...WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2004; 4:247–249 (DOI: 10.1002/wcm.220) Guest Editorial Special Issue: Scalability Issues in Wireless Networks— Architectures, Protocols and Services By Amitabh Mishra, Guest Editor Scalability of computer-communication networks has been an important topic for quite some time. Internet community examined the services and protocols for scalability, and switching and routing researchers looked at the scalability of the switches and routers. Service providers studied the application architectures of the services for the scalable performance that they need to provide to subscribers and, the maintenance folks paid attention to scalability of service provisioning algorithms, protocols and software. Similarly, the wireless networking community has also started to look at the scalability issues that are relevant to wireless cellular, wireless local, as well as wireless personal area networks besides the emerging area of infrastructure-less networks such as ad-hoc and sensor networks. Surprisingly there is significant scope for research in the wireless scalability area as it relates to the ad hoc and sensor networks and this is one of the reasons why this topic was chosen for a special issue. A wireless sensor network is likely to have a large number of nodes perhaps in thousands to millions and that may create, potentially, numerous scaling problems in the networking protocols, addressing schemes, hardware architectures...
Words: 2043 - Pages: 9
...SEMINAR REPORT ON WIRELESS LAN SECURITY Contents: I. Introduction…………………………………………………………………1 II. Wireless LAN Deployment……………………………………………7 III. Wireless LAN Security Overview…………………………………10 IV. Protecting Wireless LANs…………………………………………...13 V. Wireless LAN Security Summary……………………………………18 I. Introduction a. The 802.11 Wireless LAN Standard In 1997, the IEEE ratified the 802.11 Wireless LAN standards, establishing a global standard for implementing and deploying Wireless LANS. The throughput for 802.11 is 2Mbps, which was well below the IEEE 802.3 Ethernet counterpart. Late in 1999, the IEEE ratified the 802.11b standard extension, which raised the throughput to 11 Mbps, making this extension more comparable to the wired equivalent. The 802.11b also supports the 2 Mbps data rate and operates on the 2.4GHz band in radio frequency for high-speed data communications As with any of the other 802 networking standards (Ethernet, Token Ring, etc.), the 802.11 specification affects the lower layers of the OSI reference model, the Physical and Data Link layers. The Physical Layer defines how data is transmitted over the physical medium. The IEEE assigned 802.11 two transmission methods for radio frequency (RF) and one for Infrared. The two RF methods are frequency hopping spread-spectrum (FHSS) and direct sequence spread-spectrum (DSSS). These transmission methods operate within the ISM (Industrial, Scientific, and Medical) 2.4 GHz band for unlicensed use...
Words: 4933 - Pages: 20
...Kudler Fine Foods Integrated Network Design Project Network’s fundamental characteristics and network components The company I chose to do my paper on is Kudler Fine Foods they have three different locations the home office is La Jolla, a Del Mar store, and the Encinitas store on their network that are interconnected on a WAN through a T3 line. The La Jolla stores network is built around a 100baseT environment the main server is an IBM blade server system C3000 that uses UNIX, and backed up with a10TB NAS, and 5KVA APD UPS that provides power backup. This server runs the corporate SAP ERP SW, the network services, e-mail, storage control, printer/file services, and the Internet. The retail store uses NCR Real POS 82XRT POS terminals and systems. At this time they have 19 Dell Vostro computers that share 3 HP networked printers these components are used by corporate management and other admin personnel. The communication that comes in or out of the La Jolla store runs through 2 cisco routers, and firewalls they help to provide an inter-store dedicated network and a separate 25Mbps link to the Ethernet. This location also has 19 VOIP phones. Del Mar and Encinitas Store Networks both are basically the same as the La Jolla store the only differences are they both have 6 Dell Vostro computers with 1 HP laser jet multifunction networked printer...
Words: 4397 - Pages: 18
...and DSR, Routing Protocols in Mobile Ad hoc Networks A. Sravani, G. Srinu, and A.Venkataramana Abstract— Mobile Ad hoc Network is an emerging area. Its standards are defined by IETF. MANET is a self generated, self organized and self handled network consisting of collection of independent nodes. MANETs Presents several desirable properties like dynamic topology, Easy of deployment and robustness, which are qualify them as an attractive topic for the research community. Providing QoS routing is a major issue in MANETs. Media Access Control layer plays crucial role in Ad hoc networks. Several routing protocols have already been proposed for MANETs. This paper describes the impact of MAC layer protocols like 802.11 and CSMA on the various routing protocols like AODV, DSR, ODMRP and Fisheye. Numbers of simulation scenarios were carried out by using Glomosim-2.03. The QoS parameters used are Throughput, Delay and PDR. Simulation results found that AODV performs better in 802.11 and CSMA, DSR and ODMRP performs better in only under 802.11. Keywords— MANET, AODV, DSR, FSR, GloMoSim, ODMRP I. INTRODUCTION Wireless communication networks are basically two types as shown in Fig.1. One is infrastructure based and other one is infrastructure less. Infrastructure based is cellular communications whereas infrastructure less is ad hoc networks. Fig.1 Classification of wireless communication networks A. Cellular Networks A Cellular Network is a wireless network distributed...
Words: 2917 - Pages: 12
...Communication Protocols Communication is defined as the exchanging of information or news. Protocol, for all intents and purposes, means an official way or agreed upon procedure or standards to accomplish a task. In this case, it would be rules to help transmit data. In networking, there are various protocols needed to make transmission of data easier. In today’s fast paced environment, the standards of information sharing are increasing exponentially. Adhering to the standards are also becoming more important than before. Design Kudler Fine Foods is dedicated to ensuring that the customer information in their possession remains secure from unapproved access. Securing their network is one of the highest priorities for Kudler. Since the new enterprise network will be integrating a wide area network to connect all the sites, which will have their own individual wireless local networks. Choosing the correct communication protocol stack is vital to the security and availability of both the WAN and WLAN network. In...
Words: 1036 - Pages: 5
...Kudler Fine Foods Integrated Network Design Project Network’s fundamental characteristics and network components The company I chose to do my paper on is Kudler Fine Foods they have three different locations the home office is La Jolla, a Del Mar store, and the Encinitas store on their network that are interconnected on a WAN through a T3 line. The La Jolla stores network is built around a 100baseT environment the main server is an IBM blade server system C3000 that uses UNIX, and backed up with a10TB NAS, and 5KVA APD UPS that provides power backup. This server runs the corporate SAP ERP SW, the network services, e-mail, storage control, printer/file services, and the Internet. The retail store uses NCR Real POS 82XRT POS terminals and systems. At this time they have 19 Dell Vostro computers that share 3 HP networked printers these components are used by corporate management and other admin personnel. The communication that comes in or out of the La Jolla store runs through 2 cisco routers, and firewalls they help to provide an inter-store dedicated network and a separate 25Mbps link to the Ethernet. This location also has 19 VOIP phones. Del Mar and Encinitas Store Networks both are basically the same as the La Jolla store the only differences are they both have 6 Dell Vostro computers with 1 HP laser jet multifunction networked printer...
Words: 4396 - Pages: 18
...Kudler Fine Foods Network One of the considered “best fine food stores” around is the Kudler Fine Foods. However, Kudler is in serious need of a network infrastructure upgrade of their old one. To introduce the latest technologies in data collection, company communication, and information protection while providing the best data speeds and network access are the main goals of the enterprise network. This huge step is significant as this will increase the revenue and will reduce the costs of operation throughout the Kudler Fine Foods stores. Kudler Fine Foods will go back up to technological speed as the network upgrade is completed, while at the same time improving the way they keep track of inventory and sales by using data mining techniques, which will be collected and analyzed in real time. Network Overview The review of the current network used at Kudler Fine Foods was able to determine that the network topology that is being used is the bus topology. The bus network is set-up in such a way that all the network components are connected via CAT5 to the bus or communication line. This configuration is true at sites in the corporation for their workstations, servers, and standalone UPS. A 56k modem is the device that is used by all of the networks communicating to the internet. Although the bus network is very reasonable when it comes to cost, the downfall is that when the backbone goes down, the entire network can encounter an outage that is very difficult to troubleshoot...
Words: 1871 - Pages: 8
...server, communications, email, storage and web server. In addition to the Blade Server system La Jolla will also have a 10TB NAS to maintain records of all system transactions across the network. Operating on the network will be 31 computers, of these computers 13 will belong to the corporate admin and the remaining 18 will be utilized by the local store management. An APC Smart UPS rated at 5000va will be installed in each of the three server rooms. Telephonic communications will be made available using VOIP. La Jolla will have 19 total VOIP phones in order to accommodate the number of corporate administrators, the Del Mar and Encinitas facilities will only have 6 VOIP phones. The standards being applied to this project are LAN, WAN, Wireless, and VOIP. A LAN or local area network is created when multiple computers or devices are connected as a network providing services and applications within a common structure such as a single business, campus or region. A LAN is generally governed by the organization by an administrator who controls the policies, security and access control. Essential components of a working LAN is the workstation computers, data server, networking switch and the outward facing router. The WAN, or wide area network, is created when multiple LANS are essential. However if the physical facilities are geographically too far apart to be maintained as a unified LAN would require the services of third...
Words: 2182 - Pages: 9
...SECURE ROUTING IN WIRELESS SENSOR NETWORKS By [Name] The Name of the Class (Course) Professor (Tutor): The Name of the School (University): The City and State The Date: Abstract. Wireless sensor networks (WSANs) are a group of sensors and actors that are linked by a wireless medium for the purpose of performing distributed sensing and action on a given task. This involves the sensors collecting information about the surrounding physical environment and sending the information to the actors which take the decisions and perform some needed action basing on the information received from the sensors about the surrounding environment. These sensor networks are sometimes referred to as wireless sensor and actuator networks. They monitor physical or environmental conditions such as sound, pressure, temperature among others and send the collected data to the required location. Effective sensing and acting requires a distributed local coordination methods and mechanism among the sensors and the actors in addition to this, sensor data should be valid in order for right and timely actions to be performed. This paper describes secure routing in wireless sensor networks and outlines its threats on security. Keywords: Wireless sensor and actor networks; Actuators; Ad hoc networks; Sybil attack; Real-time communication; Sinkhole; Routing; MAC; adversary. Introduction With the recent rapid improvement on technology, many networking technologies have been created to make...
Words: 5106 - Pages: 21
...Project NTC/362 Fundamentals of Networking Dean McIntyre 2 The Patton-Fuller Community Hospital looks to upgrade their Information Technology (IT) capability beginning with their networks. The characteristics, components, and topology are evaluated to properly identify the needs for the new network design. The plan includes converting to a Wireless Local Area Network otherwise known as (WLAN), installing a Voice over Internet Protocol otherwise known as (VoIP), and design a Wide Area Network (WAN). The plan also includes the hospital maintaining all Macintosh® computers. Administration/Clinical Overview * The administrative departments run off of a 1000 Base-T Ethernet provided by a CAT 6 cable which is also the entire hospital’s network backbone. Clinical department networks however are provided by a 1000 Base-F Ethernet provided by a single mode fiber. The clinics feed into a Cisco Catalyste 3560 Switch as the network bridge that links the two together. All workstations are Apple iMAC or MAC Pros with the executive management, senior managers, and the data center workstations as having a wireless communication card installed. * IT Data Center * The data center is comprised of the hospital HIS system. The mainframe of the HIS is connected by a 4 gigabit fiber link to a 10 terabyte Network Area Storage (NAS) device. The data center’s workstations are all Apple iMACs that run a MAC OS X from a remote desktop. Virtualization allows for operating...
Words: 3457 - Pages: 14
...INDP FINAL PROJECT Morris Arnwine NTC/362 10/29/2014 Steven Randel Patton- Fuller Community Hospital The network’s fundamental characteristics and components- The Patton-Fuller Community Hospital is serving the public and they have the responsibility of providing good service and protecting each patient’s rights. The Health Insurance Portability and Accountability Act (HIPAA) outlines the principles and requirements that the hospital must use to ensure they are protecting patient’s rights. In the Patton-Fuller Community Hospital there are a large amount of Protected Hospital Information that needs to remain protected to meet the standards that HIPAA defines. The network is a 1000BASE-T, which supplies 1Gigabit of Ethernet connectivity over 5 cables (CAT5). This long-haul, copper-based standard is ideally suited for use within the data center because which is used in all the clinical areas of the hospital such as Emergency rooms ,Operating rooms, Pharmacy, Labs, doctor’s offices, Wards, Outpatient examining rooms, and Intensive Care Units (ICU’s) but the throughput of copper wire connections leaves room for improvement. The Administrative sections of the hospital such as IT Department, Admitting/Discharge, Facilities, Human Resources (HR), Finances, and Hospital Senior Management are using 1000BASE-T network structure. “The backbone network structure for the entire hospital is 1000BASE-T. Individual sections of departmental networks such as Radiology use different standards...
Words: 3258 - Pages: 14
...KFF Network Design NTC/362 – Fundamentals of Networking Tom Krawczyk September 12, 2015 Primer Information technology is an essential part of many businesses today, and this is evident in the ways many companies are increasingly relying on their computers to optimize their businesses. It is also not uncommon for businesses of distinct sizes to utilize multiple computers in their offices, with these computers interconnected through networks to allow information sharing between computers. Computer networking is even more required in businesses with multiple offices, and these locations could sometimes cut across different geographical boundaries. Kudler Fine Foods (KFF) epitomizes such business concerns that optimize its with computer networking. The company, located in San Diego, was founded in June 18, 1998, and it is a local specialty food store with three locations within the USA. However, the organization has evolved since its formation and seems to have outgrown its present network infrastructure. As such, to successfully compete in ever challenging business climate, KFF requires enterprise upgrade, and the goals of proposed network are modern technologies for data collection, information protection, and enterprise communication coupled with optimal data speeds and network access. This upgrade will not only enable transform KFF into a 21st century organization, but it will also enhance its productivity and giving it...
Words: 4257 - Pages: 18
...TOPICS IN AD HOC AND SENSOR NETWORKS Simulations in Wireless Sensor and Ad Hoc Networks: Matching and Advancing Models, Metrics, and Solutions Ivan Stojmenovic, University of Birmingham and University of Ottawa ABSTRACT The objective of this article is to give advice for carrying out a proper and effective simulation activity for protocol design. It challenges some of the existing criticisms of simulation practices that emphasized validation aspects. This article advocates the use of simple models, matching assumptions and metrics in the problem statement and simulation to provide a basic “proof of concept,” and comparison with truly competing solutions, which is possible only after a thorough and critical literature review. Then the complexity of the models can be increased (one parameter at a time), revising the algorithms themselves by adapting them to new assumptions, metrics, and the corresponding simulation environment. Selected independent variables should explain performance under a wide range of scenarios. unclear which protocol will perform well under a wide range of scenarios. It is our view that each article should be judged on its overall contribution, including the assumptions used, theory developed, new algorithms introduced, protocol details, simulation results, and relevance to an ultimate goal of staying on a path toward creating applications. We begin with a literature review of existing criticism for simulation practices, and then discuss what we...
Words: 4845 - Pages: 20
...SOFTWARE REQUIREMENT SPECIFICATION NET VIGILANT NETWORK MONITOR V1.1 Printed On: 3rd Dec 2007 C:\Washington University\ProjectDocument2.doc Department Of Computer Science & Engineering Washington University in Saint Louis Submitted By Subharthi Paul Madhuri Kulkarni Table of Contents |1 |INTRODUCTION |3 | |1.1 |Abstract____________________________________________________________ |4 | |1.2 |Introduction_________________________________________________________ |5 | |1.3 |Product Overview____________________________________________________ |6 | | | | | |2 |SPECIFIC REQUIREMENTS |8 | |2.1 |External Interface Requirements_________________________________________ |9 | | |2.1.1 User Interfaces_________________________________________________ ...
Words: 1548 - Pages: 7
...Evaluation of Wireless Mesh Networks on MANET Routing Protocols Shashi Bhushan1,Anil Saroliya2 ,Vijander Singh3 Research Scholar, Computer Science, Amity University, Jaipur, India 1 Assistant Professor, Computer Science, Amity University, Jaipur, India 2 Senior Lecturer, Computer Science, Amity University, Jaipur, India 3 Abstract—Wireless Mesh Network (WMN) is a kind of network which is made up of Mesh router and Mesh clients where Mesh router having lesser mobility and form the heart of WMNs. In this paper, Wireless Mesh Network over MANET implemented using routing protocols such as AODV, DSR. In this work NS-2.34 simulator is used for simulations. Various measurements and calculations were figure out in this work like throughput, Average end-end delay, PDR, NRL and Routing packets in Random way point mobility model. WMN have features such as self configuration, self healing and low cost of equipment. This work specifically aims to study the performance of routing protocols in a wireless mesh network, where static mesh routers and mobile clients participate together to implement networks functionality such as routing and packet forwarding in different mobility scenarios Keywords- Ad hoc Network, Routing Protocols, Wireless Mesh Network, Performance, Throughput, PDR, NRL and Routing packets in Random way point mobility model, Simulation on Network simulator NS-2, AODV,DSR , Routing Overhead. I. INTRODUCTION A Mobile Ad-hoc network (MANET) is an autonomous system of wireless mobile...
Words: 4335 - Pages: 18