You are on page 1of 75

KESHAV KUMAR TIWARI M.

TECH(CTA) 0012CS11MT08 NITTTR,BHOPAL

Objective
Introduction A Brief History of Wireless technology. Wired Vs Wireless Technology

Wireless Standards. Types of wireless networks. Types of technologies. Multiple Access Techniques. Wireless ad-hoc network. Mobile ad hoc network . Energy Conservation in Mobile Adhoc

INTRODUCTION
Wireless is a term used to describe communications in which electromagnetic waves are used for communication purpose

The first wireless transmitters went on the air in the early 20th century using radiotelegraphy (Morse code). Later, as modulation made it possible to transmit voices and music via wireless

A Brief History of Wireless Wireless communications originated with the

demonstration by Tesla in 1893, followed by the invention of wireless telegraph by Marconi in 1896. Advances in wireless communications have led to radio, television, mobile telephones, and communication satellites Development of wireless networks: LAN, MAN, and WAN Trend continues: Voice Data Broadband Need to support mobility

1.Cellular phones and pagers

COMMON EXAMPLES OF WIRELESS:

2.Cordless computer peripherals

3.Global Positioning System (GPS)-

Need of Wireless Technology Goes where cable and fibre cannot: The system will carry
information across geographical areas that are prohibitive in terms of distance, cost, access, or time.

Completes the access technology portfolio: Involves reduced time to revenue:


existing dial, cable, and DSL technologies.

Wireless enables a fully comprehensive access technology portfolio to work with


Companies can generate revenue in less time through the deployment of wireless solutions than with comparable access technologies

Provides broadband access extension:

wireless commonly both competes with and complements existing broadband access. Wireless technologies play a key role in extending the reach of cable, fibre, and DSL markets, and it does so quickly and reliably.

Difference between wired and wireless technology


o Wireless networking has predominantly become

more popular over the past few years, with advancements in technology, wireless speeds are getting closer to matching those of wired and many homes and businesses are implementing them into their network.

o While wireless certainly offer flexibility and

convenience there are also many other important factors to consider when using them in place of wired networks.

oSPEED The networking of the wired networks are more faster as compared to other types of wireless networking devices because they are able to provide the speed of more then 1000 Mbps. oINSTALLATION Wired, ethernet cable must be on each computer to another computer or a central device. This often causes complications because of the length of cable required and necessary arrangements to wire the room neat. Wireless, can be configured in 2 ways o Ad hoc networks o Infrastructure mode oBoth ad hoc and infrastructure mode needs a Network adapter called WLAN cards.

RELIABILITY Due to there being no physical medium, data has to transfer through the air and must pass through any surface in its path. This means that signals can get blocked and deflected and this means your connection can suffer or even drop. Wired network fails very rarely and provide good speed and performance MOBILITY
In

wired technology it cannot provide mobile network. Difficult to lay down the cables and it looks very messy when install outside. In wireless technology it is not very much reliable only best for mobile devices such as Laptops. Not faster as compared to wired devices

COST oIn wired technology we need many expenses to setup the wired network. o Because we need large money to spread the network of coaxial cables. o As compared to other wired devices it is easy to setup the wireless networking devices at the very low and at the reliable cost.

Wireless?

Wireless network refers to any type of computer

network that is not connected by cables of any kind. It is a method by which homes,telecommunications networks and enterprise (business) installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. The last link with the users is wireless, to give a network connection to all users in a building or campus. The backbone of network usually uses cables.

WIRELESS CAN BE DIVIDED INTO :


FIXED WIRELESS

1.Mobile wireless 2.Portable wireless


IR WIRELESS

1.IR (infrared) radiation

Wireless Standards
IEEE 802.15.4 (Zigbee Alliance)

Sensors RAN

RFID (AutoID Center)

IEEE 802.22

WAN
3GPP (GPRS/UMTS) 3GPP2 (1X--/CDMA2000) GSMA, OMA

IEEE 802.20 IEEE 802.16e IEEE 802.16d WiMAX IEEE 802.11 Wi-Fi Alliance IEEE 802.15.3 UWB, Bluetooth Wi-Media, BTSIG, MBOA

MAN LAN PAN

ETSI HiperMAN & HIPERACCESS ETSI-BRAN HiperLAN2

ETSI HiperPAN

Types of wireless networks


1.Wireless PAN- Wireless personal area networks(WPANs)

interconnect devices within a relatively small area, that is generally within a person's reach. For example- both Bluetooth radio and invisible infrared light provides a WPAN for interconnecting a headset to a laptop.

2.Wireless LAN- A wireless local area network (WLAN)

links two or more devices over a short distance using a wireless distribution method, usually providing a connection through an access point for Internet access. The use of spread-spectrum or OFDM technologies may allow users to move around within a local coverage area, and still remain connected to the network.

3.Wireless mesh network- A wireless mesh network is

a wireless network made up of radio nodes organized in a mesh topology. Each node forwards messages on behalf of the other nodes. Mesh networks can "self heal", automatically re-routing around a node that has lost power.

4.Wireless WAN- Wireless wide area networks are

wireless networks that typically cover large areas, such as between neighbouring towns and cities, or city and suburb. These networks can be used to connect branch offices of business or as a public internet access system.

Cellular network

A cellular network or mobile network is a radio network distributed over land areas called cells, each served by at least one fixed-location transceiver, known as a cell site or base station.

In a cellular network, each cell characteristically uses a

different set of radio frequencies from all their immediate neighbouring cells to avoid any interference. When joined together these cells provide radio coverage over a wide geographic area. This enables a large number of portable transceivers (e.g., mobile phones, pagers, etc.)

Technologies?
Cellular Technologies Wireless LAN Technology

2G system 2.5 system 3G system 4G system Next System Short range Technologies Home RF Bluetooth Zigbee

2.4/wireless LAN Adhoc /Infrastructure mode

Long Range Technologies Internet

Cellular Technologies
2G system
2G (or 2-G) is short for second-generation wireless telephone technology. Second generation 2G cellular telecom networks were commercially launched on the GSM standard is launched in 1991.Three primary benefits of 2G networks over their predecessors were that phone conversations were digitally encrypted.

2G systems were significantly more efficient on the spectrum allowing for far greater mobile phone penetration levels and 2G introduced data services for mobile, starting with SMS text messages.

2.5 system
2.5G is used to describe 2G-systems that have implemented a

packet-switched domain in addition to the circuit-switched domain. It does not necessarily provide faster services because bundling of timeslots is used for circuit-switched data services (HSCSD) as well. The first major step in the evolution of GSM networks to 3G occurred with the introduction of General Packet Radio Service (GPRS).

GPRS could provide data rates from 56 kbit/s up to 115 kbit/s. It can

be used for services such as Wireless Application Protocol (WAP) access, Multimedia Messaging Service (MMS), and for Internet communication services such as email and World Wide Web access.

3G system- 3G, short for third Generation, is a term used to

represent the 3rd generation of mobile telecommunications technology. Also called Tri-Band 3G. This is a set of standards used for mobile devices and mobile telecommunication services and networks that comply with the International Mobile Telecommunications-2000 (IMT-2000) specifications by the International Telecommunication Union.

3G finds application in wireless voice telephony, mobile Internet

access, fixed wireless Internet access, video calls and mobile TV.

Recent 3G releases, often denoted 3.5G and 3.75G, also provide

mobile broadband access of several Mbit/s to smartphones and mobile modems in laptop computers.

4G system In telecommunications, 4G is the fourth generation of mobile phone

mobile communications standards. It is a successor of the third generation (3G) standards. A 4G system provides mobile ultra-broadband Internet access, for example to laptops with USB wireless modems,to smartphones, and to other mobile devices. Conceivable applications include amended mobile web access, IP telephony, gaming services, high-definition mobile TV, video conferencing and 3D television. In Australia, Telstra launched the country's first 4G network (LTE) in September 2011 claiming "240 Mbps" speeds and announced an "aggressive" expansion of that network in 2012. In India, Bharti Airtel has launched India's first 4G service using TD-LTE technology in Kolkata on 10 April 2012. In New Zealand, the first 4G network will be introduced in December 2013.

Short range Technologies


Home RF
Home RF was a wireless networking specification for home devices. It was developed in 1998 by the HomeRF Working Group, a consortium of mobile wireless companies that included Proxim Wireless, Siemens, Motorola, Philips. and more than 100 other companies. The group was disbanded in January 2003 after other wireless networks became accessible to home users and Microsoft began including support for them in its Windows operating systems. As a result HomeRF has fallen into obsolescence. The archive of the HomeRF Working Group is maintained by Palo Wireless.

INTRODUCTION: Wi-Fi is an alternative to Wired Technology, which is commonly used, for connecting devices in wireless mode. Wi-Fi (Wireless Fidelity) is a generic term that refers to the IEEE 802.11 communications standard for Wireless Local Area Networks (WLANs). Wi-Fi Network connect computers to each other, to the internet and to the wired network.

Cont
Wi-Fi is based on 802.11 technology It is originally intended to provide wireless computing for

staffs within businesses and commercial organisations However, residential customers adopted Wi-Fi faster than enterprises because of its simplicity, fewer concerns about security and the benefit of avoiding the expenses for cabling Its advantage is low equipment cost and easier installation Benefits were also immediately noticed for healthcare, education, retailing and warehousing

HOW WI-FI WORKS? Basic concept is same as Walkie talkies. A Wi-Fi hotspot is created by installing an access point to an internet connection. When Wi-Fi enabled device encounters a hotspot the device can then connect to that network wirelessly. Many access points can be connected to each other via Ethernet cables to create a single large network.

WIFI TOPOLOGIES AP-based topology (Infrastructure Mode) Peer-to-peer topology (Ad-hoc Mode) Point-to-multipoint bridge topology

WI-FI SECURITY THREATS Wi-Fi Is Also Having Some Security Issues Like>>Eavesdropping - Eavesdropping is the process of gathering information from a network by snooping on transmitted data. And to eavesdrop is to secretly overhear a private conversation over a confidential communication in a not legally authorized way. >>Man-in-the-middle attacks- is also known as a bucket brigade attack, or sometimes Janus attack in cryptography and computer security is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. >>Denial of Service- a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users.

WI-FI APPLICATIONS
o It

Is Most Commonly Used In Laptops And Mobiles For Internet Portability oUsed At Airport For Updating FlightTime Tables On Servers

oUsed In Offices To Connect Many Building On One HUB.

Bluetooth is a wireless technology standard for exchanging data over short distances from fixed and mobile devices, creating personal area networks (PANs) with high levels of security. Using Bluetooth "Automatic communication between various devices within a small area in house or an office makes it possible. When you click on an icon for a device and you are linked to it, automatically and transparently

Zigbee is a specification for a suite of high level communication protocols using small, low-power digital radios based on the IEEE 802.15.4-2003 standard for wireless personal area networks (WPANs), such as wireless headphones connecting with cell phones via shortrange radio . Typical application of Zigbee areas includeHome Awareness Water sensors, power sensors, smoke and fire detectors ,smart appliances and access sensors. Mobile Services m-payment, m-monitoring and control, m-security and access control, m-healthcare. Commercial Building Energy monitoring, HVAC, lighting, access control. Industrial Plant Process control, asset management, environmental management, energy management, industrial device control.

Zigbee

Wireless LAN Technology


WIRELESS LAN A WLAN is data communication system that reduces the need for wired connections and makes new applications possible, thereby adding new flexibility to networking.

802.11 - this is the network technology used in wireless LANs. In fact, it is a family of technologies such as 802.11a. 802.11b, etc., differing in speed and other attributes

ARCHITECTURE OF WLAN
o

Stations Basic service set Extended service set Distribution system

o STATIONS

All components that can connect into a wireless medium in a network are referred to as stations
o

Wireless stations fall into one of two categories:

o o

Access points Clients

o BASIC SERVICE SET

The basic service set (BSS) is a set of all stations that can communicate with each other.
oThere

are two types of BSS: oIndependent BSS oInfrastructure BSS.

o EXTENDED SERVICE SET

An extended service set (ESS) is a set of connected BSSs.

o DISTRIBUTION SYSTEM

The concept of a DS can be used to increase network coverage through roaming between cells.

How are WLANs Different?


They use specialized physical and data link protocols They integrate into existing networks through access

points which provide a bridging function They let you stay connected as you roam from one coverage area to another They have unique security considerations They have specific interoperability requirements They require different hardware They offer performance that differs from wired LANs.

Trends in wireless networks Revenue for wireless communication industry has

surpassed that of wired telephony industry Wireless applications span both local area and wide area for:
voice-oriented services, and data-oriented services

Global cellular networks are providing very

convenient communication infrastructure Broadband wireless networks are using Wireless LANs that are very popular.

Duplexing
Duplexing facilitates communications in both

directions simultaneously: base station to mobile and mobile to base station Duplexing is done either using frequency or time domain techniques:
Frequency division duplexing (FDD) Time division duplexing (TDD)

FDD is suitable for radio communication systems,

whereas TDD is more suitable for fixed wireless systems

Multiple Access Techniques


Frequency Division Multiple Access Time Division Multiple Access Spread Spectrum Multiple Access Space Division Multiple Access Packet Radio

Frequency Division Multiple Access (FDMA)


The frequency spectrum is divided into unique

frequency bands or channels These channels are assigned to users on demand Multiple users cannot share a channel Users are assigned a channel as a pair of frequencies (forward and reverse channels) FDMA requires tight RF filtering to reduce adjacent channel interference

TIME

FDMA

Channel-1 Channel-2 Channel-3 Channel-4 Channel-5 Channel-6 Channel-7 Channel-8 Channel-9 FREQUENCY

Time Division Multiple Access-TDMA


TDMA systems divides the radio spectrum into time

slots, and in each time slot only one use is allowed to either transmit or receive Transmission for any user is non-continuous In each TDMA frame, the preamble contains the address and synchronization information TDMA shares a single carrier frequency with several users TDMA could allocate varied number of time slots per frame to different users

FREQUENCY Channel-1 Channel-2 Channel-3 Channel-4 TIME Channel-5 Channel-6 Channel-7 Channel-8 Channel-9 Channel-10

TDMA

Spread Spectrum Multiple Access (SSMA)


SSMA uses signals that have a transmission

bandwidth several orders of magnitude greater than the minimum required RF bandwidth SSMA provides immunity to multipath interference and robust multiple access capability SSMA is bandwidth efficient in multi-user environment SSMA techniques:
Frequency hopped (FH) multiple access Direct sequence (DS) multiple access It is Also known as code division multiple access (CDMA)

CDMA

The narrowband message signal is multiplied by a very large

bandwidth signal called spreading signal The spreading signal has a pseudo-noise code sequence that has a chip rate which is orders of magnitudes greater than the data rates of the message All users use the same carrier frequency and can transmit simultaneously Each use has its own pseudorandom codeword that is orthogonal to the others The receivers need to know the codeword of the corresponding sender Power control is used to combat the near-far problem Near-far problem: When many mobile users share the same channel, the strongest received mobile signal will capture the demodulator at a base station. Thus a nearby subscriber could overpower the basestation receiver by drowning out the signals of far away subscribers.

CDMA Features
Many users of CDMA share the same frequency either

TDD or FDD may be used CDMA has soft capacity limit system performance is inversely proportional to the number of users Multipath fading is reduced because of the signal spread Channel data rates are very high Prone to self-jamming and near-far problem
Self-jamming: when the spreading sequences of different users

are not exactly orthogonal

Near-far problem occurs at a CDMA receiver if an

undesired user has a high detected power compared to the desired user

Space Division Multiple Access (SDMA)


SDMA controls the radiated energy for each user

and serves different users by using spot beam antennas Different areas covered by antenna beam may be served by same or different frequencies Reverse links present difficulty:
Transmitted power from each subscriber must be

controlled to prevent any single user from driving up the interference level Transmit power is limited by battery consumption at the subscriber unit

Carrier Sense Multiple Access Protocols (CSMA)


In CSMA protocols, each terminal on the network is

able to monitor the status of the channel before transmitting information Variations:
1-persistent CSMA non-persistent CSMA p-persistent CSMA CSMA/CD

IEEE 802.11
Standardization group formed in 1990, first

standards completed in 1997 IEEE 802.11 is the first WLAN standard; only one to secure a market 802.11a: PHY layer supports 11Mbps using CKK (complementary code keying) technology 802.11b: PHY layer supports 54 Mbps using OFDM Uses CSMA/CA for contention data Supports both infrastructure as well as ad hoc modes

IEEE 802.11 Protocol Architecture


Logical link control
Contentionfree service

Contention service

MAC layer

Point coordination function (PCF)

Distributed coordination function (DCF) 2.4-Ghz frequencyhopping spread spectrum 1Mbps 2Mbps 2.4-Ghz direct sequence spread spectrum 1Mbps 2Mbps Infrared 1Mbps 2Mbps 5-Ghz orthogonal FDM 6, 9. 12. 18, 24, 36, 48, 54 Mbps 2.4-Ghz direct sequence spread spectrum 5.5 Mbps 11 Mbps

IEEE 802.11

IEEE 802.11a

IEEE 802.11b

ADVANTAGES OF WIRELESS TECHNOLOGY

Easy to use. Avoid use of cables.

Offers productivity, convenience and cost advantages over traditional wired technology. Completes the access technology portfolios.

Goes where cable cannot. Involves reduced time to revenue. Provides broadband access extension. Greater flexibility and mobility for users.

DISADVANTAGES OF WIRELESS TECHNOLOGY:

Shorter range than wired connections. More prone to interferences. Several wireless networks can interfere with each other. More Expensive.

oDISADVANTAGES oBecause

cont

wireless transmissions can pass through walls, security is an issue. You will need to secure your private wireless network, generally by passwordrestricting the network and by using a firewall to prevent unwelcome visitors.

Wireless reception varies from area to area, even within your own apartment. It's not always guaranteed that you'll have a connection to the Internet.
o

Wireless ad-hoc network:


A wireless ad hoc network is a decentralized type

of wireless network. The network is ad hoc because it does not rely on a pre existing infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Instead, each node participates in routing by forwarding data for other nodes, and so the determination of which nodes forward data is made dynamically based on the network connectivity. In addition to the classic routing, ad hoc networks can use flooding for forwarding the data.

Application
The decentralized nature of wireless ad hoc networks

makes them suitable for a variety of applications where central nodes can't be relied on, and may improve the scalability of wireless ad hoc networks compared to wireless managed networks, though theoretical and practical limits to the overall capacity of such networks have been identified. Wireless ad hoc networks can be further classified by their application: mobile ad hoc networks (MANET) wireless mesh networks(WMN) wireless Sensor networks(WSN)

Mobile ad hoc network


A mobile ad-hoc network (MANET) is a self-

configuring infrastructureless network of mobile devices connected by wireless.

Ad hoc is Latin and means "for this purpose".

MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a Link Layer ad hoc network.

Types of MANET
Vehicular Ad-hoc Networks (VANETs) are used for

communication among vehicles and between vehicles and roadside equipment

Internet Based Mobile Ad-hoc Networks (iMANET)

are ad-hoc networks that link mobile nodes and fixed Internet-gateway nodes. In such type of networks normal adhoc routing algorithms don't apply directly.

Types of ad hoc routing protocols


standard, that controls how nodes decide which way to route packets between computing devices in a mobile ad hoc network . (1.)table-driven (Pro-active) routing:This type of protocols maintains fresh lists of destinations and their routes by periodically distributing routing tables throughout the network. The main disadvantages of such algorithms are: Respective amount of data for maintenance. Slow reaction on restructuring and failures.
An ad-hoc routing protocol is a convention, or

Examples of pro-active algorithms are:


DSDV (Highly Dynamic Destination-Sequenced Distance Vector routing protocol. (2) Reactive (on-demand) routing:This type of protocols finds a route on demand by flooding the network with Route Request packets. The main disadvantages of such algorithms are: High latency time in route finding. Excessive flooding can lead to network clogging. Examples of reactive algorithms are: Ad hoc On-demand Distance Vector(AODV) Dynamic Source Routing.

(3)Hybrid (both pro-active and reactive) routing


This type of protocols combines the advantages of proactive and of reactive routing. The routing is initially established with some proactively prospected routes and then serves the demand from additionally activated nodes through reactive flooding.

The main disadvantages of such algorithms are: Advantage depends on number of Mathavan nodes activated. Reaction to traffic demand depends on gradient of traffic volume.

Wireless mesh network


A wireless mesh network (WMN) is

a communications network made up of radio nodes organized in a mesh topology. Wireless mesh networks often consist of mesh clients, mesh routers and gateways. The coverage area of the radio nodes working as a single network is sometimes called a mesh cloud. The mesh routers may be mobile, and be moved according to specific demands arising in the network. Routing protocols AODV, DSDV, OSPF, DSR.

Wireless sensor network


A wireless sensor network (WSN) consists of spatially

distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. The WSN is built of "nodes. Each such sensor network node has typically several parts: a radio transceiver with an internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting.

Typical multi-hop wireless sensor network architecture

Characteristics

Power consumption constrains for nodes using batteries or energy harvesting Ability to cope with node failures Mobility of nodes Communication failures Heterogeneity of nodes Scalability to large scale of deployment Ability to withstand harsh environmental conditions Ease of use Power consumption

Wireless Sensors
Low-power microscopic sensors with wireless communication capability Miniaturization of computer hardware Intelligence

Micro Electro-Mechanical Structures (MEMS)

Sensing Low-cost CMOS-based RF Radios Wireless Communications

Wireless Sensor Networks(WSN)


Even though wireless sensors has limited

resources in memory, computation power, bandwidth, and energy. With small physical sizeCan be embedded in the physical environment. Support powerful service in aggregated form (interacting/collaborating among nodes)
Self-organizing multi-hop ad-doc networks. Pervasive computing/sensoring
1/17/2013 cs526 WSN 68

WSN Applications
Wide area monitoring tools supporting Scientific Research
Wild life Habitat monitoring projects Great Duck Island (UCB),

James Reserve (UCLA), ZebraNet (Princeton. Building/Infrastructure structure study (Earthquake impact)

Military Applications
Shooter Localization Perimeter Defense (Oil pipeline protection) Insurgent Activity Monitoring (MicroRadar)

Commercial Applications
Light/temperature control Precision agriculture (optimize watering schedule) Asset management (tracking freight movement/storage)

Wireless Sensor Network(WSN) vs. Mobile Ad Hoc Network (MANET)


WSN Similarity Security Routing Wireless Symmetric Key Cryptography Support specialized traffic pattern. Cannot afford to have too many node states and packet overhead Tighter resources (power, processor speed, bandwidth) MANET Multi-hop networking Public Key Cryptography Support any node pairs Some source routing and distance vector protocol incur heavy control traffic Not as tight.

Resource

Energy Conservation in Mobile Adhoc Network Energy Conservation in MANET is an important aspect of Wireless Network because the nodes are often unattended and their energy cannot be replenished. Communication in MANET can be categorised by following two ways. MULTICAST COMMUNICATION -The multicasting technique plays a major role during the transmission of the data packets from source to several client nodes and as the communication of mobile nodes is performed in the collective manner. CLUSTER BASED MULTICASTING The clustering technique takes only less connection among various zones in the network which results in the controlled access and energy expenditure and also interferences can be minimized.

Energy Conservation Technique in MANETsaving energy during active communication & saving energy during idle times in the communication.

Energy conservation can be achieved in one of two ways:

The first targets the techniques used to support communication in an ad hoc network and is typically achieved through the use of energyefficient MAC and routing protocols. The second focuses on reducing the energy consumed when the node is idle and not participating in communication by placing the node in a low-power state.

Conclusion
Wireless or not, each technology has its advantages and

disadvantages. Wireless technologies often tend to increase convenience and decrease safety. Wired technologies are mostly used whenever reliability is of major importance. Flexibility and fault tolerance create exciting new applications for remote sensing. In future the wide range of applications will make sensor networks an integral part of our lives.

Use of Wireless technology is rapidly increasing an playing an important role in life of people. through the world very large number of people are replying on the technology directly or indirectly.

References: http://www.webopedia.com/DidYouKnow/Hardware_Software/Networking/selecting-a

wireless-network-standard.html http://www.elisa.com/on-elisa/corporate/history/radiolinjas-history/ http://www.internetnews.com/mobility/article.php/3733991/NY-Muni-Wireless-NetworkLaunch-in-Sight.htm http://www.slideshare.net/salahuddinjk/wireless-communication-adhoc-networks http://www.slideshare.net/salahuddinjk/wireless-communication-adhoc-networks Cedric Florens and Robert McEliece, Packet Distribution Algorithms for Sensor Networks, IEEE INFOCOM 2003. Samuel Madden, Robert Szewczyk, Michael J. Franklin and David Culler, Supporting Aggregate Queries Over Ad-Hoc Wireless Sensor Networks, http://en.wikipedia.org/wiki/Wireless_network http://en.wikipedia.org/wiki/Wireless_sensor_network http://www.authorstream.com/Presentation/pmashokk-539105-introduction-to-wsn

Thank you all.

You might also like