0% found this document useful (0 votes)
96 views41 pages

Network and Operating System Wan Cloud

This document summarizes a network and operating systems coursework submitted by a student. It includes two tasks - Task A which models and simulates a wide area network connecting three local area networks, and Task B which discusses wireless networks and IEEE 802.11 standards. The document contains an abstract, contents listing, introduction, descriptions of the modeled networks, simulation results and analysis, and conclusions. Figures and tables are included to illustrate the network design and simulation outputs.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
96 views41 pages

Network and Operating System Wan Cloud

This document summarizes a network and operating systems coursework submitted by a student. It includes two tasks - Task A which models and simulates a wide area network connecting three local area networks, and Task B which discusses wireless networks and IEEE 802.11 standards. The document contains an abstract, contents listing, introduction, descriptions of the modeled networks, simulation results and analysis, and conclusions. Figures and tables are included to illustrate the network design and simulation outputs.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 41

Module Code & Module Title

CS500NA Network and Operating System

Assessment Weightage & Type


30% Individual Coursework

Year and Semester


2020-21 Autumn

Student Name: Bibek Chaudhary


Group: N6
London Met ID: 19031224
College ID: NP01NT4A190188
Assignment Due Date: 25th Dec, 2020
Assignment Submission Date: 25th Dec, 2020
Word Count(TASK B): 2156

I confirm that I understand my coursework needs to be submitted online via Google Classroom under the
relevant module page before the deadline in order for my assignment to be accepted and marked. I am
fully aware that late submissions will be treated as non-submission and a mark of zero will be awarded.
AKNOWLEGMENT
I would like to thank my module leader Mr. Dipeshor and My class teacher Puranjan
Aacharya also thank to my friends for their support and guidance.

I would like to give special thanks to my parents for their care and support in my
studies and provide me as such good internet.
ABSTRACT
Demand of networking increasing day by day, both user and carrier. This coursework
provide the proper explanation about comnet simulation and it research. This module
presents several types of object an theories which may be used in application, states
of network problems which is to be analysed, provides step by step instructions to
build a model to analyse the network problem presents the results of the network
simulation.
This report, plan and execution of local area network neighborhood is written to fill in
as a source of perspective book for wireless LAN later on at whatever point it is
wanted. This report clarifies the overview thought, equipment thought, end-client
thought and standard of Wireless network. Moreover, IEEE (Institute of Electrical and
Electronics Engineers) this expert body have done a ton of work to make remote
organization had various alternative to decision a reasonable Wireless switch 802.11.
Contents
1. TASK A .............................................................................................................. 1
1.1. INTRODUCTION ............................................................................................ 1
1.2. WAN MODULE ............................................................................................... 1
1.2.1. EDINBURGH LAN ....................................................................................... 2
1.2.2. WAN CLOUD............................................................................................... 5
1.2.2.3. ITAHARI AND BUTWAL LAN ...................................................................... 9
1.3. DESCRIPTION OF REPORTS ..................................................................... 17
1.3.1. NODE REPORT: RECEIVED MESSAGE COUNT .................................... 17
1.3.2. LINK REPORT: CHANNEL UTILIZATION ................................................. 18
1.3.3. WAN CLOUD REPORTS: FRAME DELAY, FRAME COUNT, ACCESS
LINK STATS:.......................................................................................................... 19
1.4. CONCLUSION .............................................................................................. 24
2. TASK B ............................................................................................................ 24
2.1.1. WIRELESS NETWORKS .......................................................................... 26
2.1.2. IEEE 802.11 Architecture .......................................................................... 27
2.1.3. IEEE 802.11 Priorities................................................................................ 27
2.1.4. WIRELESS TECHNOLOGIES ................................................................... 27
2.3. CONCLUSION .............................................................................................. 28
3. REFRENCES AND BIBLIOGRAPHY ............................................................... 28
4. APPENDIX ....................................................................................................... 28
List of Figures
Figure 1 Screenshot of WAN Module .............................................................................. 2
Figure 2 Screenshot of Edinburgh LAN ........................................................................... 3
Figure 3 Token Passing link ............................................................................................ 3
Figure 4 Screenshot of Edinburgh Router ....................................................................... 4
Figure 5 Screenshot of ATM Processing Server ............................................................. 5
Figure 6 Screenshot of Message Response .................................................................... 5
Figure 7 WAN Cloud........................................................................................................ 6
Figure 8 Edinburgh Access link ...................................................................................... 6
Figure 9 Itahari Access link ............................................................................................. 7
Figure 10 Butwal Access link........................................................................................... 7
Figure 11 Einburgh-Itahari Virtual circuit ......................................................................... 8
Figure 12 Itahari-Edinburgh Virtual Circuit....................................................................... 8
Figure 13 Edinburgh-Butwal Virtual Circuit ...................................................................... 8
Figure 14 Butwal-Edinburgh Virtual Circuit ...................................................................... 9
Figure 15 Itahari LAN ...................................................................................................... 9
Figure 16 Butwal LAN.................................................................................................... 10
Figure 17 Itahari Router................................................................................................. 10
Figure 18 Butwal LAN.................................................................................................... 11
Figure 19 Itahari CSMA/Link ......................................................................................... 11
Figure 20 Butwal CSMA/CD link .................................................................................... 12
Figure 21 Itahari single teller mechine ........................................................................... 12
Figure 22 Butwal single teller mechine .......................................................................... 13
Figure 23 Itahari 30 ATM ............................................................................................... 13
Figure 24 Butwal 30 ATM .............................................................................................. 14
Figure 25 Itahari single teller message source : Message............................................. 14
Figure 26 Itahari single teller mechine message source: Packets ................................. 15
Figure 27 Itahari ATM message source: Message ........................................................ 15
Figure 28 Itahari ATM message source: Packets .......................................................... 15
Figure 29 Butwal single teller message source: Messages ........................................... 16
Figure 30 Butwal single teller mechine message source: Packet .................................. 16
Figure 31 Butwal ATM message source: Messages...................................................... 16
Figure 32 Butwal ATM message source: Packets ......................................................... 17
Figure 33 Received Message Count Bargraph .............................................................. 18
Figure 34 Channel Utilization Bargraph ......................................................................... 19
Figure 35 Frame Delay Average Bargraph .................................................................... 20
Figure 36 Brust Size Average Bargraph ........................................................................ 20
Figure 37 Frame Accepted Bargraph ............................................................................ 21
Figure 38 Access link stats bargraph ............................................................................ 22
Figure 39 Message+response source= Message delay ................................................ 23
Figure 40 Screenshot Simulation part1 ......................................................................... 29
Figure 41 Screenshot of simulation part 2 ..................................................................... 30
Figure 42 Screenshot of Simulation part 3 .................................................................... 31
Figure 43 Screenshot of simulation part 4 ..................................................................... 32
Figure 44 Screenshot of simulation part 5 ..................................................................... 33

List of Tables
Table 1 Node Report: Received message count ........................................................... 17
Table 2 Link Report: Channel Utilization ....................................................................... 18
Table 3 Frame delay by VC ........................................................................................... 19
Table 4 Frame count by VC........................................................................................... 21
Table 5 Access Link Stats ............................................................................................. 22
Table 6 Message Delay For All Nodes .......................................................................... 23
1. TASK A
1.1. INTRODUCTION
Computer network systems are growing day by day. Now, business are one the
telecommunication networks. To manage the network is the toughest challenges
for the network engineers because their billions of users and more than the
networks. This coursework is about how telecommunication network work, LAN
and WAN. We use COMNET III to better performance and analysis for wireless
networks. it is used to module network to control, simulate with running
parameters. The applications are very familiar with Wide Area Network(WAN) and
Local Area Network(LAN). The basic steps to build a model using the application
are to first define a network topology using the various nodes and links available
in the application
Main aim and objective of this report listed below:
 To design the LAN and WAN module, given scenario by using COMNET
III.
 To list out the difference between result of two model.
 To study the result of LAN and WAN model.
 To present report of Asian model.

1.2. WAN MODULE


In this module, there are a company which name has Asian bank an location
Edinburgh. The company carry two transaction networks which has in Nepal. In
Nepal also network divided into two location that are Itahari and Butwal. There are
three LAN that are itahari, butwal and Edinburgh and one LAN cloud. The LAN
have his own cisco 7010sp v10.0 router. Nepal networks has connected with
Ethernet IEEE 802.3 CSMA/D 10 BaseT and it is connected with single teller
mechine and 30 ATM which have his own message source. Talking about the

1
BIBEK CHAUDHARY
Edinburgh LAN, there also same router which is used in Nepal network but
Edinburgh router has connected with token ring and token ring connected with
ATM and Message response source. In this WAN, there three virtual circuit with
three access link. Each link are connected with each other. The transmission rate
between LAN to WAN have 16kbps and also WAN to LAN have 128 kbps. The
single teller machines in every LANs (Itahari and Butwal)are produced at an
interarrival time that can be characterized with a remarkable likelihood
conveyance with mean 10 which has a size that can be clarified by a uniform
dissemination where the size is equally scattered over the scope of 40 to 100
bytes.For the destination list of message source and message response you need
to generate random list with respective destination.The routing protocol used is
TCP-IP Microsoft V1.0 with 10 ms Packetize time

Figure 1 Screenshot of WAN Module

1.2.1. EDINBURGH LAN


LAN stand for Local area network. LAN is group of computer and devices that
communicate to a server. A modem with internet connection, router and access
point elements are include in LAN.
The scenario of Edinburgh LAN, one cisco 7010sp v10.0 Ediburgh router connected
with token ring passing with ATM and Edinburgh Message response source.

2
BIBEK CHAUDHARY
Figure 2 Screenshot of Edinburgh LAN

1.2.1.1. TOKEN PASSING LINK


Token ring is the passing device that along to the next device in topology.
Editing the field with fulfill value as shown in list with screenshot:
 Name: Token Passing link
 Type: Token Passing
 Parameter: 802.516Mbps

Figure 3 Token Passing link

3
BIBEK CHAUDHARY
1.2.1.2. NETWORK DEVICE: ROUTER
Router is the physical device that designed for analyze, receive and forward
data packet between the networks. Explaining the device with fulfill the values
in list and shown with screenshot:
 Name: Edinburgh Router
 Type: Network Device
 Parameters: 7000/7010 sp

Figure 4 Screenshot of Edinburgh Router

1.2.1.3. PROCESSING SERVER


Processing server provide the functionality for the other link or programs.
Creating processing node and edit with fulfill values as listed and also show
screenshot:
 Name: ATM processing Server
 Type: Processing node
 Parameter: ATM Teller

4
BIBEK CHAUDHARY
Figure 5 Screenshot of ATM Processing Server

1.2.1.4. MESSAGE RESPONSE


Message respond stand for all the receivers. Edit received message get the
source and respond the messages. Edited fulfilled with values as shown in list
with screenshot:

Figure 6 Screenshot of Message Response

1.2.2. WAN CLOUD


WAN cloud is the service that help to WAN modeling by using of Access links and
virtual circuit. in given scenario, there are three Access link for three point to point
link, one for Itahari and another for Edinburgh and one for Butwal. Also that three

5
BIBEK CHAUDHARY
virtual links, one for Itahari to Edinburgh, one for Edinburgh to Butwal and another
for Edinburgh to Itahari. All the links are in frame ralay but parameters are different
like 16 kps parameter for Virtual circuit and 128 kps parameter for Access link. The
given screenshot show WAN CLOUD.

Figure 7 WAN Cloud

1.2.2.1. ACCESS LINKS


Access link provide the service for the connecter. it is gaining LAN to local
connecter. it is connection between two end nodes. There are three different
access link but same parameter 128 kbps, that shown by screenshots below.

Figure 8 Edinburgh Access link

6
BIBEK CHAUDHARY
Figure 9 Itahari Access link

Figure 10 Butwal Access link

1.2.2.2. VIRTUAL CIRCUIT


Virtual circuit is the communication network that providing service associated
networks. it is arranged in organization like office, Home networking etc. and it
is time interval transmission between two nodes.

7
BIBEK CHAUDHARY
Figure 11 Einburgh-Itahari Virtual circuit

Figure 12 Itahari-Edinburgh Virtual Circuit

Figure 13 Edinburgh-Butwal Virtual Circuit

8
BIBEK CHAUDHARY
Figure 14 Butwal-Edinburgh Virtual Circuit

1.2.2.3. ITAHARI AND BUTWAL LAN


There no much different between Itahari and butwal LAN because they both
identifying by subnet icon and also it belongs to same scenario like Router,
CSMA/CA link, 30ATM and Message source.

Figure 15 Itahari LAN

9
BIBEK CHAUDHARY
Figure 16 Butwal LAN

1.2.2.4. NETWORK DEVICE: ROUTER


Router is physical and intelligent network layer device which connect two or
more network either they near or far. There is also two router one Itahari and
Butwal router that parameter is 7000/7010 sp and also same type network
device. The screenshot given below:

Figure 17 Itahari Router

10
BIBEK CHAUDHARY
Figure 18 Butwal LAN

1.2.2.5. CSMA/CD LINK


CSMA/CD LINK stand for carrier sense multiple access/collision detection and it
is media-access control strategy that was broadly utilized in early Ethernet
technology /LANs, when there used to be shared. Transport topology and every
nodes are associated by coaxial cables. There are not much difference between
Itahari and Butwal CSMA/CD link because same parameter with same icon.
There are screenshots shows Name, type, parameter etc.

Figure 19 Itahari CSMA/Link

11
BIBEK CHAUDHARY
Figure 20 Butwal CSMA/CD link

1.2.2.6. PROCESSING NODE


A node is refers to a point or join where a connection takes place. it can be
computer or device that is part of networking. The Processing Node may go about
as the beginning or objective for message traffic, run applications, or go about as
an exchanging point inside an organization. There are two different Processing
nodes, that one is Itahari single teller mechine and another is Butwal single teller
mechine with same parameter 802.3 CSMA/CD 10BaseT. Here screenshot
shows changes values of nodes.

Figure 21 Itahari single teller mechine

12
BIBEK CHAUDHARY
Figure 22 Butwal single teller mechine

1.2.2.7. COMPUTER GROUP

Computer characterized in the group will be made as an occurrence of that hub.


Any application or traffic source associated with the hub will be display as
available on each computer networks. The computer group will be take part out
uniformly between the computers moment in the gathering. The given below
screenshots are more define the computer group and changes values.

Figure 23 Itahari 30 ATM

13
BIBEK CHAUDHARY
Figure 24 Butwal 30 ATM

1.2.2.8. MESSAGE SOURCE


Message source is a message generator that ability to sending information
or message to one or more stopping place or destination. Simply, Source is
a object that write message and send to receiver. There given screenshots
shows edited values:

Figure 25 Itahari single teller message source : Message

14
BIBEK CHAUDHARY
Figure 26 Itahari single teller mechine message source: Packets

Figure 27 Itahari ATM message source: Message

Figure 28 Itahari ATM message source: Packets

15
BIBEK CHAUDHARY
Figure 29 Butwal single teller message source: Messages

Figure 30 Butwal single teller mechine message source: Packet

Figure 31 Butwal ATM message source: Messages

16
BIBEK CHAUDHARY
Figure 32 Butwal ATM message source: Packets

1.3. DESCRIPTION OF REPORTS


1.3.1. NODE REPORT: RECEIVED MESSAGE COUNT

REPLICATION 1 FROM 0.0 TO 60.0 SECONDS

Table 1 Node Report: Received message count

Receiver Counts Message name

Edinburgh LAN.ATM 984 Butwal ATM message


processing node source

Edinburgh LAN.ATM 988 Itahari ATM message


processing node source

Edinburgh LAN.ATM 2 Itahari teller m


processing node message source
Butwal LAN.Butwal 6 Butwal teller message
Single teller mechine source

17
BIBEK CHAUDHARY
RECEIVED MESSAGE COUNTS
1200

1000

800

600

400

200

0
Butwal ATM Mesg Source Itahari ATM Msg Source Itahari Sigle Teller Msg Butwal Single Teller Msg
Source Source

Counts

Figure 33 Received Message Count Bargraph

1.3.2. LINK REPORT: CHANNEL UTILIZATION

LINKS FRAMES TRANSMISSION DELAY (MS) %


MAXIMUM UTIL

DELIVERED RST/ERR AVERAGE STD DEV


Edinburgh 12722 0 0.038 0.014 0.882 0.8027
LAN.Token
passing Link
Butwal LAN. 18939 0 0.073 0.028 0.589 2.2458
Butwal
CSMA/CD
link
Itahari 19061 0 0.073 0.028 0.803 2.2549
LAN.Itahari
CSMA/CD
Link

Table 2 Link Report: Channel Utilization

18
BIBEK CHAUDHARY
Channel Utilization
2.5

1.5

0.5

0
Eniburgh LAN. Token Passing Link Butwal LAN.Butwal CSMA/CD Link Itahari LAN.Butwal CSMA/CD Link

% Utilization

Figure 34 Channel Utilization Bargraph

1.3.3. WAN CLOUD REPORTS: FRAME DELAY, FRAME COUNT, ACCESS LINK
STATS:
1.3.3.1. WAN CLOUD: FRAME DELAY BY VC

Table 3 Frame delay by VC

WAN Cloud FRAME DELAY (MS) BRUST SIZE (kb)


VC
AVG STD MAX AVG MAX
Edinburgh- 17 0 17 111 251
Itahari

Itahari- 1166 702 2521 159 320


Edinburgh

Butwal- 1165 698 2521 158 320


Edinburgh

Edinburgh- 17 0 17 111 242


Butwal

19
BIBEK CHAUDHARY
Frame delay average
1400

1200

1000

800

600

400

200

0
Edinburgh-Itahari Itahari-Edinburgh Butwal-Edinburgh Edinburgh-Butwal

Frame delay average

Figure 35 Frame Delay Average Bargraph

Brust Size Average


180

160

140

120

100

80

60

40

20

0
Ediburgh-Itahari Itahari-Edinburgh Butwal-Edinburgh Edinburgh-Butwal

Brust Size Average

Figure 36 Brust Size Average Bargraph

20
BIBEK CHAUDHARY
1.3.3.2. WAN CLOUD: FRAME COUNT BY VC
Table 4 Frame count by VC

WAN CLOUD FRAMES/KILOBITS


: ACCEPTED DROPPED
VC: FRAMES NORMAL DE NORMAL DE
KILOBITS
Total kilobites
transmitted
=5263
Edinburgh- 2304 877 0 0
Itahari frm
kb 737 281 0 0
Itahari- 1597 1584 0 9575
Edinburgh frm
kb 805 809 0 4691
Butwal- 1614 1566 0 9451
Edinburgh frm
kb 803 811 0 4651
Edinburgh- 2304 876 0 0
Butwal frm
kb 737 280 0 0

Frames Accepted
2500

2000

1500

1000

500

Frames Accepted

Figure 37 Frame Accepted Bargraph

21
BIBEK CHAUDHARY
1.3.3.3. WAN CLOUD: ACCESS LINK STATS
WAN ENTRY FRAMES BUFFER(BYTES) % UTIL
CLOUD: EXIT
ACCESS
LINK ACPTED DROP MAX AVG STG

Ediburgh Entry 6361 0 N/A N/A N/A 34.46

Exit 6361 0 34001 7817 10318 49.98

Itahari Entry 3181 9575 N/A N/A N/A 98.05

Exit 3181 0 80 7 15 17.23


Butwal Entry 3180 9451 N/A N/A N/A 97.41

Exit 3180 0 80 7 15 17.23

Table 5 Access Link Stats

Frame Accepted
7000

6000

5000

4000

3000

2000

1000

0
Edinburgh frame Edinburgh frame Itahari frame Itahari frame Butwal frame Butwal frame
accepted entry accepted exit acccpted entry acccpted exit accepted entry accepted exit

Frame Accepted

Figure 38 Access link stats bargraph

22
BIBEK CHAUDHARY
1.3.3.4. MESSAGE AND REPORT RESPONSE: MESSAGE DELAY FOR ALL
NODES
Table 6 Message Delay For All Nodes

ORIGIN/MSG MESSAGE AVERAGE MESSAGE MAXIMUN


SRC NAME: ASSEMBLED DELAY STD
DESTINATION DEV
LIST
Edinburgh LAN.ATM Processing server/src Edinburgh Message Response:
ECHO 0 0.000MS 0.000MS 0.000MS

Butwal LAN.Butwal Single Teller Machine / Src Butwal teller message source:
Butwal single.. 6 210.000MS 0.000MS 210.000MS

Butwal LAN.Butwal ATM /Src Butwal Message Source:


Edinburgh ATM Pr. 521 21560.325MS 13643.136MS 52033.797MS

Itahari LAN. Itahari Single Teller Machine / Src Itahari Teller Message Source:
Edinburgh LAN.ATM Pr. 0 0.000MS 0.000MS 0.000MS

Itahari LAN.Itahari 30 ATM/ Src Itahari ATM Message Source:


Edinburgh LAN. ATM pr 510 21725.327MS 14104.926MS 51845.753MS

Message+response source=Message Delay


25000

20000

15000

10000

5000

0
Edinburgh Message Butwal Teller Butwal 30 ATM Itahari Teller Itahari ATM
Source Message Source Message Source Message Source Message Source

Average

Figure 39 Message+response source= Message delay

23
BIBEK CHAUDHARY
1.4. CONCLUSION
From the above mention result of both WAN and LAN mode, it is proved that WAN model
is far better than LAN in real life scenario. The reports that are generated clearly shows
the overall function of the WAN and LAN model that were created from comnet software.
we configured a network using CSMA/CD with the help of lecture and researches on
comnet and different processing nodes including the internal and external router.

2. TASK B
2.1. INTRODUCTION
When two or more computer connected to each other that data is passing from one
computer to another computer is called Networking. Now, why it is called wireless we do
not need to attach any kind of wire to a system to achieve internet communication so this
called wireless networks or communication networking. We can transfer data from one to
another devices without using any kind cables or wires. Remote framework can be worked
for almost no expense contrasted with customary wired choices. In any case, building
remote organizations is just somewhat about setting aside cash. By furnishing individuals
in your nearby network with less expensive and simpler admittance to data, they will
straightforwardly profit by what the Internet has to bring to the table. The time also, exertion
saved by approaching the worldwide organization of data interprets into abundance on a
neighborhood scale, as more work should be possible in less time and with less exertion.
Wireless Networks gave permit distance gadgets to interface without trouble, freely these
gadgets are a couple of feet or a few kilometers away and no need need get through
dividers to pass links or introduce connectors. This has made the utilization of this
innovation of the innovation exceptionally mainstream, spreading quickly. Using this
technology we can make more flexible and easy to access. To create wireless networks
we have some tools like Network interface card (NIC), Access point and signal adapter.
There are many different technologies that differ in the transmission frequency used,
speed and range of their transmissions. There are 4 types of networks are listed below:
 WAN: WAN is wide area network , it is very large network which need large area
network we can also called large area network. Wireless Wide Area Networks
extend beyond 50 kilometers and regularly use authorized frequencies. These
kinds of organizations can be kept up over enormous regions, for example: urban
communities or nations, by means of various satellite frameworks or reception
apparatus locales looked after by an internet providers.
 LAN: It is stand for Local Area Network, when two or more computer are connected
in one local network that is called LAN. Local Area Networks are intended to give
remote access in zones with a regular reach up to 100 meters and, are utilized
generally in home, school, PC research center, or office conditions. This gives
clients the capacity to move around inside a neighborhood inclusion territory and
still be associated with the network . WLANs depend on IEEE 802.11standards,
promoted under the Wi-Fi brand name. Because of rivalry, different principles, for

24
BIBEK CHAUDHARY
example, HiperLAN never gotten a lot of business usage. IEEE 802.11 was more
straightforward to execute what's more, made it quicker to the market.
 PAN: PAN is Personal Area Network that is smallest area networks which used in
small distance like Bluetooth, IrDA,ZigBase,UWB. They grant correspondence in a
short reach, of around 10 meters. In contrast to other remote networks, an
association made through a WPAN includes next to zero framework or then again
direct network to the world external the connection. This permits little, power
efficient, cheap answers for be actualized for a wide scope of gadgets such as a
cell phone and a PDA.
 MAN: MAN stand for Metropolitan Area Networks, it is third group of wireless
networks. The networks that are interconnect user with computer that are larger
than LAN and smaller than WAN. MAN are depend on IEEE 802.16 standard which
is regularly called WiMAX (Worldwide Interoperability for Microwave Access).
WiMAX is a interchanges innovation that supports highlight multipoint engineering
pointed toward giving fast remote information over metropolitan region
organizations. This empowers more modest remote LANs to be interconnected by
WiMAX making an enormous MAN. In this manner, organizing between urban
areas can be accomplished without the requirement for costly cabling.
2.2. BACKGROUND
Wireless Networks have fundamentally affected the world, since their beginning sending.
Wireless Networks have proceeded to create and their utilizations have essentially
developed. PDAs are these days part of tremendous remote organization frameworks and
individuals utilize cell phones on a day by day premise to speak with one another and
trade data. As of late, Wireless Networks have been utilized for situating too, to empower
the arrangement of area situated administrations to the end-client. Various kinds of
estimations accessible during standard organization and terminal activity, for the most part
for asset the board and synchronization purposes, can be utilized to determine the client's
area. With these various employments of remote organization, this task will zero in on
assets sharing devoted organization. A teacher at the University of Hawaii, Norman
Abramson built up the world's first remote PC correspondence organization, ALOHAnet
(operational in 1971), utilizing ease ham-like radios. The framework included seven PCs
conveyed over four islands to speak with the focal PC on the Oahu Island without utilizing
telephone lines. WLAN equipment at first expense to such an extent that it was simply
utilized as an option in contrast to cabled LAN in spots where cabling was troublesome or
unthinkable. Early advancement included industryspecific arrangements and restrictive
conventions, yet toward the finish of the 1990s these were supplanted by norms,
fundamentally the different adaptations of IEEE 802.11 (in items utilizing the Wi-Fi brand
name). An elective ATM-like 5 GHz normalized innovation, HiperLAN/2, has so far not
prevailing in the market, and with the arrival of the quicker 54 Mbit/s 802.11a (5 GHz)
what's more, 802.11g (2.4 GHz) norms, it is much more impossible that it will ever
succeed. In 2009 802.11n was added to 802.11. It works in both the 2.4 GHz and 5 GHz
groups at a most extreme information move pace of 600 Mbit/s. Most new switches can
use both remote groups, known as dualband. This permits information interchanges to
evade the swarmed 2.4 GHz band, which is likewise imparted to Bluetooth gadgets
furthermore, microwaves. The 5 GHz band is likewise more extensive than the 2.4 GHz
25
BIBEK CHAUDHARY
band, with more channels, which allows a more noteworthy number of gadgets to share
the space. Not all diverts are accessible in all locales. A remote neighborhood (WLAN)
joins at least two gadgets utilizing some remote dispersion strategy (ordinarily spread-
range or OFDM radio), and as a rule giving an association through a passageway to the
more extensive Internet. This enables clients to move around inside a nearby inclusion
territory and still be associated with the organization. Generally current WLANs depend
on IEEE 802.11 norms, showcased under the Wi-Fi brand name. Remote LANs have
gotten well known in the home due to simplicity of establishment, and in business buildings
offering remote admittance to their clients; regularly for nothing. New York City, for
example, has started a test case program to give city laborers in every one of the five
precincts of the city with remote Internet access. In like manner, Muritala International Air
terminal, Lagos has free remote web access for traveler travelling around.
2.1.1. WIRELESS NETWORKS
2.1.1.1. HISTROY
In 1970, the University of Hawaii built up the primary Wireless Networks to wirelessly
communicate information among the Hawaiian Islands. Nonetheless, it wasn't until
1991 that the Institute of Electrical and Electronics Engineers (IEEE) started to
examine normalizing WLAN advancements. In 1997, the IEEE approved the first
802.11 norm—the "802.11" innovation term basically alludes to Wi-Fi. In 1999 remote
was acquainted with the overall population as a "ideal to have" with the 802.11 an
and b sanctions. These guidelines had extremely low accelerates (to 54 Mbps and
11Mbps separately) yet it was alright, on the grounds that there were no handheld
cell phones that used Wi-Fi and not many workstations. By 2003, nonetheless, some
cell phones that used Wi-Fi were coming out and versatile workstations were getting
more norm for both business and individual use. That is when 802.11g was
sanctioned—conveying up to 54 Mbps in the 2.4 GHz space. As we drew nearer to
now, in 2007, the introduction of the cell phone truly came to fruition and alongside it
came the sanction of 802.11n. The "n" standard achieved quicker handling rates of
up to 450 Mbps for Wi-Fi and it upheld both 2.4 Ghz and 5 Ghz gadgets. Today, keen
gadgets are adequately vigorous to supplant particular, more costly PC advances so
Wireless has needed to make up for lost time.
2.1.1.2. ADVANTAGES AND DISADVANTAGES
Wireless networks have advantage and disadvantages are listed bellows:
ADVANTAGES
 Freedom from wires.
 Easy to expand and setup.
 it is more flexible and adaptable compared to wired network.
 Easy to install without wire that make cheaper.
DISADVANTAGES
 Wireless networks like open bottle, which make less secure.
 Unreliability.
 Increased chance of jamming.
 Transmission speed is comparably less.
 It is more vulnerable to attack by unknown users.
26
BIBEK CHAUDHARY
2.1.2. IEEE 802.11 Architecture
The engineering of the IEEE 802.11 WLAN is intended to help an organization where
most dynamic is dispersed to versatile stations. This kind of design has a few focal
points. It is lenient toward issues in the entirety of the WLAN hardware and wipes out
potential bottlenecks a brought together engineering would present. The design is
adaptable and can without much of a stretch help both little, transient organizations
and enormous, semi permanent or perpetual organizations. Likewise, the engineering
and conventions offer critical force saving and draw out the battery life of versatile
gear without losing network availability
2.1.3. IEEE 802.11 Priorities
The IEEE 802.11 conveyed coordination work (DCF) empowers quick establishment
with negligible administration and support costs, and is an extremely vigorous
convention for the best exertion administration in remote medium. Notwithstanding,
the current DCF is unsatisfactory for ongoing applications. This paper contemplates
back off-based need plans for IEEE 802.11 and the arising IEEE 802.11e norm by
separating the base back off window size, the back off window-expanding factor, and
as far as possible. A logical model is proposed to infer immersion throughputs,
immersion deferrals, and casing dropping probabilities of various need classes for all
proposed need plans. Reproductions are directed to approve scientific outcomes. The
proposed need plans can be handily executed, and the outcomes from this paper are
valuable in planning great need boundaries.
2.1.4. WIRELESS TECHNOLOGIES
There many different types of wireless technologies. Some wireless technologies give
below:
2.1.4.1. WAP
WAP represents Wireless Application Protocol. It is a convention intended
for miniature programs and it empowers the entrance of web in the cell
phones. It utilizes the increase language WML (Wireless Markup Language
and not HTML), WML is characterized as XML 1.0 application. It empowers
making web applications for cell phones. In 1998, WAP Forum was
established by Ericson, Motorola, Nokia and Unwired Planet whose point
was to normalize the different remote advances by means of conventions.
WAP convention was come about by the joint endeavors of the different
individuals from WAP Forum. In 2002, WAP gathering was converged with
different discussions of the business bringing about the development of
Open Mobile Alliance (OMA).
2.1.4.2. WML
WML represents Wireless Markup Language (WML) which depends on
HTML and HDML. It is indicated as a XML report type. It is a markup
language used to create sites for cell phones. While planning with WML,
imperatives of remote gadgets, for example, little presentation screens,
restricted memory, low data transfer capacity of transmission and little
assets must be thought of. WAP (Wireless Application Protocol) locales are
not the same as should be expected HTML destinations in the way that they

27
BIBEK CHAUDHARY
are monochromatic (just high contrast), brief and has tiny screen space,
because of which content in the WAP locales will be just the huge issue,
much like how transmit used to function in the times past. The idea WML
follows is that of a deck and card analogy. A WML record is considered as
comprised of numerous cards. Much the same as how cards can be
gathered to shape a deck, a WAP site has numerous cards. Each card will
be shown in turn on the screen, much the same as how each page is shown
in turn in a HTML site. Numerous cards can be embedded into a WML report,
and the WML deck is recognized by a URL.
2.3. CONCLUSION
Wireless network innovations interface without wires our high innovation gadgets to either
a rapid organization or another gadget. Previously, wires would need to be put from space
to room or floor to floor, cost for arrangement was expensive, and the time to arrangement
a wired organization was unfathomably expanded from a remote organization among
different things. These days setting up a wireless network arrangement is truly simple to
do, and there are a ton of wireless items to browse notwithstanding a lot of assets
accessible to assist you with arrangement and setup of the Wireless Network if necessary.
Various advancements can be picked to best suit the application necessity and information
transmission reach can fluctuate from a couple of meters to a few kilometers. Wireless
networks unquestionably offer new open doors for modern arrangements, yet they should
be executed with extraordinary consideration regarding security.

3. REFRENCES AND BIBLIOGRAPHY


Halsal, F., 2005. Computer Networking and the internet . In: Computer Networking and the
internet . Edinburgh Gate, Harlow, Essex CM20 2JE, England : Pearsoned Education
Limited , p. 803.
Michael E. whitman, H. J. M., 2018, 2016, 2016. Principles of Information Security . In:
Principles of Information security . 20 Channel Center Street Baston, MA 02210 USA:
Cengage Learning., p. 778.
shahni, A., 24-05-2020. Greek for greek. [Online]
Available at: https://www.geeksforgeeks.org/wireless-communication-set-1/
Stalling, W., 2005. Wireless Communication and Networks. In: Wireless Communication and
Networks. s.l.:Pearson .

4. APPENDIX
APPENDIX- A Screenshot of Simulation Report

28
BIBEK CHAUDHARY
Figure 40 Screenshot Simulation part1

29
BIBEK CHAUDHARY
Figure 41 Screenshot of simulation part 2

30
BIBEK CHAUDHARY
Figure 42 Screenshot of Simulation part 3

31
BIBEK CHAUDHARY
Figure 43 Screenshot of simulation part 4

32
BIBEK CHAUDHARY
Figure 44 Screenshot of simulation part 5

APPENDIX- Addition Content of TASK B


Wireless Personal Area Networks:
Wireless Personal Area Networks depend on the IEEE 802.11. They grant correspondence in
an exceptionally short reach, of around 10 meters. In contrast to other remote networks, an
association made through a WPAN includes almost no foundation or then again direct network
to the world external the connection. This permits little, power efficient, modest answers for be
executed for a wide scope of gadgets such as a cell phone and a PDA. These organizations are
described by low force requests and a low piece rate. Such sort of organizations transfer on
advancements, for example, Bluetooth, IrDA, ZigBee or UWB. From an application perspective,
Bluetooth is proposed for a cordless mouse, console, and sans hands headset, IrDA is expected

33
BIBEK CHAUDHARY
for highlight point interfaces between two gadgets for basic information moves and record
synchronization, ZigBee is planned for dependable remotely arranged checking and control
organizations and, UWB is arranged to high-transfer speed media joins.
 Bluetooth: Bluetooth corresponds to the IEEE 802.15.1 standard. Originally Bluetooth
was designed for low power consumption, short range and omni-directional (point to
multipoint) communications, and cheap devices, to be used as a cable replacement,
linking devices through an ad hoc connection of radio waves. Nowadays developers are
designing Bluetooth-enabled components and systems for a range of additional
applications. This technology operates for three different classes of devices: Class 1,
class 2 and class 3 where the range is about 100 meters, 10 meters and 1 meter
respectively. Using the 2.4 GHz band, two devices within the coverage range of each
other can share up to 720 Kbps of capacity or transfer rate. The most commonly used is
class 2.

 IrDA: The Infrared Data Association (IrDA) indicates a total arrangement of infrared
interchanges norms. IrDA alludes to that set of norms and is utilized to give remote
availability to gadgets that would ordinarily utilize links for availability. IrDA is a low-
power, minimal effort, unidirectional (highlight point), limited point (< 30º) cone,
impromptu information transmission standard intended to work over a distance of up to 1
meter and at paces of 9600 bps to 4 Mbps (as of now), 16 Mbps (being worked on). A
portion of the gadgets that utilization IrDA are scratch pad, PDAs, printers and cameras.
APPENDIX- C GLOSSARY
802.11 - The overall standard created by the IEEE for Wireless local area network. Inside the
802.11 standard are different substandards, including 802.11b (11 Mbps utilizing the 2.4 GHz
range), 802.11a (54 Mbps utilizing the 5 GHz range), and 802.11g(54 Mbps utilizing the 2.4 GHz
range).
LAN – Local Area Network
PAN – Personal Area Network
WAN – Wide Area Network
Gadget- anykind of device
Data - kind of information
Access point- it is point that create LAN
authorized- having permission
remote – Wireless
Wi-Fi- wireless fidelity
HiperLAN- High Performance Radio LAN
IrDA- infrafed data association
UWB- Ultra- wideband
PDA- Personal digital assistance
WiMAX- worldwide interoperability for micro access
Microwave- types of radiation with lenght
empowers- authority
enormous – large aize
Synchronization - the operation or activity of two or more things at the same time or rate.

34
BIBEK CHAUDHARY
swarmed – move from one to another
Unreliability – trusted
Vulnerable – being harmed or attacked
Dynamic- energetic
DCF- Discount cash flow
Modem- modulator- demodulator
Immersion – deeply involving
WAP- Wireless application protocol
WML- Wireless markup Language
Monochromatic – single wavelength
URL – Uniform Resource Locator

35
BIBEK CHAUDHARY

You might also like