This report is submitted in partial fblfillment of the requirements for the Bachelor of Computer Science (Computer Networking)

Size: px
Start display at page:

Download "This report is submitted in partial fblfillment of the requirements for the Bachelor of Computer Science (Computer Networking)"

Transcription

1 WIRELESS AD-HOC ROUTING SYSTEM (WARS) MOHD FAIRUZ BIN HAMZAH This report is submitted in partial fblfillment of the requirements for the Bachelor of Computer Science (Computer Networking) FACULTY OF INFORMATION AND COMMUNICATION TECHNOLOGY UNIVERSITI TEKNIKAL MALAYSIA MELAKA 2007

2 ABSTRACT Wireless Ad-Hoc Routing System (WARS) is a system for routing in multihop mobile wireless ad-hoc networks. AODV engine will be embedded to the system. An analysis module based on log file of the engine will be done to create a new interface of the system. The AODV engine is developing using C language and new analysis module is developing using Java Language. This system will allow connection of ad-hoc node that outranges using another ad-hoc node in the middle that is in ad-hoc signal coverage. Currently, there are limited resources of system to route mobile ad-hoc nodes in one ad-hoc network. User cannot connect to other node that outrange of ad-hoc signal range capability. It is impossible to connect to outrange node because ad-hoc capability one limit to one hop only. The project has many benefits, especially to anyone who concerned with the need of temporary networking to transfer data or other works on other user devices. They may be for students, lecturers, or personal users that need an easy and fast connection within critical time. This project is expected to develop a fully functional prototype system by embedding AODV engine and analysis module to the system therefore capable of connecting multihop mobile ad-hoc up to three hops and create a multihop mobile wireless ad-hoc networking.

3 ABSTRAK Wireless Ad-Hoc Routing System (WARS) merupakan satu sistem yang akan membuat laluan dalam rangkaian berbilang ad-hoc. Enjin AODV akan diintegrasikan ke dalam sistem ini. Satu modul analisis melalui fail log enjin akan dibangunkan untuk membuat antaramuka pengguna baru. Enjin AODV dibangunkan menggunakan bahasa pemprosesan C manakala modul analisis baru akan dibangunkan menggunakan bahasa pemprosesan Java. Sistem ini akan menghubungkan komputer ad-hoc yang di luar jarak capaian signal menggunakan ad-hoc di tengah-tengah untuk menghantar maklumat. Pada masa ini, tidak banyak sistem yang sedia ada untuk membuat laluan dalam rangakaian berbilang ad-hoc. Pengguna tidak boleh menghubungi komputer ad-hoc di luar jarak capaian signal disebabkan jarak capaian signal yang terbatas. Adalah mustahil untuk menghubungi komputer ad-hoc di luar jarak signal kerana, secara urnumnya ad-hoc hanya membataskan hubungan antara jarak sahaja. Projek ini mempunyai banyak kebaikan terutamanya untuk pengguna yang memerlukan hubungan rangkaian komputer sementara untuk menghantar maklumat pada komputer lain. Mungkin untuk pelajar, pensyarah mahupun pengguna biasa yang memerlukan hubungan rangkaian komputer dalam masa yang cepat. Project ini dijangkakan akan menghasilkan satu prototaip lengkap sistem menggunakan enjin AODV dan tambahan modul analisis maka adalah diharapkan sistem ini mampu membuat hubungan ke berbilang komputer ad-hoc di luar jarak signal melebihi 3 komputer ad-hoc.

4 CHAPTER I INTRODUCTION 1.1 Project Background This project is about developing a system for routing in mobile wireless adhoc network. This system will also call WARS (Wireless Ad-Hoc Routing System). The idea of this project is to connect ad-hoc node that is outrange using another adhoc node in the middle that is in ad-hoc signal coverage. Therefore, Access point is not required in this network. Wireless adapter that capable of doing ad-hoc mode will be used at three nodes in this project. Currently, operating systems that are provided for user did not have a system to route mobile wireless ad-hoc network. There are no tools to do such kind of connection in wireless ad-hoc network. This system can be use by user that has computer or laptop that capable of wireless ad-hoc networking. This system is not only connecting one ad-hoc node to other, but it will keep connecting other user that already in one Extended Service Set Identification (ESSID) within ad-hoc coverage. Ad-hoc On-demand Distance Vector (AODV) routing protocol will be use in this system. Others ad-hoc routing protocols are also identified and analyzed in details to choose the right routing protocol to use in this system. User requirements are carefully prepared to make sure this system develop well and have the most appropriate interface for user.

5 1.2 Problems Statements In an ad-hoc network, nodes communicate with each other using multi-hop wireless links. There is no stationary idiastructure such as base stations like Access Point. Ad-Hoc network is a temporary and short range networking. Each node in the network also acts as a router, forwarding data packets for other nodes. The process of routing is unknown to user because the engine does not have output to user. We do not know which neighbor is up or down except by doing manually ip route or ping command to check it. There is no system embedded to the engine to analyze and interact with user. There are limited resources of system to route mobile ad-hoc nodes in one adhoc network. User cannot connect to other node that outrange of ad-hoc signal range capability. It is impossible to connect to outrange node because ad-hoc capability one limit to one hop only. Even the mobile ad-hoc nodes are in range, it is hard to connect between each other because user does not know to use existing tools in their Existing system does not have interfaces for user. The engine does it jobs transparently and did not have interfaces for user to input data. User mainly just started the engine and let it be throughout the day. User cannot have any input to interact with the engine. It is important for user to see neighbors around them in their networking environment. 13 Objective The objectives of this project are to develop a system for routing in multihop wireless ad-hoc network. Upon completing this project, it is expected that the following objectives will be achieved:-

6 13.1 Establish connection between outrange ad-hoc node using middle ad-hoc node to divert transmission. Available ad-hoc routing protocols will be identified and researched in details to make sure the routing protocol chosen capable of mobile ad-hoc networking To integrate system with existing wireless network adapter. In this project, three D-Link DWL-G122 vb1 wireless USB network adapter will be used to run in Ad-Hoc mode in Linux using kernel Firmware h m Ralink Tech Inc. will be use with this hardware to integrate with the system Create interface for user. A simple interface will be created for user to interact with the system. The user will have enough choices to know the available nodes around To make Linux as a suitable platform to develop the system in fully open source codes. All tools will be used are open source and free to use. Interface using java codes will be integrated with the system. More controls and development are hoped to be done in L i environment.

7 1.4 Scope WARS is target to wireless ad-hoc user to use at their company or home. The scopes of this system are: (1) It is limited to three nodes. Computers used in this mobile wireless ad-hoc network will have to use the same wireless USB network adapter with the exact firmware given by the manufacturer. (2) This system is limited to Linux environment. It will be running on Linux Fedora Core 3 with kernel Java 1.5 SDK will be use to run the interface module. (3) There are no GUI interfaces for this system. User will have to interact with the system with the interfaces running on Terminal, command line. (4) User of the system must know Linux environment. KDE session used for desktop interface. 1.5 Project Significance This project is very important as a breakthrough to mobile wireless ad-hoc networking environment. The analysis has done can be bring forward to create a better routing protocols for wireless ad-hoc networking. Problems are identified and requirements are analyzed to know the current situation and ways to overcome it. This project are developed to let people know that mobile wireless ad-hoc networking are possible to do in the right way and suitable for normal user.

8 The project has many benefits, especially to anyone who concerned with the need of temporary networking to transfer data or other works on other user devices. They may be for students, lecturers, or personal users that need an easy and fast connection within critical time. The cost of the network devices for organization or workgroup can be reduced by implementing this system. Access Point, Router, and other wired devices can less used in their networking environment. User can now connect to mobile wireless ad-hoc nodes without having to move around near them. 1.6 Expected Output In this project, there are some expected outputs when this system is fully developed. This project is expected to develop a fully functional prototype system by embedding AODV engine and analysis module to the system. This system capable of connecting mobile ad-hoc up to three hops and creates a multihop mobile wireless ad-hoc networking. User can route messages betweens nodes if each node have this system. Analysis module will be done to analyze the wireless ad-hoc routing activities based on log files of AODV engine. It will be shown to user via interface developed in JAVA language programming. The information and analysis will be used to find the right routing protocol to implement with the system. The existing wireless network hardware can integrate with the operating system and WARS itself to run the system smoothly and without emr. The configurations provided with the hardware devices are compatible with the system and enough to do the development of WARS.

9 1.7 Conclusion As a conclusion, this project is a breakthrough to mobile ad-hoc networking. The appropriate engine will be used to embed with WARS. It will bring many benefits to user and create a new style of networking to the existing network environment technology. For the next chapter in this project is Literature Review and Project Methodology. This chapter is important because as guideline to develop this project. The method of developing this project are consist compatibility of step development that will be done h m preliminary until the end of this project.

10 CHAPTER I1 LITERATURE REVIEW AND PROJECT METHODOLOGY 2.1 Introduction Literature review is a very important part that needs to be done in order to get hold of more information and findings regarding this project. By doing literature review, the original concept of what is going to be developed can be clearly defined and as the project develops, it can be seen that researches done by doing literature review is able to help a lot during progress of the project. Theories, approaches and different methods which are created and used by other people can be studied and applied in own way when all ideas are combined or added up to develop a new idea. All homework done to discover facts and findings related to the project will be in used in order to seek more ideas for building this project. A literature review summarizes, interprets and evaluates existing literature or published material in order to establish current knowledge of a subject. The purpose for doing so relates to ongoing research to develop the knowledge. The literature review may resolve a controversy, establish the need for additional research and/or define a topic of injury. The purpose of a literature review is to establish current knowledge on an issue that relates to the topic of research. Literature review is an important process in a system development. Literature review provides the necessary background and information and thus acts as a base to start off a research with. In this stage,

11 findings, sumary, analysis and synthesis of the system will be done. This is to ensure the full understanding of the system and that the most suitable software and tools are used. When building a product or a system, it is essential to go through a series of predictable steps so that it can ensure that the project is on track. This is known as project methodology and it acts as like a roadmap that helps to create a timely quality result. By choosing the right tactic to implement the project, sequence of activities done for phases of the project can be done efficiently. 2.2 Fact and Findings Domain The identified domain of this project is the used of this system in multihop mobile wireless ad-hoc network environment whereby it will create a multihop mobile wireless ad-hoc networking. It is based on ICT in Advanced Manufacturing Technology Networking According to Mitchell B., networking is the practice of linking two or more computing devices together for the purpose of sharing data. Networks are built with a mix of computer hardware and computer software. Networks can be categorized in several different ways. One approach defines the type of network according to the geographic area it spans. Local area networks (LANs), for example, typically reach across a single home, whereas wide area networks (WANs), reach across cities, states, or even across the world. The Internet is the world's largest public WAN.

12 Computer networks also differ in their design. The two types of high-level network design are called client-server and peer-to-peer. Client-server networks feature centralized server computers that store , Web pages, files and or applications. On a peer-to-peer network, conversely, all computers tend to support the same hctions. Client-server networks are much more common in business and peer-to-peer networks much more common in homes. A network topology represents its layout or structure fiom the point of view of data flow. In so-called bus networks, for example, all of the computers share and communicate across one common conduit, whereas in a star network, all data flows through one centralized device. Common types of network topologies include bus, star, ring and mesh. Computer networks for the home and small business can be built using either wired or wireless technology. Wired Ethernet has been the traditional choice in homes, but Wi-Fi wireless technologies are gaining ground fast. Both wired and wireless can claim advantages over the other and both represent viable options for home and other local area networks (LANs) Wireless Networking According to Mitchell B., Wireless networks utilize radio waves andfor microwaves to maintain communication channels between computers. Wireless networking is a more modern alternative to wired networking that relies on copper and/or fiber optic cabling between network devices. A wireless network offers advantages and disadvantages compared to a wired network. Advantages of wireless include mobility and elimination of unsightly cables. Disadvantages of wireless include the potential for radio interference due to weather, other wireless devices, or obstructions like walls. Wireless is rapidly gaining in popularity for both home and business networking. Wireless technology continues to improve, and the cost of wireless products continues to decrease.

13 Popular wireless local area networking (WAN) products conform to the " Wi-Fi" standards Wireless Local Area Networking (WLAN) According to Mitchell B., WLANs provide wireless network communication over short distances using radio or infrared signals instead of traditional network cabling. A WLAN typically extends an existing wired local area network. WLANs are built by attaching a device called the access point (AP) to the edge of the wired network. Clients communicate with the AP using a wireless network adapter similar in function to a traditional Ethernet adapter. WANs use a transmission medium, just like wired LANs. Instead of using twisted-pair or fibre-optic cable, WLANs use either infrared light (IR) or radio frequencies (RF). Of the two, RF is far more popular for its longer-range, higherbandwidth, and wider coverage. Most wireless network LANs today use the 2.4- gigahertz (GHz) frequency band, the only portion of the RF spectnun reserved around the world for unlicensed devices. The fi-eedom and flexibility of wireless networking can be applied both within buildings and between buildings. Network security remains an important issue for WLANs. Random wireless clients must usually be prohibited from joining the WLAN. Technologies like WEP raise the level of security on wireless networks to rival that of traditional wired networks.

14 WLAN Architecture WLAN Architecture consists of 4 which are stations, basic service set, extended service set and distribution system. (1) Stations All components that can connect into a wireless medium in a network are referred to as stations. All stations are equipped with wireless network interface cards (WNICs). Wireless stations fall into one of two categories access points and clients. Access points (APs) are base stations for the wireless network. They transmit and receive radio frequencies for wireless enabled devices to communicate with. Wireless clients can be mobile devices such as laptops, personal digital assistants, IP phones, or fixed devices such as desktops and workstations that are equipped with a wireless network interface. (2) Basic service set The basic service set (BSS) is a set of all stations that can communicate with each other. There are two types of BSS which are independent BSS and inkstructure BSS. Every BSS has an identification 0) called the BSSID, which is the MAC address of the access point servicing the BSS. An independent BSS is an ad-hoc network that contains no access points, which means they can not connect to any other basic service set. An idhstmcture BSS can communicate with other stations not in the same basic service set by communicating through access points. (3) Extended service set An extended service set (ESS) is a set of connected BSSes. Access points in an ESS are connected by a distribution system. Each ESS has an ID called the SSID which is a 32-byte (maximum) character string. For example, "linksys" is the default SSID for Linksys routers.

15 (4) Distribution system setup. A distribution system connects access points in an extended service W AN Types There are two main types of WLAN which are peer-to-peer and client server. (1) Peer-to-peer (Ad-Hoc WAN) Figure 2.1 : W AN Peer-to-peer network A peer-to-peer (P2P) allows wireless devices to directly communicate with each other. Figure above shows that wireless devices within range of each other can discover and communicate directly without involving central access points. This method is typically used by two computers so that they can connect to each other to form a network. If a signal strength meter is used in this situation, it may not read the strength accurately and can be misleading, because it registers the strength of the strongest signal, which may be the closest computer specs define the physical layer (PHY) and MAC (Media Access Control) layers. However, unlike most other IEEE specs, includes three alternative PHY standards, diffuse infiared operating at 1 Mbit/s in, frequency-hopping spread spectrum operating at 1 Mbit/s or 2 Mbit/s, and direct-sequence spread

16 spectrum operating at 1 Mbit/s or 2 Mbit/s. A single MAC standard is based on CSMCA (Carrier Sense Multiple Access with Collision Avoidance). The specification includes provisions designed to minimize collisions. Because two mobile units may both are in range of a common access point, but not in range of each other. The has two basic modes of operation which is Ad-hoc mode, enables peer-to-peer transmission between mobile units. Infrastructure mode in which mobile units communicate through an access point that serves as a bridge to a wired network infrastructure is the more common wireless LAN application the one being covered. Since wireless communication uses a more open medium for communication in comparison to wired LANs, the designers also included a shared-key encryption mechanism, called wired equivalent privacy (WEP), or Wi-Fi Protected Access, (WPA, WPM) to secure wireless computer networks. (2) Client Server Figure 2.2: WLAN client server newok Figure above shows, installing an access point can extend the range of an ad hoc network, effectively doubling the range at which the devices can

17 communicate. Since the access point is connected to the wired network, each client can have access to server resources as well as to other clients. Each access point can accommodate many clients and the specific number depends on the number and nature of the transmissions involved. Many real-world applications exist where a single access point services from client devices. Access points have a finite range, on the order of 500 feet indoor and 1000 feet outdoors. In a very large facility such as a warehouse, or on a college campus, it may be necessary to install more than one access point. Access point positioning is accomplished by means of a site survey. The goal is to blanket the coverage area with overlapping coverage cells so that clients can range throughout the area without ever losing network contact. The ability of clients to move seamlessly among a cluster of access points is called roaming. Access points hand the client off h m one access point to another in a way that is invisible to the client, ensuring unbroken connectivity Defining Ad-Hoc According to Ozan, K. Tonguz, Gianluigi Ferrari, ad-hoc is a network connection method which is most often associated with wireless devices. The connection is established for the duration of one session and requires no base station. Instead, devices discover others within range to form a network for those computers. Devices may search for target nodes that are out of range by flooding the network with broadcasts that are forwarded by each node. Connections are possible over multiple nodes (multihop ad-hoc network). Routing protocols then provide stable connections even if nodes are moving around.

18 2.2.6 Routing According to Medhi, Deepankar, Ramasamy and Karthikeyan, routing is the process of selecting paths in a network along which to send data or physical traffic. Routing is performed for many kinds of networks, including the telephone network, the Internet, and transport networks. Routing directs forwarding, the passing of logically addressed packets from their source toward their ultimate destination through intermediary nodes. Ordinary computers with multiple network cards can also forward packets and perform routing, though with more limited performance. The routing process usually directs forwarding on the basis of routing tables which maintain a record of the routes to various network destinations. Thus constructing routing tables, which are held in the routers' memory, becomes very important for efficient routing Ad-Hoc On Demand Distance Vector (AODV) According to Charles E. Perkins and Elizabeth M. Royer., the Ad-hoc Ondemand Distance Vector (AODV) routing algorithm is an algorithm for routing data across Mobile Ad-hoc Networks (MANets) and other wireless ad-hoc networks. It is capable of both unicast and multicast routing. It is a reactive routing protocol. Therefore, it establishes a route to a destination only on demand. In AODV, the network is silent until a connection is needed. At that point the network node that needs a connection broadcasts a request for connection. Other AODV nodes forward this message, and record the node that they heard it from, creating a temporary route back to the needy node. When a node receives such a message and already has a route to the desired node, it sends a message backwards through a temporary route to the requesting node. The needy node then begins using the route that has the least number of hops through other nodes. Unused entries in the routing tables are recycled after a time.

19 When a link fails, a routing error is passed back to a transmitting node, and the process repeats Existing System In Reactive Routing Protocol there is several existing system that has been build to route packets between computing devices in a mobile ad-hoc network (MANET). Below are the sub topics that describe some existing system Mobile Ad-Hoc On Demand Data Delivery Protocol (MAODDP) According to Bakht H., researcher from School of Computing and Mathematical Sciences, Liverpool John Moores University, Mobile ad-hoc on Demand Data Delivery protocol (MAODDP) is relatively a new addition in the family of routing protocol for mobile ad-hoc network. The key features of MAODDP is the establishment of route and data delivery simultaneously one after the other. MAODDP deals some of the routing related issues along side routing. It is designed to minimize reaction to topological changes uses combination of sequence numbers and broadcast ID to ensure the freshness of routes. MAODDP is loopfiee, selfstarting, and can scales to different sizes of mobile ad-hoc network. MAODDP offers quick adaptation to dynamic link conditions, low processing and memory overhead, low network utilization, and determines routes to the destinations within the mobile ad-hoc network. Bakht H. added that MAODDP functional model has developed in Java and evaluated on Scalable Wireless Network Simulator (SWANS). Seven different set of experiments were conducted under various network environments. MAODDP found to be applicable in all types of network. Protocol showed an impressive data delivery ratio with minimum consumption of available memory. MAODDP compared against AODV and DSR, where it performed well in comparison with each of these scheme.

20 Dynamic Source According to David B. Johnson, Dynamic Source Routing (DSR) is a routing protocol for wireless mesh networks. It is similar to AODV in that it forms a route on-demand when a transmitting computer requests one. However, it uses source routing instead of relying on the routing table at each intermediate device. Determining source routes requires accumulating the address of each device between the source and destination during route discovery. The accumulated path information is cached by nodes processing the route discovery packets. The learned paths are used to route packets. To accomplish source routing, the routed packets contain the address of each device the packet will traverse. To avoid using source routing, DSR optionally defines a flow id option that allows packets to be forwarded on a hop-by-hop basis. This protocol is truly based on source routing whereby all the routing information is maintained (continually updated) at mobile nodes. It has only 2 major phases which are Route Discovery and Route Maintenance. Route Reply would only be generated if the message has reached the intended destination node (route record which is initially contained in Route Request would be inserted into the Route Reply). To return the Route Reply, the destination node must have a route to the source node. If the route is in the Destination Node's route cache, the route would be used. Otherwise, the node will reverse the route based on the route record in the Route Reply message header.in the event of fatal transmission, the Route Maintenance Phase is initiated whereby the Route Error packets are generated at a node. The erroneous hop will be removed from the node's route cache, all routes containing the hop are truncated at that point. Again, the Route Discovery Phase is initiated to determine the most viable route.

21 23 Project Methodology System development methodology is a collection of techniques used in building a model that is applied across the system lifecycle. A model is a process of system development used by software engineers or system developers to describe their approach in producing a system. The development method to use for WARS is the "Rapid Application Development (FWD)" using iterative prototyping. RAD process consists of four lifecycle stages which are Requirements Planning, User Design, Construction, and Implementation Chosen Methodology Justification According to Walter M., Rapid Application Development (RAD) is a software development methodology that focuses on building applications in a very short amount of time, traditionally with compromises in usability, features or execution speed. Basically it was originally intended to describe a process of development that involves application prototyping and iterative development. Speed and quality are the primary advantages of Rapid Application Development, while potentially reduced scalability and feature sets are the disadvantages. Because RAD focuses on development of a prototype that is iteratively developed into a full system, WARS may lack the scalability of a solution that was designed as a full application from the start.

22 RAPID APPLICATION DEVELOPMENT USING ITERATIVE PROTOTYPING Figure 23: RAD using iterative prototyping Iterative prototyping means creating increasingly functional versions of a system in short development cycles. Figure above show, each version is reviewed with the user requirements to produce requirements that feed the next version. The process is repeated until all functionality has been developed. The ideal length of iterations is between one day and three weeks. Each development cycle provides the user an opportunity to provide feedback, refine requirements, and view progress. It is ultimately the iterative development that solves the problems inherent in the inflexible methodologies created in years before Requirement Planning The Requirements Planning phase also known as the Concept Definition Phase consists on both developing a high level list of initial requirements as well as setting WARS scope. In this phase, result must be clear in a list of entities as well as action diagrams that define the interactions between processes and data elements and should take between one and four weeks. Ideally requirements should be captured in

23 a structured tool such as Microsoft Visio. At the end of the Requirements Planning phase project estimation should be considered User Design During the User Design phase also known as the Functional Design phase details requirements are flushed out in more detail, test plans are developed, and creates screen flows and layouts for essential parts WARS. Before moving to the Construction Phase next steps must be focused by flushing out the project plan and focusing on effort estimates. Focusing on next steps is an important element of the User Design phase, because the initial iteration of the Construction Phase should focus on a feature light prototype. In order to keep development iterations as short as possible, and to gain the maximum benefit of RAD's agile nature, core requirements should be identified and targeted for the initial prototype, and secondary requirements should be identified and targeted for hture development iterations Construction In Construction Phase, application in iterative cycles of development, testing, requirements refining, and development again, are developed until WARS is complete. Development iterations should last between one day and three weeks. It is vital to keep each development iteration on track, and functionality may need to be dropped to keep development within the time box. Once the prototype has been developed within target time, WARS initial prototype using test scripts developed during the User Design stage are tested. Core and secondary requirements are identified, next development iteration are planned out, keep the user in the loop regarding what will be done, and then the next iteration of development are started over again. As WARS approaches a sufficient state the developer should focus WARS as a finished application rather than a prototype. During the final iterations of development developer define the steps necessary for implementation.

24 Implementation The Implementation Phase also known as the Deployment phase consists of integrating WARS. Developer prepares data and implements interfaces to the systems. Developer trains the system users while the users perform acceptance testing. Developer helps the users transfer from their old procedures to new ones that involve WARS, trouble shoots after the deployment, and identifies and tracks potential enhancements. 2.4 Project Requirements This section will briefly explain requirements needed to implement wireless ad-hoc routing system. It includes software requirements, hardware requirements plus additional side requirements Software Requirements Software is used for many purposes in this project. Different softwares are used for different tasks. Some of them are used as the pre-requisite and some of them are used to build the system or the project itself. Below is the list of software use to develop WARS. (1) Linux Fedora Core 3 (2) Java 1.5 SDK (3) TextPad (4) Microsoft Project 2003 (5) Microsoft Visio 2003 (6) Microsoft Power Point 2003 (7) Microsoft Word 2003

25 2.4.2 Hardware Requirements Hardware is the device used in order to build or aid the development of the project. Below is the list of hardware use to develop WARS. (1) 3 Units computer. (2) 3 Units wireless USB adapter. 2.5 Project Schedule and Milestones In Table 2.1, it displays the project milestones for Projek Sarjana Muda. Below is the table for every activity done throughout the project. Num Table 2.1 : Project Milestones Milestones Duration Start Date Selecting project title and 2 days 9/5/2007 supervisor Submit proposal to supervisor approval Plan the project Gather Information for Chapter 1 : Introduction ~etennin~contents for Chapter 1 Gather Information for Chapter 2: Literature Review and Project Methodology Determine content for Chapter 2 1 day 4 days 2 days 3 days 2 days 3 days 1 1/05/ /5/ /5/ /05/ /05/ /05/2007 End Date 10/5/ /05/ /05/ /05/ /05/ /05/ /05/2007

26 8. Submit Chapter 1 and Chapter 2 1 day 25/05/ /05/ Analysis problem statement 2 days 04/06/ /06/ Analysis system requirement 2 days 05/06/ /06/ Determine and priority system 3 days 05/06/ /06/2007 requirement Submit Chapter 3: Analysis Gather information that 1 day 2 days 08/06/ /06/ /06/ /06/2007 correlate routing protocols ~ User Interface Design Submit Chapter 4:Design Finalizing PSM 1 Report 3 days 1 day 5 days 12/06/ /06/ /06/ /06/ /06/ /06/ PSM 1 Presentation 5 days 25/06/ /06/ Detailed Design :Chapter 4 5 days 23/07/ /07/ Submit Detailed Design Gather information that 1 day 14 days 03/08/ /08/ /08/ /08/2007 correlates wireless usb adapter configuration system implementation System implementation 14 days 20/08/ Submit Chapter 5 Planning system testing 1 day 5 days 6/09/ /09/ /09/ Testing system and error 14 days 1 7/09/ /2007 handling 25. Submit Chapter 6: Testing 1 day Performers and progress project 1 5 days evolution 27. Complete and submit PSM 2 1 day final report 28. Present Project 5 days

27 2.6 Conclusion In this chapter, literature review makes it clear for determining what the project going to be developed is all about. Current problems from the existing systems are studied and the major requirements, mostly for interfacing, have been identified for developing WARS. The process methodology is also determined at this stage in order to plan out steps to be taken to develop the project in a timely manner and successfully accomplish the development of the project. Overall, this project has a clear purpose and will be developed.the next chapter will describe in detailed about the analysis phase for this project.

EKT 331/4 COMMUNICATION NETWORK

EKT 331/4 COMMUNICATION NETWORK UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 331/4 COMMUNICATION NETWORK LABORATORY MODULE LAB 5 WIRELESS ACCESS POINT Lab 5 : Wireless Access Point Objectives To learn

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ

Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products

More information

Demystifying Wireless for Real-World Measurement Applications

Demystifying Wireless for Real-World Measurement Applications Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 TECHNICAL NOTE GoFree WIFI-1 web interface settings Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 1/14 Web interface settings under admin mode Figure 1: web interface admin log

More information

Local-Area Network -LAN

Local-Area Network -LAN Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there

More information

COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES

COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES Answers to End-of-Chapter Questions Matching g 1. router o 2. node i 3. ring l 4. hub c 5. star n 6. backbone b 7. latency

More information

This KnowledgeShare document addresses the main types of wireless networking today based on the IEEE 802.11 standard.

This KnowledgeShare document addresses the main types of wireless networking today based on the IEEE 802.11 standard. Wireless Networking Q&A Increased use of laptop computers within the enterprise, and increase in worker mobility have fuelled the demand for wireless networks. Up until recently, wireless technology was

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Wireless LAN Concepts

Wireless LAN Concepts Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied

More information

Networks. The two main network types are: Peer networks

Networks. The two main network types are: Peer networks Networks Networking is all about sharing information and resources. Computers connected to a network can avail of many facilities not available to standalone computers: Share a printer or a plotter among

More information

Municipal Mesh Network Design

Municipal Mesh Network Design White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves

More information

The next generation of knowledge and expertise Wireless Security Basics

The next generation of knowledge and expertise Wireless Security Basics The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com

More information

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008 INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee

More information

Wireless Mesh Networks under FreeBSD

Wireless Mesh Networks under FreeBSD Wireless Networks under FreeBSD Rui Paulo [email protected] The FreeBSD Project AsiaBSDCon 2010 - Tokyo, Japan Abstract With the advent of low cost wireless chipsets, wireless mesh networks became much

More information

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman 1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers

More information

Local Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: [email protected] Local Area Network LANs connect computers and peripheral

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

Basic processes in IEEE802.11 networks

Basic processes in IEEE802.11 networks Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters.11 Architect. 1 IEEE 802.11 Terminology Station (STA) Architecture: Device

More information

Basic Wireless Infrastructure and Topologies

Basic Wireless Infrastructure and Topologies Basic Wireless Infrastructure and Topologies Developed by Sebastian Buettrich and Alberto Escudero Pascual 1 Goals To be aware of the most common wireless topologies To be able to identify and plan suitable

More information

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol The Routing Problem S S D D The routing problem

More information

Security in Wireless Local Area Network

Security in Wireless Local Area Network Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

LP-348. LP-Yagy2415. LP-510G/550G 54M Wireless Adapter PCMCIA/PCI. User Guide Ver:2.0 LP-5420G WWW.LANPRO.COM

LP-348. LP-Yagy2415. LP-510G/550G 54M Wireless Adapter PCMCIA/PCI. User Guide Ver:2.0 LP-5420G WWW.LANPRO.COM LP-348 LP-Yagy2415 LP-1518 LP-5P LP-510G/550G 54M Wireless Adapter PCMCIA/PCI User Guide Ver:2.0 LP-5420G WWW.LANPRO.COM COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a

More information

IJMIE Volume 2, Issue 7 ISSN: 2249-0558

IJMIE Volume 2, Issue 7 ISSN: 2249-0558 Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)

More information

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006 WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able

More information

Chapter 7 Low-Speed Wireless Local Area Networks

Chapter 7 Low-Speed Wireless Local Area Networks Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics

More information

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements

More information

communication over wireless link handling mobile user who changes point of attachment to network

communication over wireless link handling mobile user who changes point of attachment to network Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]

More information

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213-3891

More information

Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA

Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA coursemonster.com/uk Networking: Certified Wireless Network Administrator Wi Fi Engineering CWNA View training dates» Overview This new market-leading course from us delivers the best in Wireless LAN training,

More information

Virtual Access Points

Virtual Access Points Virtual Access Points Performance Impacts in an 802.11 environment and Alternative Solutions to overcome the problems By Thenu Kittappa Engineer Author: Thenu Kittappa Page 1 Virtual Access Points... 1

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization 1 Neha Ujala Tirkey, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 M. Tech student, 2&3 Assistant Professor,

More information

RoamAbout 802.11 Wireless Networking Guide

RoamAbout 802.11 Wireless Networking Guide RoamAbout 802.11 Wireless Networking Guide W i r e l e s s L A N s TM 9034042-02 Notice Notice Cabletron Systems reserves the right to make changes in specifications and other information contained in

More information

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

More information

Chapter 2 Configuring Your Wireless Network and Security Settings

Chapter 2 Configuring Your Wireless Network and Security Settings Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless

More information

Industrial Networks & Databases

Industrial Networks & Databases Industrial Networks & Databases LONWORKS KNX 1 HVAC and BEMS HVAC - Heating, Ventilation & Air Conditioning BEMS - Building & Energy Management Systems 2 3 4 LONWORKS (Local Operating Networks) Open solution

More information

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN: WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce

More information

Understand VLANs, Wired LANs, and Wireless LANs

Understand VLANs, Wired LANs, and Wireless LANs LESSON 1,2_B Understand VLANs, Wired LANs, and Wireless LANs Lesson Overview In this lesson, you will review: Wired local area networks Wireless local area networks Virtual local area networks (VLANs)

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information

ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK

ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK The Rogue Access Point Problem One of the most challenging security concerns for IT managers today is the

More information

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals Yujin Noishiki Hidetoshi Yokota Akira Idoue KDDI R&D Laboratories, Inc. 2-1-15 Ohara, Fujimino-Shi, Saitama,

More information

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data. Uses of a network A network is a way to connect computers so that they can communicate, exchange information and share resources in real time. Networks enable multiple users to access shared data and programs

More information

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate

More information

Wireless LAN 802.11g USB Adapter

Wireless LAN 802.11g USB Adapter Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by

More information

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area

More information

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information

Telecommunications, Networks, and Wireless Computing

Telecommunications, Networks, and Wireless Computing Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

Wireless Network Standard and Guidelines

Wireless Network Standard and Guidelines Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Discovering Computers 2008. Chapter 9 Communications and Networks

Discovering Computers 2008. Chapter 9 Communications and Networks Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices

More information

NETWORKING TECHNOLOGIES

NETWORKING TECHNOLOGIES NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY

TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY TOWARDS STUDYING THE WLAN SECURITY ISSUES SUMMARY SUBMITTED TO THE KUMAUN UNIVERSITY, NAINITAL BY MANOJ CHANDRA LOHANI FOR THE AWARD OF THE DEGREE OF DOCTOR OF PHILOSOPHY IN COMPUTER SCIENCE UNDER THE

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: [email protected]; Web: http://www.dlink-intl.

White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: info@dlink.com.sg; Web: http://www.dlink-intl. Introduction to Voice over Wireless LAN (VoWLAN) White Paper D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. Introduction Voice over Wireless LAN (VoWLAN) is a technology involving the use

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

Introduction to computer networks and Cloud Computing

Introduction to computer networks and Cloud Computing Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication

More information

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server

More information

Computer Networking: A Survey

Computer Networking: A Survey Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer

More information

THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123

THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123 THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123 CONFIGURING YOUR HOME WIRELESS NETWORK Presented by: Mr. Eric Fan, Chairman, PISA Knowledge 123 Firmware 軟 韌 體 Knowledge 123 Home Network Functions

More information

Chapter 14: Distributed Operating Systems

Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication

More information

Chapter 16: Distributed Operating Systems

Chapter 16: Distributed Operating Systems Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology

More information

An Overview of ZigBee Networks

An Overview of ZigBee Networks An Overview of ZigBee Networks A guide for implementers and security testers Matt Hillman Contents 1. What is ZigBee?... 3 1.1 ZigBee Versions... 3 2. How Does ZigBee Operate?... 3 2.1 The ZigBee Stack...

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

MN-700 Base Station Configuration Guide

MN-700 Base Station Configuration Guide MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia

More information

TL-WN310G 54M Wireless CardBus Adapter

TL-WN310G 54M Wireless CardBus Adapter 54M Wireless CardBus Adapter Rev: 1.0.1 1910010042 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. is a registered trademark of TP-LINK TECHNOLOGIES CO., LTD. Other brands and

More information

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4

Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Customer Specific Wireless Network Solutions Based on Standard IEEE 802.15.4 Michael Binhack, sentec Elektronik GmbH, Werner-von-Siemens-Str. 6, 98693 Ilmenau, Germany Gerald Kupris, Freescale Semiconductor

More information

Testing a Wireless LAN

Testing a Wireless LAN Chapter 17 Testing a Wireless LAN This chapter will introduce you to: Wireless LAN Testing Considerations Signal Coverage Testing Performance Testing In-Motion Testing Security Vulnerability Testing Acceptance/Verification

More information

Propsim enabled Mobile Ad-hoc Network Testing

Propsim enabled Mobile Ad-hoc Network Testing www.anite.com Propsim enabled Mobile Ad-hoc Network Testing Anite is now part of Keysight Technologies Lab-based, end-to-end performance testing of systems using Propsim MANET channel emulation A Mobile

More information

PCMCIA Wireless LAN Card User s Manual

PCMCIA Wireless LAN Card User s Manual PCMCIA Wireless LAN Card User s Manual Rev 1.0 Regulatory compliance FCC Warning This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of

More information

Setting up of a Wireless Distribution System (WDS)

Setting up of a Wireless Distribution System (WDS) Setting up of a Wireless Distribution System (WDS) - a user s perspective Sudipto Das Co worker: Rajesh Roy Department of Computer Science & Engineering Jadavpur University Kolkata 32 {sudipto.das,rajesh.roy}@rediffmail.com

More information

Guide for wireless environments

Guide for wireless environments Sanako Study Guide for wireless environments 1 Contents Sanako Study... 1 Guide for wireless environments... 1 What will you find in this guide?... 3 General... 3 Disclaimer... 3 Requirements in brief...

More information

Chapter 3 Safeguarding Your Network

Chapter 3 Safeguarding Your Network Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate

More information

IT4504 - Data Communication and Networks (Optional)

IT4504 - Data Communication and Networks (Optional) - Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication

More information

Best Practices for Outdoor Wireless Security

Best Practices for Outdoor Wireless Security Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged

More information

HELP DESK SYSTEM IZZAT HAFIFI BIN AHMAD ARIZA

HELP DESK SYSTEM IZZAT HAFIFI BIN AHMAD ARIZA HELP DESK SYSTEM IZZAT HAFIFI BIN AHMAD ARIZA A thesis submitted in fulfillment of the requirement for the awards of Bachelor of Computer Science (Computer Systems & Networking) with Honours Faculty of

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

Wave Relay System and General Project Details

Wave Relay System and General Project Details Wave Relay System and General Project Details Wave Relay System Provides seamless multi-hop connectivity Operates at layer 2 of networking stack Seamless bridging Emulates a wired switch over the wireless

More information

2 Setting Up the Hardware for a Wired Ethernet Network... 13. 3 Setting Up the Software for an Ethernet Network... 21

2 Setting Up the Hardware for a Wired Ethernet Network... 13. 3 Setting Up the Software for an Ethernet Network... 21 Contents 1 Networking Basics............................................... 1 Selecting a network connection........................................ 2 Wired Ethernet network...........................................

More information

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN LAN (Local Area Networks) 10/28/2008 Vasile Dadarlat - Computer Networks 1 MAN (Metropolitan

More information

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Agenda. Distributed System Structures. Why Distributed Systems? Motivation Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)

More information

Throughput Maximization in Wireless LAN with Load Balancing Approach and Cell Breathing

Throughput Maximization in Wireless LAN with Load Balancing Approach and Cell Breathing Throughput Maximization in Wireless LAN with Load Balancing Approach and Cell Breathing Prof.Devesh Sharma Prof.MamtaSood Subhash patil Santosh Durugkar TIT, Bhopal TIT, Bhopal TIT, Bhopal LGNSCOE,Nasik

More information

LevelOne User Manual WPC-0600 N_One Wireless CardBus Adapter

LevelOne User Manual WPC-0600 N_One Wireless CardBus Adapter LevelOne User Manual WPC-0600 N_One Wireless CardBus Adapter V2.0.0-0712 Safety FCC WARNING This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to

More information