cellular
soluteons, based cellular
multicast HOC driven fundamentalsmultiple
provisioning,
Hoc TCP
protocols,
antennas, systems,
Internet: features,
wirelessnetworks, over wireless
routing routing
routing
MAC Issues Issues access
Ad
lOMoARcPSD|34727502

UNIT

INTRODUCTION
VERYSHORT ANSWER QUESTIONS
Q.1. What do you mean by Ad Hoc networks?
Ans. "Ad Hoc" is actually a Latin phrase that means "for this purpose." It is often used to
describesolutionsthat are developedon-the-flyfor a specificpurpose.In computernetworking,
an ad hoc network refers to a network connection established fora single session and does
not require a router or a wireless base station.
Q.2. How Ad Hoc networks are characterized?
Ans. Ad hoc networks are characterized by need for low power consumptionand low levels
of physical security and broadcast physical medium. Asymmetric techniqueslike RSA are
not to be used as are inefficient and consume too much power.
Q.3.What is the main applicationof ad hoc networks?
Ans. An ad hoc networking will give access to the army to maintain an network among all
the soldiers,vehiclesand headquarters.It is a short range, local network where each nodes
are usually related with a given range. Because it is fairly easy to create it can be used in
time of crisis to send emergency signals.
Q.4. What are the Wi-Fi channels?
Ans. Wi-Fi channels are smaller bands within Wi-Fi frequency bands that are used by your
wireless network tosend and receive data. Dependingon which frequency band your router
s using, you have a certainnumber of Wi-Fichannelsto choose from 45 Wi-Fichannelsare
in the 5 GHz frequency band.
Q.5. What are the types of ad hoc networks?
Ans. Based on the utilizations, ad hoc networksare categorizedinto, Mobile ad hoc networks
(MANET), Wireless sensor networks (WSN),wirelessmesh networks(WMN)and vehicular
ad hoc networks (VANET).
Q.6. Why network is called ad hoc?
Ans. The network is called ad hoc because it does not rely on a pre-existinginfrastructure,
such as routers in wired networks or access points in wirelessnetworks.In the Windows
Pperating system,ad hocis acommunicationmode (setting)that allows computersto directly
communicate with each other without a router.

Downloaded by Mohd Nadeem (mn7119281@gmail.com)


lOMoARcPSD|34727502

6 Ad hoc and Wireless Networks

Q.7. What are infrastructure and ad hoc mnode?


Ans. In infrastructure mode, alldeviceson a wirelessnetworkcommunicatewith each other
throughan access point (wirelessrouter). In ad hoc mode, a computerwith a wirelessnetwork
adapter communicates directly with a printer equipped with a wireless print server.
Q.8. What is the premise behind voice coding?
Ans. The premise behind voice coding,an approachto developingsoftwareusing voice instead
of a keyboard and mouse to write code. Through voice-codingpl¡ttorms, program mers utter
commands to manipulate code and create custom commands that cater to and automate
their workflows.
Q.9. Define error control.
Ans. Error control is the technique of detecting and correcting blocks of data during
communication. In other words, it checks the reliability of characters both at the bit level
and packet level.
Q.10. What do you me an by Computer Networks?
b
Ans. A computer network is a set of computers sharing resources located on or provided
network nodes.
Q.11. What is the network software?
Ans. Any software that interacts, increases and facilitates the fungtions of a computer network i
called network software.
Q.12. What is the comnputer network architecture?
Ans.Computer Network Architectureis defined as the physical and logical design of th
software, hardware,protocols,and media of the transmissionof data.
Q.13. What is IEEE 802 networking standard?
Ans. IEEE802 is a collectionof networkingstandardsthat cover the physicaland data-lin
layer specificationsfor technologiessuch as Ethernet and wireless.These specificatio
apply tolocal area networks (LAN) and metropolitanarea networks (MAN).
Q.14. Define the term WILANS.
Ans.A wireless LAN (WLAN)is a wireless computer network that links two or more device
u81ng Wireless communication to form a local area network (LAN) within a limited are
such as a home, school, computer laboratory, campus, or office building.
Q.15. What is Bluetooth?
Ans. Bluetoothis a short-rangewireless technology standardthat is used for exchangin
databetween fixed and mobile devices over short distances using UHF.
Q.16. What do you mean by an ad hoc?
Ans. Ad hoc is a word that originallycomes from Latin and means "for this" or "for thi
situation."In currentAmericanEnglishit is used to describesomethingthat has been forme
or used for aspecial and immediate purpose,without previous planning.Ad hoc can be use
as an adjective or an adverb.

Downloaded by Mohd Nadeem (mn7119281@gmail.com)


lOMoARcPSD|34727502

Introduction 7

LONG ANSWER QUESTIONS


Q. 1. What do you understand by an ad hoc network? What are the types of ad hoc
networks?
Ans.An ad hoc network is a temporarytype of Local Area Network (LAN). If you set up an
ad hocnetwork permanently,it becomesa LAN. Multipledevicescan use an ad hoc network
at the same time, but this might cause a lull in performance.With an ad hoc network,
several devices can share the host device's internet access.
For example,if youneed totransfera file to your friend's laptop,you might create an ad
hoc network between your computerand his laptop to transfer the file.
The type of ad hoc networks:
Mobile ad hocnetworks(MANET),wirelesssensor networks(WSN), wirelessmesh networks
(WMN) and vehicular ad hoc networks (VANET).
Wi-FiAP Cellular Tower
Backbone

Mobile Station
Laptop

Ad Hoc Wireless Network

Q. 2.What are the advantagesand disadvantagesof an ad hoc network?


Ans. The Advantages of Ad Hoc Networks:
1. Router Free: Connectingto files on other computersand/or the Internet wit!:out
the need for a wireless router is the main advantage of using an ad hoc netwo:.
2. Mobility:Ad hoc networks can be created on the fly in nearly any situationwhere
there are multiple wireless devices.
3. Speed.
The Disadvantages of Ad Hoc Networks:
1. Ad-hoc networks are slower than traditional networks.
2. Ad-hoc networks are slower than traditional networks.They are usually less secure
due to commonly using wirelessconnections(whichare less secure than wired ones)
and there is nocentral device for managingthe securityof the network.
Q.3.What is the principle of Ad Hoc Networking?
Ans. Principlesof ad hoc networkingpresentsa systematicintroductionto the fundamentals
of ad hoc networks. An ad hoc network is a small network, especiallyone with wireless or
temporaryplug-inconnections.Typically,someof the networkdevicesare part of the network
only for the durationof a communicationssessionor, in the case of mobile or portabledevices,
while in some close proximity to the rest of the network.These networks can range from

Downloaded by Mohd Nadeem (mn7119281@gmail.com)


lOMoARcPSD|34727502

Ad hocand Wireless Networks

small and static systems with constrainedpower resources to larger-scaledynamic and


mobile environments.Wirelessad hoc networksfacilitatenumerousand diverseapplications
for establishingsurvivabledynamic systems in emergencyand rescue operations,disaster
reliefand intelligenthome settings.Principlesof Ad Hoc Networking:Introducesthe essential
characteristicsof ad hoc networkssuch as: physical layer,medium access control,Bluetooth
discovery and network formation,wireless network programmingand protocols.Explains
the crucialcomponentsinvolvedin ad hoc networksin detail with numerousexercisesto aid
understanding.
Q. 4. What do you understand by wireless communicationchannel and wireess
channel model?
Ans. A
channelis the band of RF used for the wirelesscommunication.Each IEEE wireless
standardspecifiesthe channels that canbe used. The 802.1lastandardspecifiesradio frequency
ranges between 5.15 and 5.875 GHz. In contrast,802.11b and 802.1lgstandards operatein
the 2.4 to 2.497 GHz range.
WirelessChannel Model. A channel model is a mathematicalrepresentationof the
effects of a communicationchannel through which wireless signals are propagated.The
channel modelcan representthe power loss incurred by thesignal as it travels through the
wireless medium.
Q. 5. What are the characteristics of communications?
Ans. Characteristics of communications are given below:
1. Twoor More Persons: The first importantcharacteristicof communicationis that
there must be a minimum number of two persons because no single individualcan
have an exchange of ideas with himself. A listeneris necessaryto receive one's ideas.
Therefore,there must be at least two persons-thesender of information and the
receiver.

2. Exchangeof Ideas: Communicationcannot be thoughtof in the


of ideas. In order to complete the process of absenceof exchange
communication
of ideas, orders, feelings, etc. , among two or more
there must be an exchange
than two persons.
3. MutualUnderstanding:Mutual
understandingmeans that the receiver should
receive the informationin the same spiritwith which it is being
of communication,it is more important to given. In the procesS
carry it out.
understandthe informationrather than
4. Direct and Indirect
Communication:It is not necessaryin communicationtha.
the receiver and giver of information should be
face-to-face with each other.
Communicationcan be both direct and indirect. Direct
to-face conversation,while indirect communicationmeans tace
5. Continuous Process: communication is through other means.
Communicationis an endless process, as is the case wi
businesswhere the manager continuouslyassigns work to his subordinates,tries to
know the progress of the work and gives
directions.
Q. 6. What is modulation?Classify
Modulationtechniques?
Ans. Modulationis a process of changing the
characteristicsof the wave to be
by superimposingthe message signal on the high-frequencysignal. In this transmitted
voice and other data signals modify high-frequencysignals, also known as theprocess video.
carrier wave.
Downloaded by Mohd Nadeem (mn7119281@gmail.com)
lOMoARcPSD|34727502

Introduction 9

This carrier wave can be DCorAC or pulse chain dependingon the applicationused. Usually,
a high-frequencysine wave is used as a carrier wav signal.
These modulation techniques are classified into two major types: analog and digital
or pulse modulation.
Q.7. How many types of Modulation?Discuss in brief.
Ans. Types of Modulation: Their are two types of modulationdiscussedas follows:
1. Analog Modulation: In this modulation,a continuouslyvaryingsine wave is used
as a carrier wave that modulatesthe message signal or data signal. The Sinusoidal
wave's general function is shown in the figure below, in which, three parameters
can be alteredto get modulation- they are mainly amplitude,frequency,and phase,
so the types of analog modulationare:
1. Amplitude modulation (AM)
2. Frequency modulation (FM)
3. Phase modulation(PM).
2. DigitalModulation:For better quality and efficient communication,the digital
modulationtechniqueis employed.The main advantagesof digital modulationover
analog modulationinclude permissiblepower, available bandwidth,and high noise
immunity.In digitalmodulation,a message signalis convertedfrom analog to digital
message and then modulatedby using a carrier wave.
The carrier wave is keyed or switchedon and off to create pulses such that the signal is
modulated.Similarto the analog,here the parameterslike amplitude,frequency,and phase
variation of the carrier wave decides the type of digital modulation.
Q. 8. Why Modulation is used in Communication?
Ans. In the modulationtechnique,the message signalfrequencyis raised to a range so that
it is more useful for transmission.The followingpoints describe modulation'simportancein
the communication system.
In signal transmission,the signaisfrom varioussourcesare transmittedthrougha com
mon channel simultaneousiyby using multiplexers.If these signalsare transmittedsimul.
taneouslywith a certainbandwidth,they cause interference.To overcome this, speech sig
nals are modulatedto various carrier frequenciesin order for the receiver to tune them to
the desired bandwidthof his own choice within the range of transmission.
Another technicalreason is antenna size; the antenna size is inverselyproportionalto
the frequencyof the radiatedsignal. The order of the antenna aperture size is at least one
by a tenth of the wavelengthof the signal. Its size is not practicableif the signal is 5kHz;
therefore,raising frequency by modulatingprocess willcertainlyreduce the height of the
antenna.
Modulationis importantto transferthe signals over large distancessince it is not pos
sible to send low-frequencysignals for longer distances.
Similarly, modulationis also important to allocate more channels for users and to in
crease noise immunity.
Q.9. What do you mean by multiple access?
Ans. Multipleaccess is a techniquethat lets multiplemobile users share the allottedspectrum
in the most effective manner. Since the spectrum is limited, the sharing is necessary to

Downloaded by Mohd Nadeem (mn7119281@gmail.com)


lOMoARcPSD|34727502

10 Adhoc and Wireless Networks

improve the overallcapacity over a geographicalarea. This is carried out by permitting the
available bandwidth to be used simultaneously by different users. In computer networks
and telecommunications, the multiple access method permits various terminals to connect
to the same multi-point transmission medium to transmit over it and share its capacity.A
few examplesof shared physicalmedia include bus networks,wirelessnetworks,star networks,
ring networks, half-duplex point-to-point links, etc.
Q. 10.Describe the speech or voice coding. How many type of voice coding?
Ans. Specch coding is an application of data compressionof digital audio signals
containingspeech. Speech coding uses speech-specificparameterestimationusing audio signal
processingtechniquesto model the speech signal, combined with generic data compression
algorithns torepresentthe resultingmodeled parametersin a compact bit stream.
Some applicationsof speech coding are mobile telephonyand voice over IP (VolP).The
most widely used speech coding techniquein mobile telephony islinear predictive coding(LPC),
while the most widely used in VolP applicationsare the LPC andmodified discrete cosine
transform (MDCT) techniques[citation needed].
The techniques employed in speech coding are similar to those used in audio data
compressionand audio coding where knowledgein psychoacousticsis used to transmitonly
data that is relevantto the human auditorysystem. For example, in voice band speech cod.
ing,only informationin the frequencyband 400 Hz to 3500Hz is transmittedbut the recon
structed signal is still adequate for intelligibility.
Speech coding differs from other forms of audio coding in that speech is a simplersignal
than most other audio signals,and a lot more statisticalinformationis availableabout the
properties of speech.As a result, some auditory information which is relevant in audio
coding can beunnecessaryin the speech coding context. In speech coding, the most impor
tant criterionis preservationof intelligibilityand "pleasantness"of speech, with aconstrained
amount of transmitted data.
Speech codes are of two types:
Waveform coders: Time-domain: PCM, ADPCM.
Frequency-domain: Sub-band coding, ATRACVO coders.
Linear predictive coding (LPC): Formant coding.
Q. 11. Discuss about the history of error control.
Ans. ln acomputer system or in a communicationsystem, of error-detecting and/or error
correctingcodes with the intention of removing the effects of error and/or recording the
prevalenceof error in the system.The effects of errors may be removed by correctingthem
in all but anegligible proportion of cases. Error control aims.to cope with errors owing
to noise or to equipmentmalfunction,in which caseitoverlapswith fault tolerance(see fault
tolerant system) but not usually with the effects of errors in the design of hardware or
software.An importantaspect is the preventionof mistakes by users. Checkingof data by
software as it is entered is an essential feature of the design of reliable application programs.
Q. 12.What do you know about Computernetwork?
Ans. Acomputer network is a set of computerssharing resources located on or provided
by network nodes. The computers use common communication protocolsover digital
interconnections to communicate with each other. These interconnections are made up

Downloaded by Mohd Nadeem (mn7119281@gmail.com)


lOMoARcPSD|34727502

Introduction 11

of telecommunicationnetwork technologies,based on physicallywired, optical,and wireless


radio-frequencymethods that may be arranged in a variety of topologies. The nodes of a
computernetwork may include personalcomputers,servers, networkinghardware,or other
specializedor general-purposehosts. They are identifiedby network addresses, and may
have hostnames.Hostnamesserve as memorablelabels for the nodes, rarely changedafter
initial assignment.Network addresses serve for locating and identifying the nodes by
communicationprotocolssuch as the Internet Protocol.
Computer networks may be classified by many criteria, including the transmission
medium used to carry signals, bandwidth,communicationsprotocolsto organize network
traffic, the network size, the topology, traffic control mechanism, and organizationalin
tent. Computernetworkssupportmany applicationsand services,such as access to the World
Wide Web, digital video, digital audio, shared use of applicationand storage servers, print
ers, and fax machines, and use of email and instant messaging applications.
Q. 13. Writea short note on computer network software and also write its advan
tages.
Ans. Any softwarethat interacts, increasesand facilitatesthe functionsof a computernetwork
is called network software. There are two basic types of networking;the first type allows
two computers to share, send and receive data files via network while the second type of
networkingallows shared access liberty to all the users and systems that are part of the
network.
Networkingsoftware has become an integral part of computer networks as they facili
tate the mode of communication and data sharing. As a user, you must know how your
computer network works and allthe devices that enables this networking to be efficient.
Lineaments ofnetwork software: There are several types of network software avail
able,each differ in their functionalityand purpose. Some network software are specialized
in solving accounting task and mathematical calculations, others just serve as a path of
communicationbetween two or more computers. While there is network software that works
on their own, however, some software is known to store large chunkS of data and allows
authorizedaccess to the users, programsorsystems.
Advantages offered by network software: Network software is known to increase
productivityof the system. Offers intuitive and creative ways to share informationand
effectivelycommunicate.Networkingsoftware has become an essentialpart of today's com
puting world where shared information,effectivecommunicationand reliable productivity
is needed and valued in modern age.
2. 14. How many Types of network software?
Ans.Types of network software.
1. Networkoperatingsystem: NOS is a system that offers a shared platformfor all
the connectedcompters that can run a shared application.Net, and Novell Netware
are popular examplesof network software.
2. Shared network: Networkingsoftware whose applicationsare centrally saved and
each individual computer can access the applications on their own. Oracle is an
example of such network software.
3. Client server network programs: One component of such applications is stored
on client's system and the other one is stored on server. Both systems then communicate

Downloaded by Mohd Nadeem (mn7119281@gmail.com)


lOMoARcPSD|34727502

12 Ad hocand Wireless Networks


with each other and utilize their part of the component accordingly.For example.
Microsoftexchanges.
4. Anticipation about network software: As the technology progresses and does
wonderswith our daily lives andredefinedbusinessesthere is absolutelyno limitto
what it eventuallydoes with all the information,potentialof growth,creativityand
innovations.We can only anticipatethat networksimitateneural networkof human
brain,there might come a time when computernetworksstart working like human
brain.Of course there is no limit to the thoughtsand not on the heightsof anticipation
what computer networks might achieve in future.
Q. 15. Define computer network architectures and write its types. Discuss about
peer to peer network with their advantages and disadvantages.
Ans.Computer Network Architectureis defined as the physical and logical design of the
software, hardware, protocols, and media of the transmissionof data. Simply we can say
that how computersare organized and how tasks are allocated to the computer.
The two types of network architectures are used.
1. Peer-To-Peer network
2. Client/Server network.
Peer-T'o-Peer network
1. Peer-To-Peernetwork is a network in which all the computersare linked together
with equalprivilegeand reeponsibilitiesfor processingthe data.
2. Peer-To-Peer network is useful for small environments, usually up to 10 computers
3. Peer-To-Peer network has no dedicated server.
4. Special permissions are assigned to each conmputer for sharing the resources, but
this can lead to a problem if the computer with the resource is down.

Advantages of Peer-To-PeerNetwork:
1. It is less costly as it does not contain any dedicated server.
2. lf one computerstops working but, other computerswill not stop working.
3. It is easy to set up and maintain as each computer manages itself.

Downloaded by Mohd Nadeem (mn7119281@gmail.com)


lOMoARcPSD|34727502

Introduction 13

Disadvantages of Peer-To-Peer Network:


1. In the case of Peer-To-Peer network, it does not
contain the centralizedsystem.
Therefore,it cannot back up the data as the data is differentin different locations.
2. It has a security issue as the device is managed itself.
Q. 16. What are the characteristicsof the network
architectures?Discuss briefly.
Ans. Fourbasic characteristics of network
architectures:
1. Fault Tolerance:Communicationtechnologiesform part of our
daily lives and often
we don't realize howmuch werely on it. It is an assumptionwhen we
cards around with us that when we arrive at the checkoutwe will be carry our bank
able to pay for
our goods. The Internet is probably the most obvious example. The name
comes from the words interconnectedand networks, so you shouldn't be surprised
Internet
when Isay there is more than one possible route your request for google. com
will
take between your computerand the server that deliversyour page. This fault tolerance
has been built into the Internet and provides a means for traffic to take
alternate
routes if a particular service or connection is unavailableat the time of the request.
2. Scalability:If would be frustratingand costly if you had to rebuild sections of or
indeed an entire network just because you need to add some devices. A scalable
network is designed usinga layered, hierarchicalmodel that means addingadditional
nodes and groups of nodes don't affect the existing network. The internet has been
designed to be scalable, achieved through a tiered and hierarchical architecture.
3. Quality of Service (and Convergent Networks): Toexplain quality of service, it
is work first defining the meaning of a converged network. To converge means "to be
adjacentor to come together"and in the contextof networkingit reallymeans multiple
forms of communicationexistingon the same network.In the early days of the Internet
and before only basic formsof media were transmitted across a network, mostly text
and the odd picture. Nowadays, we have streamingmedia such as video and music,
and telephony in the form of VolP (Voice over IP).
4. Security:Without networks,data securitywould reallyjust be a matterof securing
the storage medium data is stored on in a physical location, in other words you
secure access to the hardware. With networks, the transferof data from point A to
point Bcan also be of concernto an organization.Securityis not inherentin computer
networks as there are many points where the transfer of data can be monitoredor
intercepted,and the kind of data we transfercan be extremelysensitive(personal
information,bank details,trade secrets, etc. ) securityhas become an essentialpart
of computernetworking.Networksecuritycan be brokendown into twoparts: network
infrastructuresecuritywhich relatesto controllingphysicaland managementaccess
to the network hardware; and contentsecurity,which is the controlof contentstored
on the network attached devices.
Q. 17.Define computernetwork and dicuss its types.
Ans. Acomputer network is a group of computers connected with each other through a
transmissionmedium such as cable, wire etc. In this guide, we will discuss the types of
computer networks in detail.

Downloaded by Mohd Nadeem (mn7119281@gmail.com)


lOMoARcPSD|34727502

14 Ad hoc and Wireless Networks

Types of Computer Network: Thereare mainly three types of computer networks


based on their size:
1. Local Area Network (LAN)
2. MetropolitanArea Network (MAN)
3. Wide areanetwork (WAN)
1. Local Area Network (LAN):
1. Local area network is a group of computers connected with each other in a small
places such as school, hospital,apartmentetc.
2. LAN is secure because there is no outside connection with the local area network
thus the data which is shared is safe on the local area network and can't be accessed
outside.
3. LAN due to their smallsize are considerablyfaster,their speed can range anywhere
from 100 to 100 Mbps.
4. LANS are not limited to wire connection;there is a new evolutionto the LANs tha
allows local area network to work on a wireless connection.
2. Metropolitan Area Network (MAN):
MAN networkcovers larger area by connectionsLANs to a larger networkof computers
In Metropolitanarea network various Local area networks are connectedwith each othe
throughtelephone lines.The size of the Metropolitanarea networkis largerthan LANs an
smaller than WANs (wide area networks),a MANs covers the larger area of a city or towI
3. Wide area network (WAN):
Wide area network provides long distance transmission of data. The size of the WAN
larger than LAN and MAN.A WAN can cover country, continent or even a whole worlo
Internetconnection is an example of WAN.Other examples of WAN are mobile broadban
connections such as 3G,4G etc.
Q. 18. What are the advantagesand disadvantagesof WAN?
Ans. Advantages of WAN.
Centralized infrastructure: One of the main advantageof WAN is the that we do nc
need to maintain the backup and store data on local system as everything is stored onli
on a data centre, from where we can access the data through WAN.
Privacy:We can setup the WAN in such away that it encryptsthe datathat we sha
online that way the data is secure and minimises the risk of unauthorized access.
Increased Bandwidth: With the WAN we get to choose the bandwidth based on th
need, a large organizationcan have larger bandwidth that can carry large amount of da:
faster and efficiently.
Area: A WAN can cover a large area or even a whole world though internet connecti
thuswe can connectwith the person in anothercountry through WAN which is not possib
is other.typeof computer networks.
Disadvantages of WAN:
Antivirus: Since our systems are connectedwith the large amount of systems, there
possibilitythat we may unknowinglydownload the virus that can affect our system a
becomes threat to our privacy and may lead to data loss.
Downloaded by Mohd Nadeem (mn7119281@gmail.com)
lOMoARcPSD|34727502

Introduction 15

Expensive: Cost of installation is very high.


Issue resolution: Issue resolution takes time as the WAN covers large area, it is really
difficultto pin point the exact location where the issues raised and causing the problem.
Q. 19. Discuss about the history of IEEE 802 standards Network.
Ans. This issue of 1EEE CommunicationsStandards Magazine has a number of articles
about Time Sensitive Networking(TSN),especiallyas it is related to IEEE Std. 802. 1.
While many readersare familiarwith the IEEE 802 family of standards,few are fully aware
of the long historyof 802. In the late 1970s, there was considerablediscussionat conferences
and elsewhere about the topic of computer communications.It is well known that in the
early 1970s, Bob Metcalfe, while at Xerox PARC, developedthe ideafor Ethernetbased on
his Ph. D. dissertation and ALOHA net. Coincidently,on August 25. 1979, a proposal was
submitted to the IEEE StandardsBoard for the developmentof standardsentitled"Local
Network for ComputerInterconnection"and was assigned the next number in the sequence
of IEEE standards:802. "The IEEE 802. 1Working Group is charteredtoconcernitself with
and develop standardsand recom mended practices in the following areas: 802 LAN/MAN
architecture,internetworkingamong 802 LANs, MANs and other wide area networks,802
Security,802 overallnetwork management,and protocol layers above the MAC &LLC layers."
Q. 20. Deseribe the Characteristics Specified in the IEEE s02 Standards networks.
Ans. The IEEE standardsspecify the characteristicsof the networkingsystems, including
speed, access methods,topologies, and media.Althoughyou don't need detailed knowledge
of all these IEEE standardsin real-world applications,a general understandingof these
standards willbe an asset.
Speed: Many factors contribute to the speed of a network. The standard defines the
maximum speed of a networkingsystem. The speed normally is measured in megabits per
second (Mbps), althoughsome faster network systems use gigabitsper second (that is, Gbps,
where 1Gbps is equivalentto 1000Mbps). Some networksare faster than others. For example,
a token ring (802. 5) network has a maximum speed of 16 Mbs. Many ethernet networks
(802. 3 variants) now operate at 100 Mbps and far beyond. However, the maximum speed
attainable on a network can be affected by many factors. Networks that achieve 100% of
their potentialbandwidthare few and far between.
Access Methods: Access methods govern the way in which systems access the network
media and send data. Access methods are necessary to ensure that systems on the network
can communicatewith each other. Without an access method, it would be possible for two
systems to com municateat the exclusionofevery other system. Access methods ensure that
everyone gets an opportunity to use the network.
Q. 21.Write ashort note on fundamental of WLAN.
Ans. Norman Abramson, a professor at the University of Hawaii, developed the world's
first wireless computer communication network, ALOHA net. The system became operational
in 1971and included seven computers deployed over four islands to communicate with the
centralcomputeron the Oahuisland without using phone lines.
A wirelessLAN (WLAN) is a wireless computernetwork that links two or more devices
using wirelesscommunicationto form alocal area network (LAN) within a limited area such
as a home, school, computer laboratory, campus, or office building. This gives users the

Downloaded by Mohd Nadeem (mn7119281@gmail.com)


lOMoARcPSD|34727502

16 Ad hoc and Wireless Networks

ability to move around within the area and remain connected to the network. Through
a gateway, a WLAN can also provide a connection to the wider Internet.
Wireless LANs based on the IEEE 802. 11 standards are the mOst widely used computer
networksin the world. These are commonlycalled Wi-Fi, which is a trademark belongingto
the Wi-FiAlliance.They are used for home and smalloffice networksthat link togetherlaptop
computers,printers,Smartphone's,Web TVs and gamingdeviceswith a wirelessrouter which
links them to the internet. Hotspots provided by routers at restaurants, coffee shops, ho
tels, libraries,and airports allow consumers to access the internet with portable wireless
devices.
WirelessLAN hardware initiallycost so much that it was only used as an alternativeto
cabled LAN inplaces where cabling wasdifficultor impossible.Early developmentincluded
industry-specific solutions and proprietary protocols,but at the end of the 1990s these were
replaced by technical standards, primarily the various versions of IEEE 802.
Q. 22. What are the advantagesand disadvantagesof WLAN?
Ans. Advantages of wireless local area network (WLAN).
1. It's a reliable sort of communication.
2. As WLAN reduces physical wires so it's a versatile way of communication.WLAN
also reduces the value of ownership.
3. It's easier to feature or remove workstation.
4. It provides high rate thanks to small area coverage.
5. You'llalso move workstationwhile maintaining the connectivity.
6. For propagation,the sunshineof sight isn't required.
7. The direction of connectivity is often anywhere i.e., youll connect devices in any
direction unless it's within the range of access point.
8. Easy installation and you would like don't need extra cables for installation.
9. WLAN are often usefulin disasters situation e.g., earthquake and fire. Wireles$
network can connect peole in any disaster.
10. It's economicaldue to the tiny area access.
11. The amount of powerit requires is more as it uses transmitter; therefore, the battery
life of laptops can be affected.
Disadvantages of wireless local area network (WLAN):
1. WLAN requires license.
2. It's a limited area to hide.
3. The Governmentagenciescan control the flow of signals of WLAN and can also liait
it if required. Thiswill affect data transfer from connecteddevices to the web.
4. If the amount of connected devices increases then data transfer rate decreases.
5. WLAN uses frequency which may interferewith other deviceswhich use frequency
6. If there's rain or thunder then communication may interfere.
7. Due to low security as attackers can get access to the transmitted data.
8. Signals could also be suffering from the environment as compared to using fiber
optics.
environment.
9. The radiation of WILAN are often harmful to the
Downloaded by Mohd Nadeem (mn7119281@gmail.com)
lOMoARcPSD|34727502

Introduction 17

10. Wlan is expensive than wires and hubs as it access point8.


11. Signals can get from ne arest signals by access points.
12. It's required to vary the network card and access point when standard changes.
13. LAN cable remains required which acts because the backbone of the WLAN.
14. Low data transfer rate than wired connection because WLAN uses frequency.
15. Chances of errors are high.
16. Communication isn't secure and may be accessed by unauthorized users.
9. 23. What is Bluetooth? Where is Bluetooth used?
Ans. Bluetoothis a wirelesstechnologythat allowsdata transmissionbetween twodevices.
It is used to connect different devices such as the headphones, speakers, printers, laptops
and smart phones.
Today it is closely impossibleto find any mobile phones without the Bluetoothtechnol
ogy.In fact it is mostly seen in cell phones. Like every other technology bluetooth isn't
perfect. It hasgot its own limitations.
Q. 24. What are the advantages and disadvantagesof Bluetooth?
Ans.Advantages of Bluetooth:
" It avoids interference from other wireless devices.
" It has lower power consumption.
" It is easily upgradeable.
" It has range better than Infrared communication.
The Bluetooth is used for voice and data transfer.
Bluetooth devices are available at very cheap cost.
" No line of sight hence can connect through any obstacles.
" Free to use if the device is installed with Bluetooth.
The technologyis adopted in many productssuch as head set, in car system, printer,
web cam, GPS system, keyboard and mouse.
Disadvantages of Bluetooth:
It can lose connection in certain conditions.
" It has low bandwidthas compared to Wi-Fi.
It allows only short range communication between devices.
Security is a very key aspect as it tcan be hacked.
Q. 25. What is the computer network architecture?
Ans. Network architectureis the design ofacomputer network. It is a framework for the
specificationof a network's physical components and their functional organizationand
configuration,its operational principles and procedures, as well as communication
protocols used.
In telecommunication,the specificationof a network architecturemay also include a
detailed descriptionof products and services delivered via a communicationsnetwork, as
wellas detailed rate and billing structures under which servicesare compensated.
The network architecture of the Internet is predominantly expressed by its use of
the Internet protocol suite, rather than a specific model for interconnectingnetworks or
nodes in the network,or the usage of specific types of hardware links.
Downloaded by Mohd Nadeem (mn7119281@gmail.com)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy