You are on page 1of 11

WT Rutui Tenkag

Assiq nment No-3

QA.woihe the baief wLAN Technoogy discuss about hidden &


expose tesmingl problerms technologies sugpost mcbillty
The wieless Communication
Hence it has qaioe immense popdarity in day - do-day
Wfe nowolays coived communlcation
i) Tt has many advantager
to ex netscsks ely Cables to cónnct on wje
cables.
his alo reduces overall systemcost
hìs aso educes due to cable damaqe
idely usecd in both home
Wieless techneloqie ave

and busioess co mpter netosk s fos a vaiety ot ue

WLAN
Advaotage
loMobility be avcilee toom any ocetion.
Îoternet copnectivity Can
aLow implementation Cot
ae easy to set up , elÏcate change ancl manage.
l3 In sallation Speeoi and Simpieity
The speed ot ingallation fast Sno cabling is eguied
Tt also si mplity the aschitectuoe of he netsosk
GNewosk eypango
Wiess tec hyalagy raches where cables cannot be aracheel
Sundaram FOR EDUCATIONAL USE
o WLAN -
+Disadantoges
uaity of Sevice !
WLAN oPfer lcwes quality c# setvices as Companed to
wied LAN Connection

Propietany sohionsi
Due to lack t standaclization many (ompanies agt cftesing
peoprie tany soions.
aRestoictions i
wLAN s ar bmited to lo power senders ond cestain
iense free toequenty bands
*he Hidden Tesmioal pssblem n WLAN:
DlThe wireless LANS hiclelen tesminl problem is
tansmissionpzobleno hat aisej when to oY mor stations
who ot o gonge of each oher tsansmi simfancously
ase

to a ommon otCeipient
toomawieless
fsom
ROhis occurs when a statiorn is vi_ible
a

other stations hot


access poiot A) 6is hidden foom
(ommunicafes AP
l Poblem lustation STA, STB sTe
thoe station lobelle STC
Supposete a
where STA STC are trangmittig cwhle st9 suh is
that
io e cont'qusation
Reeving The staf ions a not in rocdio Gunqe
e tuo transmitBess STA

od eqch other.
Sottyew

STA SIB
Rong c station
Range
statiosTA

e Ezpo sed Termina poo blem


blem in WLAN
isa
In weless LAN te eyposecl tesmina problerm
ansmission pooble rn that aises when a transrniting
to
stetion is porve nte from sending fcomes due
iodes foce with ancther toonsotting station . Thisis prevent
io decentalizecl systern, chere thee any entity fox
contelling toansoissjons
Problern Iustration
Suppose that these fourr stations labelel stA,STB
ST
Where STB STC transmites thile STA STp
ar Yecelvexs at sanye slet of time. The stations ar in
coohigusdien Such that the tuo neceivexs STA StD
Out of jadio Tange of each other bt but he
too toangmittes STB in racio range
of each, ofher, FOR EDUCATICONAL USE
Sundaranm
Q.2 explainpzotoeol aochitetue of JEEE g02.|
Mobile tesrninal Mesmir
Iofsastudut
netoslk
Prcesy pent
applcodion anpliceticr
TCP

LLe LL
Kor.) MAC 802.)) 3023 MAC 8023 MA
023 PHY $02.3 PHY
(a stalion
oragta

LLe

PLCP
PMAC Managerment
PHY Manaqemen
Pectocel architete o lEEE
802 |! stanard
FOR EDUCATIONAL USE
Sundaram
he hi_her layers (app heation TeP, (p) ct wsirelcs datda
node
wosks Same wid node. he uppes past of
ak Contal lyes e logicas Link condrolL) coves
ditfeences of themediumn
of he acess contro layers nedec
fox different media IEBE 8o2 I)|) standard only Covess the
IE BE 302
Specificetion physica layey and MAc layes
iPhysica layer
Tt is subdivideo (e psotocel
into physical layex cenvetgeo ce
LC) anc the physicl medium dependent sublayexIt PNp).
is kncen
PLCP Sublaes poovides Casries snse siqnad-
as cleas channel Assessment (cca).
lt lso provicles COmon PHY Service Acess Point SA).
This SAP independent oftansissjon technoleqy used.
2. MAL layex
asks pexfosmed are!
DMediuro acceSS
Fragraen ation f Ses cdata
ncyption
Manaqermcnt layer
Manase nment Layes an as Rllos!

EPNV imanageMen1
Station managem eol
) MA Managernentt
Supposts he assciadion anel e- asseciedion oPa station to
an accesS poit.Roaming bedween ofevent acesipoiots
Contools autheni caien mechanisms Encsyption
Syochroni 2ation ot a staion
a with rqaso to an access
pont
O
|Yoiwez
bl PHY
management to sar batdepouser
managemeot:
Channel tning
Physical MIB (Manag ement bfosm fion. Basc)
Maintenance
allPesfosmecl by ation managemers
Indesactien with both manage mcot ayer Réspon sib
fo addlitional hihes layess fupctiop Bke ontrol o! o
bojdaing ioteractio with distoibution Systerm io case e
access poiot ete
Q2tate the feaduocs of wiMAX coaw e expain asciteetue ct
WIMAX.
Intere
Care

wih

wiM ase
Saan

WIMA baje
Sati on
WIMAX
scale cscle iotee -opetabily
micoJae access
Tt is designed to proviole brood band iotesnet access
|foom fixec os mobile device Via antennas. t is h
last mile solution tor ire less btoadl bandl access.
t s an aHesnative to cable and psL (piital SubscoibessC
Line). Tt jsis Said that wiMAx JP CentÛc setyice
lpsovided Over wjce areo subscobex stations eEorsr
Communicate with base statons that
with connectel to
Core network
It is a geoal
good alts netie to fixecl binene petusorkg..
The avcbitetue ot the wMAX (ompsise o}
DCo hetuwosk;
H is the standaxcl intemet netsosk It provices te
plat Fosm fou the booaclband connectivity
BS Base Statioo)
Cell ste . ae the towers with
antennas equ'pped e

IE psovides connevdy odh the pubhe nos k.


he communiatioo between the subsCyi be stat'on and
Hhe base stotion is duso- lway.
SS Suhscribe5 statico
Tt is dhe subscibes tation eguiopecl with an
his ante nna is usuolly ounte on buildiag antenna.
is conneteddo the base station via micxo wave
Bnks.
ATETesminal cquipment)
It can be any
1t levice ike mobile lap top ete It is
connectedto he sub scibex statoo via aCCess
point.
he de lephone connected to the Sub seoibes station
VìaE

Featues of WIMAK
1t ses wieless ink withicoo ave ox
milbmete aves
Uses licensed spectsums
Simple stationary antenna s tovses mountel antennas
1t i Connection oented wide anea service
9 Suppssts bigh bard idth and hundeds of usexs pe
channel :
Range 3o miles
vai Tt is capabk provding bzoad band acess to remote
lacess
Vi) 1ake s uSe otof poiot to mtipint architectue.
ar
A4.10.4 Comparison between
MANET and VANET

Table 4.10.1: Comparison between MANET and


VANET
Parameter MANETVANET
Sr.
NO Dense and
|1. Node density Sparse
otolloo iloz mostly
variable

2. Bandwidth 100kps 1000kps


3. Communication Upto 100m Upto 500Om
range
4. Change in network Slow Rapid
topology
5. Mobility of nodes Low High
6. Node lifetime Depends on Depends
power on vehicle
SOurce used lifetime
7. Multi hop routing Available Weakly
available

8. Pattern in which Random Regular


node moves
9. Reliability Medium High
10. Addressing scheme Attribute Location
based based
11. Overall cost low High
12. Position acquisition Using Using GPS
ultrasonic or RADAR
VeworKS &nd AdnoC NEWOrKS) age io
Syllabus Toplc : Wireless Sensor Network -WSN
Archltecture
4.7 COMMUNICATION ARCHITECTURE OF WSN

Sensor nodes can be -Sensing


node
data originators and
data routers

Internet

Sink

Manager Node

Sensor nodes
Sensor field -

Fig. 4.7.1:Communication architecture of WSN


A Wireless Sensor Network (WSN) is an ad-hoc
network having large number of nodes. These nodes a 4.7.1 (A) Layered Architecture of
are the micro sensors capable of collecting and WSN/ Protocol Layer Architecture
transmitting environmental data in an autonomous way. for WSN
Refer Fig. 4.7.1. Refer Fig. 4.7.2. It shows protocol layer architecture
for WSN. This type of layered Network Architecture
C It shows communication architecture of wSN.
consists of almost few hundred sensor nodes and a
The position of the node is not predetermined. Rather single powerful base station. The Network nodes are
they can be randomly dispersed in a geographical area. organized into concentric Layers.
Thisarea is known as the "sensing area".,
The information detected by the sensor node will be
gathered and transmitted through multihop techniques
to sink ie. each node sends the information to its Three-hop
neighbour (so one hop between two neighbour) until it layer
Two-hop layer
reaches the last and sends it to sink.
The sensor node can send the information to the One-hop layen
external base stations also. A base station (BS) may be
Static or dynamic and can collect the information from
the sensor nodes and performs complex data B
processing. As compared to the sensor nodes, BS's are
nch in computational power, memory and energy.
a 4.7.1 Types of WSN Architecture
There are two types of architectures.
C Sensor node
1, Layered Architecture
2 Clustered Architecture Coverage area

Fig. 4.7.2(a) : Layered structure of WSN


WEP WPA WPA2

Implementation of major IEEE802.1li Complete lEEE 802.1listandards


The main Purpose Security is provided in con standards with WEP without requiring are implemented with new
trast to wired networks
new hardware enhancements of WPA

Data Privacy Temporal Key Integrity Protocol Authentication is provided through


Rivest Cipher 4 (RC4) chipper blocks with CCMP and
(Eneryption) (TKIP)
AES.
WPA2-Personal and
Authentication WEP-Open and WEP-Shared WPA-PSK and WPA-Enteprise
WPA2-enterprise
Data Integrity CRC-32 Data integrity is provided through Cipher block chaining message
Message Integrity Code. authentication code (CBC-MAC)
The 4 way handshaking mechanism is The 4 way handshaking
Key Management Key management is not pro used to provide for key mechanism is used to provide
vided
management for key management
Older Network Interface Cards are
Compatibility in Possible to deploy on curent Possible to deploy on both current and
terms of Hardware hardware infrastructure previous hardware not supported. Only the 2006 and
newer.

Vulnerable against Chopchop. Vulnerable against Chopchop. Vulnerable against DoS attacks due
Vulnerability Bittau's fragmentation and Ohigashi-Mori, WPA-PSK, to unprotected control frames and
DoS attacks including variety and Dos attacks. MAC spoofing
DoS attacks.
Deployment in Easy to deploy and configure WPA-2 requires complicated setup
terms of complexity with WPA enterprise.
foe Implementation of 48-bit
Replay attack No protection against replay proeicecounter
Implements:
protection attacks Fplay
repl datagrampacket number protects
against replay attack

You might also like