Professional Documents
Culture Documents
Wireless Assignment
Wireless Assignment
Its most frequently used in almost many communication system one of the nest Example is the
FM radio where FM(stands for Frequency modulation).
But we normally knows that the wavelength and frequency have inverse
relationship(wavelength=velocity/frequency) if frequency is high it implies small wavelength
and the Size of antenna required during modulation is(Antenna Size =wavelength/2) this
Imply that the size of antenna will decrease with respect to the size of wavelength.
1
CONTINUED…..
AND THE MAIN REASON WHY WE NEED MODULATION IS THE FACT THAT WE WANT OUR SIGNAL
TO OPERATES WITH HIGH FREQUENCY WHICH CAN RELATIVELY REACH SEVERALS KM AWAY,IN
THAT CASE WE MUST MODULATE OUR ELECTROMAGNETIC WAVE BEFORE IN TRAVELS THROUGH
SPACE IN GIVEN DISTANCE FREQUENCY OF AN RF CHANNEL IS BEST UNDERSTOOD AS THE
FREQUENCY OF A CARRIER WAVE.
A CARRIER WAVE IS A PURE WAVE OF CONSTANT FREQUENCY, A BIT LIKE A SINE WAVE.
BY ITSELF IT DOESN’T CARRY MUCH INFORMATION THAT WE CAN RELATE TO (SUCH AS SPEECH
OR DATA).
THIS IMPLY THAT A CARRIER SIGNAL WITH APPROXIMATELY HIGH FREQUENCY CAN BE
MODULATED WITH OUR SIGNAL’S FREQUENCY(HINTS OUR SIGNAL HAVE LOWER FREQUENCY)
AND FINALLY THE MODULATED SIGNAL CAN HAVE APPROXIMATELY HIGHER FREQUENCY
COMPARED TO THE FREQUENCY OF OUR NORMAL SIGNAL.
2
CONTINUED…..
3
CONTINUED…..
5
FREQUENCY MODULATION TECHNIQUE.
6
AMPLITUDE MODULATION
7
PHASE MODULATION
(PM): The phase of the carrier waveform is varied to reflect changes in the
frequency of the data. In PM, the frequency is unchanged while the phase
is changed relative to the base carrier frequency. It is similar to FM but
differs in the fact that phase modulation changes angel with respect to
angle.
8
QUESTION NUMBER TWO(Q-2)
9
CONTINUED……
WDM systems are divided into two main different wavelength patterns, coarse WDM
(CWDM) and dense WDM (DWDM)
10
WHAT IS MULTIPLEXING?
11
WHAT IS DEMULTIPLEXING?
12
DIFFERENCE BETWEEN MULTIPLEXING AND DEMULTIPLEXING?
13
MULTIPLEXER (MUX) IN COMMUNICATIONS SYSTEM:
14
DEMULTIPLEXER (DEMUX) IN COMMUNICATION SYSTEM:
-> It receives the output signals from the multiplexer and converts them
back to the original form at the receiver end.
-> In Arithmetic Logic Unit: The output of the arithmetic logic unit is fed as
an input to the Demux, and the o/p of the Demux is connected to a
multiple registers.
-> In Serial to Parallel Converter: The serial to parallel converter is used to
reform parallel data. In this method, serial data are given as an input to
the Demux and a counter is attached to the Demux to sense the data signal
at the Demux’s o/p. When all data signals are stored, the output of the
Demux can be read out in parallel.
15
CONCLUSION..
16
QUESTION NUMBER THREE(Q-3)
17
CONTINUED…..
Ad hoc networks are mostly wireless local area networks (LANs). The devices communicate
with each other directly instead of relying on a base station or access points as in wireless
LANs for data transfer co-ordination.
Each device participates in routing activity, by determining the route using the routing
algorithm and forwarding data to other devices via this route.
Like we normally knows that Connecting two computers does not always require a centrally
managed network. Instead, users can set up an ad hoc network between two computers.
However, this connection is only temporary. Let’s say that Biniam needs to transfer a file
over to his friend,Chang, but doesn’t have access to a safe Wi-Fi connection. He can create
an ad hoc network instead.
An ad hoc network is a temporary type of Local Area Network (LAN). If you set up an ad hoc
network permanently, it becomes a LAN.
18
CONTINUED…..
19
AD HOC CONNECTION SECURITY
CHALLENGE.
One of the biggest concerns with an ad hoc network is security. If cyber-attackers get within
signal range, they will generally be able to connect to a wireless ad hoc network and,
therefore, to the device.
The network is ad hoc because it does not rely on a pre-existing infrastructure, such
as routers in wired networks or access points in wireless networks.
Instead, each node participates in routing by forwarding data for other nodes, so the
determination of which nodes forward data is made dynamically on the basis of network
connectivity and the routing algorithm in use.
Furthermore, users cannot disable their SSID (service set identifier) broadcast in ad hoc
mode, meaning that the network name cannot be hidden if users are in a public place.
For this reason, ad hoc networks are not always appropriate.However, because ad hoc
connections are temporary and only accessible within 100 meters, they can be ideal for some
situations. Attackers cannot hack into a device from far away and do not have unlimited time
to plan their attack.
20
TYPES OF WIRELESS AD HOC NETWORKS
Mobil Adhoc Network (Manet):-is an interconnected system of wireless nodes
which communicate over bandwidth constrained wireless links. Each wireless
node can function as a sender, a receiver or a router.
When the node is a sender, it can send messages to any specified destination
node through some route.
As a receiver, it can receive messages from other nodes.
When the node functions as a router, it can relay the packet to the destination or
next router in the route.
21
Continued…..
Vehicular ad hoc network (VANET): Used for communication between
vehicles. Intelligent VANETs use artificial intelligence and ad hoc technologies
to communicate what should happen during accidents VANETare created by applying the
principles of mobile ad hoc networks (MANETs) – the spontaneous creation of a wireless network of mobile devices
– to the domain of vehicles."car-to-car ad-hoc mobile communication and networking" applications, where networks
can be formed and information can be relayed among cars. It was shown that vehicle-to-vehicle and vehicle-to-
roadside communications architectures will co-exist in VANETs to provide road safety, navigation, and other
roadside services. VANETs are a key part of the (AI).
22
Continued….
Smartphone ad hoc network (SPAN): are wireless ad hoc networks that use smartphones. Once
embedded with ad hoc networking technology, a group of smartphones in close proximity can together create an ad hoc
network. Smart phone ad hoc networks use the existing hardware (primarily Bluetooth and Wi-Fi) in commercially
available smartphones to create peer-to-peer networks without relying on cellular carrier networks, wireless access
points, or traditional network infrastructure. It allows Mark all things to be smart from traffic-light even homes.
23
Continued….
Channel Allocation means to allocate the available channels to the cells in a cellular system.
When a user wants to make a call request then by using channel allocation strategies their
requests are fulfilled. Channel Allocation Strategies are designed in such a way that there is
efficient use of frequencies, time slots and bandwidth.
Channel Allocation is just like renting an houses/rooms if someone have tall built tower then
he can probably rents(allocate) rooms to many/more guests that are available as possible
until all the rooms are occupied.
Until that points then no one can be added above that point which means that when another
person come he must be told that no space in currently available.
However, if any among previous renters left the room and there is free space then we are
able to rent(allocate) it to previous customer that had got no free room.
25
WHY CHANNEL ALLOCATION?
-> Signal limited resource,so we use channel allocation to
avoid competition\interference
-> To determine channel usage priorities, especially the
densely populated and sparsely populated have d/nt channel
usage priorities.
-> To groups channel together by the means of their
frequency so that each cells can be allocated the frequency
that suits well
26
Types of Channel Allocation Strategies
These are Fixed, Dynamic, and Hybrid Channel Allocation as explained as following below.
Fixed Channel Allocation
Fixed Channel Allocation (FCA) systems allocate specific channels to specific cells. This allocation is static and can not be changed. For
efficient operation, FCA systems typically allocate channels in a manner that maximizes frequency reuse. Thus, in a FCA system, the distance
between cells using the same channel is the minimum reuse distance for that system. The problem with FCA systems is quite simple and
occurs whenever the offered traffic to a network of base stations is not uniform. Consider a case in which two adjacent cells are
allocated N channels each.
In cell A 20 Channels or Voice channels are allocated. If all channels are occupied and user make a
call then the call is blocked. Borrowing Channels handles this type of problem. In this cell borrow
channels from other cells.
27
Continued…..
28
Continued…..
29
Continued…..
ea r
f c l
sel
m y
ade a sk
I m t o
p e ate
h o s i t
I h e n …
! n ' t ti o
! d o ic a
u t
b c la r i f
o r 30