Semiconductors are materials which have a conductivity between conductors (generally metals) and nonconductors or insulators (such as most ceramics). Semiconductors can be pure elements, such as silicon or germanium, or compounds such as gallium arsenide or cadmium selenide. In a process called doping, small amounts of impurities are added to pure semiconductors causing large changes in the conductivity of the material.
Due to their role in the fabrication of electronic devices, semiconductors are an important part of our lives. Imagine life without electronic devices. There would be no radios, no TV's, no computers, no video games, and poor medical diagnostic equipment. Although many electronic devices could be made using vacuum tube technology, the developments in semiconductor technology during the past 50 years have made electronic devices smaller, faster, and more reliable. Think for a minute of all the encounters you have with electronic devices. How many of the following have you seen or used in the last twenty-four hours? Each has important components that have been manufactured with electronic materials.
A wireless network typically refers to a system that allows devices to connect to the internet or communicate with each other without using cables. It relies on radio waves to transmit data between devices and access points. Wireless networks can be categorized based on their range and purpose, such as personal area networks (PANs), local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). They enable convenient and flexible connectivity, but factors like signal interference, security concerns, and network congestion can affect performance.
Edhole School provides best Information about Schools in India, Delhi, Noida, Gurgaon. Here you will get about the school, contact, career, etc. Edhole Provides best study material for school students.
A wireless network typically refers to a system that allows devices to connect to the internet or communicate with each other without using cables. It relies on radio waves to transmit data between devices and access points. Wireless networks can be categorized based on their range and purpose, such as personal area networks (PANs), local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). They enable convenient and flexible connectivity, but factors like signal interference, security concerns, and network congestion can affect performance.
Edhole School provides best Information about Schools in India, Delhi, Noida, Gurgaon. Here you will get about the school, contact, career, etc. Edhole Provides best study material for school students.
It deals with the definition of network, its types, different networking devices, different network architecture, network topology and switching techniques.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
More Related Content
Similar to Pranali_d-AWN.pptx a ppt on adhoc and wireless
It deals with the definition of network, its types, different networking devices, different network architecture, network topology and switching techniques.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
1. Ad Hoc Wireless Network
Prof. Pranali Deshmukh
Department of Information technology
International Institute of Information Technology, I²IT
www.isquareit.edu.in
2. 2
Introduction
• Ad Hoc Network is a multi-hop relaying
network
• ALOHAnet developed in 1970
• Ethernet developed in 1980
• In 1994, Bluetooth proposed by Ericsson to
develop a short-range, low-power, low-
complexity, and inexpensive radio inteface
• WLAN 802.11 spec. is proposed in 1997
3. Cellular and Ad Hoc Wireless Networks
• Cellular Wireless Networks: infrastructure
dependent network
• Ad Hoc Networks: multi-hop radio relaying and
without support of infrastructure
– Wireless Mesh Networks
– Wireless Sensor Networks
3
4. Cellular Wireless Networks Hybrid Wireless
Networks
Wireless Mesh
Networks
Wireless Sensor
Networks
4
Infrastructure Dependent
(Single-Hop Wireless Networks)
Ad Hoc Wireless Networks
(Multi-Hop Wireless Networks)
Figure Cellular and ad hoc wireless networks.
6. B
A
C
F
D
E
Path from C to E
Mobile Node Wireless Link
Figure. An ad hoc wireless networks
6
6
7. Differences between cellular networks and ad hoc wireless
networks
Cellular Networks Ad Hoc Wireless Networks
Fixed infrastructure-based Infrastructure-less
Single-hop wireless links Multi-hop wireless links
Guaranteed bandwidth
(designed for voice traffic)
Shared radio channel
(more suitable for best-effort data traffic)
Centralized routing Distributed routing
Circuit-switched
(evolving toward packet switching)
Packet-switched
(evolving toward emulation of circuit
switching)
Seamless connectivity
(low call drops during handoffs)
Frequency path break
due to mobility
High cost and time of deployment Quick and cost-effective deployment
Reuse of frequency spectrum through
geographical channel reuse
Dynamic frequency reuse based on carrier
sense mechanism
7
7
8. Differences between cellular networks and ad hoc
wireless networks (cont.)
Easier to achieve time synchronization Time synchronization is difficult and
consumes bandwidth
Easier to employ bandwidth reservation Bandwidth reservation requires complex
medium access control protocols
Application domains include mainly civilian
and commercial sector
Application domains include battlefields,
emergency search and rescue operation, and
collaborative computing
High cost of network maintenance
(backup power source, staffing, etc.)
Self-organization and maintenance properties
are built into the network
Mobile hosts are of relatively low complexity Mobile hosts require more intelligence
(should have a transceiver as well as
routing/switching capacity)
Major goals of routing and call admission are
to maximize the call acceptance ratio and
minimize the call drop ratio
Man aim of routing is to find paths with
minimum overhead and also quick
reconfiguration of broken paths
Widely deployed and currently in the third
generation
Several issues are to be addressed for
successful commercial deployment even
though widespread use exists in defense
8
8
9. 9
Applications of Ad Hoc Wireless Networks
• Military Applications
– Establishing communication among a group of
soldiers for tactical operations
– Coordination of military object moving at high
speeds such as fleets of airplanes or ships
– Requirements: reliability, efficiency, secure
communication, and multicasting routing,
• Collaborative and Distributed Computing
– Conference, distributed files sharing
• Emergency Operations
– Search, rescue, crowd control, and commando
operations
– Support real-time and fault-tolerant communication
paths
10. Wireless Mesh Networks
• An alternate communication infrastructure
for mobile or fixed nodes/users
• Provides many alternate paths for a
data transfer session between a
source and destination
• Advantages of Wireless Mesh Networks
– High data rate, quick and low cost of
deployment, enhanced services, high
scalability, easy extendability, high availability,
and low cost per bit
10
11. A house with rooftop transceiver
11
Transmission range
Wired link to the Internet
Wireless link
Figure 5.4. Wireless mesh networks operating in a residential zone
Wired Network
Gateway node
12. Internet
Wired link to the Internet
12
Multi-hop radio relay link Lamp
Radio relay node
Figure 5.5 Wireless mesh network covering a highway
Coverage area
13. 13
Wireless Sensor Networks
• A collection of a large number of sensor
nodes that are deployed in a particular
region
• Applications:
– military, health care, home security,
and environmental monitoring
• Differences with the ad hoc wireless
networks:
– Mobility of nodes, size of network, density of
deployment, power constraints,
data/information fusion, traffic distribution
14. 14
Hybrid Wireless Networks
• HWN such as Multi-hop cellular networks
and integrated cellular ad hoc relay
networks
– The base station maintains the information about
the topology of the network for efficient routing
– The capacity of a cellular network can be increased if
the network incorporates the properties of multi-hop
relaying along with the support of existing fixed
infrastructure
• Advantages:
– Higher capacity than cellular networks due to
better channel reuse
– Increased flexibility and reliability in routing
– Better coverage and connectivity in holes
16. 16
Issues in Ad Hoc Wireless Networks
• Medium access scheme
• Routing, Multicasting, TPC protocol
• Pricing scheme, QoS, Self-organization
• Security, Energy management
• Addressing and service discovery
• Deployment considerations
17. Medium Access Scheme
• Distributed operation
– fully distributed involving minimum control overhead
• Synchronization
– Mandatory for TDMA-based systems
• Hidden terminals
– Can significantly reduce the throughput of a MAC
protocol
• Exposed terminals
– To improve the efficiency of the MAC protocol, the
exposed nodes should be allowed to transmit in a
controlled fashion without causing collision to the on-
going data transfer
• Access delay 17
18. The Major Issues of MAC Scheme
• Throughput and access delay
– To minimize the occurrence of collision, maximize
channel utilization, and minimize controloverhead
• Fairness
– Equal share or weighted share of the bandwidth
to all competing nodes
• Real-time traffic support
• Resource reservation
– Such as BW, buffer space, and processing power
• Capability for power control
• Adaptive rate control
• Use of directional antennas
18
19. 19
The Major Challenge of Routing Protocol
• Mobility result in frequent path break,
packet collision, and difficulty in resource
reservation
• Bandwidth constraint: BW is shared by every
node
• Error-prone and share channel: high bit error
rate
• Location-dependent contention: distributing
the network load uniformly across the
network
• Other resource constraint: computing power,
battery power, and buffer storage
20. 20
The Major Requirement of Routing
Protocol
• Minimum route acquisition delay
• Quick route reconfiguration: to handle path
breaks
• Loop-free routing
• Distributed routing approach
• Minimum control overhead
• Scalability
• Provisioning of QoS:
• supporting differentiated classes of services
• Support for time-sensitive traffic
• Security and privacy
21. The Major Issues in Multicast
Routing Protocols
• Robustness
– recover and reconfigure quickly from link breaks
• Efficiency
– minimum number of transmissions to deliver a data
packet to all the group members
• Minimal Control overhead
• QoS support
• Efficient group management
• Scalability
• Security
21
22. Transport Layer Protocols
• Objectives:setting up and maintaining
– End-to-end connections, reliable end-to-end
data delivery, flow control, and congestion
control
• Major performance degradation:
– Frequent path breaks, presence of old routing
information, high channel error rate, and
frequent network partitions
22
23. 23
Quality of Service Provisioning
• QoS often requires negotiation between the host
and the network, resource reservation schemes,
priority scheduling and call admission control
• QoS in Ad hoc wireless networks can be on
a per flow, per link, or per node
• Qos Parameters: different applications have
different requirements
– Multimedia: bandwidth and delay are the key
parameters
– Military: BW, delay, security and reliability
– Emergency search –and-rescue: availability is
the key parameters, multiple link disjoint paths
– WSN: battery life, minimum energy consumption
24. 24
Quality of Service Provisioning
• QoS-aware routing:
– To have the routing use QoS parameters for finding a
path
– The parameters are network through put, packet
delivery ratio, reliability, delay, delay jitter, packet lost
rate, bit error rate, and path loss
• QoS framework:
– A frame work for QoS is a complete system that
attempts to provide the promised service
– The QoS modules such as routing protocol,
signaling protocol, and resource management
should react promptly according to changes in
the network state
25. 25
Self-Organization
• An important property that an ad hoc wireless
network should exhibit is organizing and
maintaining the network by itself
• Major activities: neighbor discovery,
topology organization, and topology
reorganization
• Ad hoc wireless networks should be able to
perform self-organization quickly and efficiently
26. 26
Security
• The attack against ad hoc wireless networks
are classified into two types: passive and
active attacks
• Passive attack: malicious nodes to observe the
nature of activities and to obtain information in
the network without disrupting the operation
• Active attack: disrupt the operation of the
network
– Internal attack: nodes belong to the same network
– External attack: nodes outside the network
27. References
“Ad Hoc Wireless Networks Architectures and Protocols” By Shiva Ram Murthi.