What is an ad hoc network. Ad hoc terminal interaction scenarios. Technologies used in building wireless self-organizing networks

801.11 - IEEE standard, which defines the procedure for accessing the transmission medium and provides physical layer specifications for wireless local area networks with speeds up to 2 Mbit/s. The 802.11 standard covers DSSS and FHSS high-frequency radio channels, as well as infrared channels.
802.11a- edition of the 802.11 IEEE standard, which covers networks operating at speeds up to 54 Mbit/s using DSSS technology.
802.11b- edition of the 802.11 IEEE standard, which covers networks operating at speeds up to 11 Mbit/s using DSSS technology.
802.1lg- edition of the 802.11 IEEE standard, which covers networks operating at speeds up to 54 Mbit/s using DSSS technology, backward compatible with the 802.11b standard.
802.1li- IEEE standard related to wireless network security. It combines 802.1x and TKIP/CCMP protocols to provide user authentication, confidentiality and data integrity in wireless LANs.
802.1x- IEEE standard for authentication and access control at the data link level. Access point - a type of base station that a wireless local area network uses to enable wireless users to interact with a wired network and roam within a building.

AD HOC MODE

(peer-to-peer network mode) - a wireless network configuration in which users can directly establish connections between their devices, without the need of a base station. Wireless personal and local networks can operate in this mode.

The main advantage of this mode is its simplicity of organization: it does not require additional equipment (access point). The mode can be used to create temporary networks for data transmission. However, it must be kept in mind that Ad Hoc mode allows you to establish a connection at a speed of no more than 11 Mbit/s, regardless of the equipment used. The actual data exchange speed will be lower and will be no more than 11/N Mbit/s, where N is the number of devices on the network. The communication range is no more than one hundred meters, and the data transfer speed drops quickly with increasing distance. To organize long-term wireless networks, you should use infrastructure mode.
Example:
On the client side we will use a wireless USB adapter. All settings for other types of adapters (PCI, PCMCI, ExpressCard, etc.) are carried out in the same way.
When connecting the adapter, you must install the driver that comes with all wireless equipment. The Wireless Network Connections icon should appear in the Network Connections window

Wireless network in Ad Hoc mode First we will build from computer1 and laptop1, and then we can connect other computers. This can be done in two ways: using the built-in service of Windows XP or Windows Vista and the D-Link AirPlus XtremeG Wireless Utility program, which comes with D-Link equipment.
1) Setting up a connection using the built-in Windows service. When installing the interface using the built-in Windows utility, no additional programs are required. But for this you need to check the box Use Windows to configure the network on the Wireless networks tab in the properties of the wireless connection

Before establishing a connection, you must configure static IP addresses. They are configured in the properties of the wireless connection, on the General tab, in the Internet Protocol (TCP/IP) properties

Let the first computer (Computer1) have an IP address: 192.168.0.1, and the second (Laptop1): 192.168.0.2, and the subnet mask: 255.255.255.0. Now to organize the network in Ad Hoc mode, double-click the left mouse button on the wireless interface to start the Windows service. Here, on one of the computers, let's run Set up a wireless network. In the wizard that appears, you must enter the SSID (for example, AdHocNet) and enter the access key. This completes the configuration of one computer.

On another computer we also start the Windows service, and in the main window select the network that appears (AdHocNet). If the access keys match, this computer connects to the first one and thus creates an Ad Hoc wireless network.
If you need to connect more computers, then all the same actions are carried out as with the second one. In this case, the network will already consist of several computers.
2) Setting up the connection using the D-Link AirPlus XtremeG Wireless Utility program.
In this case, you need to install this program and uncheck the Use Windows to configure the network checkbox.
To organize wireless ad hoc communication run this program on the first computer and go to the Settings tab.

Then enter the SSID of the network you are creating (for example, AdHocNet), select Ad Hoc mode and set the IP address with the wireless interface mask.
We will leave authentication and encryption open for now. If you need to make additional settings, you can make them on the Advanced settings tab.
On other computers we also run this program and open the Network Overview tab:

In the window that appears, select the network, and to configure the IP address of the second computer, click the Configuration button. Then click the Connect button, and if the access keys match, the wireless adapter will connect to the first computer. Other computers are connected in the same way. Available networks are updated using the Update button.

Infrastructure mode

In this mode, access points provide communication between client computers. An access point can be thought of as a wireless switch. Client stations do not communicate directly with each other, but communicate with the access point, and it already forwards packets to the recipients.

The access point has an Ethernet port through which the base service area is connected to a wired or mixed network - to the network infrastructure. Example:
Let's configure a wireless access point in infrastructure mode. Configuration is carried out via a wired interface, i.e. using an Ethernet connection. Although you can do this via a wireless interface, we do not recommend it, because... with a sufficiently large number of access points, confusion in the settings may occur.
1. In the Network Connections window, disable network and wireless adapters. In the context menu, select “Disable” for each adapter. As a result, all computers are isolated from each other, there are no network connections.
2. Configure network adapters for communication with the access point. Local Area Connections->Properties->TCP/IP Protocol->Properties -Use the following IP address
-Indicate the address 192.168.0.xxx, where xxx is the number of your computer (1, 2, 3, etc.).
-Specify the mask 255.255.255.0
-Enable cable connection
3.Connect to the access point.
We connect the access point with a network cable to the network adapter and supply power.
Resetting the point settings. To do this, press and hold the reset button for five seconds. Do not turn off the power while pressing reset! The point loading time is about 20 seconds.
When the download is complete, the Power and LAN indicators on the point light up. In Internet Explorer, type http://192.168.0.50. A prompt will appear to enter your name and password.

4. Let's start setting up. Enter “admin” as the username with a blank password. Let's first configure the IP address of the point. This is only necessary if you have many access points. On the Home tab, click the Lan button (on the left).
-Set the address 192.168.0.xxx, where xxx is the unique point number.
-Mask 255.255.255.0
-Default Gateway 192.168.0.50
5. Enable access point mode.
Wait for the point to load, and enter the new address http://192.168.0.xxx in the browser
On the Home tab, click the Wireless button (left)
Install:
Mode: Access Point
SSID: Network
SSID Broadcast: Enable
Channel: 6
Authentication: Open System
Encryption: Disable

Please note that the settings we have chosen do not ensure wireless security and are used for training purposes only. If you need to make more subtle settings, go to the Advanced tab. Before setting up your access point, we strongly recommend that you read the setup documentation; a brief description of all parameters is on the Help tab.
Once the settings are complete, click “Apply” to reboot the point with the new settings.
Disconnect the point from the network interface. Your point is now configured to connect wireless clients. In the simplest case, to provide Internet to clients, you need to connect a broadband channel or ADSL modem to the point. Client computers are connected in the same way as described in the previous example.

wds and wds with ap modes

WDS term(Wireless Distribution System) stands for “distributed wireless system.” In this mode, access points connect only to each other, forming a bridge connection. Moreover, each point can connect to several other points. All points in this mode must use the same channel, so the number of points involved in bridging should not be excessively large. Clients are connected only via a wired network through the uplink ports of the points.

The wireless bridge mode, similar to wired bridges, is used to combine subnets into a common network. Using wireless bridges, you can combine wired LANs located both at a short distance in neighboring buildings and at distances of up to several kilometers. This allows you to combine branches and the central office into a network, as well as connect clients to the Internet provider network.

A wireless bridge can be used where laying cables between buildings is undesirable or impossible. This solution delivers significant cost savings and provides ease of setup and configuration flexibility for office relocations.
Wireless clients cannot connect to an access point operating in bridge mode. Wireless communication occurs only between a pair of points that implement a bridge.
The term WDS with AP(WDS with Access Point) stands for “distributed wireless system, including an access point,” i.e. Using this mode, you can organize not only a bridge connection between access points, but also simultaneously connect client computers. This allows you to achieve significant equipment savings and simplify the network topology. This technology is supported by most modern access points.

However, it must be remembered that all devices within the same WDS with AP operate at the same frequency and create mutual interference, which limits the number of clients to 15-20 nodes. To increase the number of connected clients, you can use several WDS networks configured for different non-overlapping channels and connected by wires through uplink ports.
The topology of organizing wireless networks in WDS mode is similar to conventional wired topologies. Bus topology
A “bus” type topology, by its very structure, assumes the identity of the network equipment of computers, as well as the equality of all subscribers.
There is no central subscriber through which all information is transmitted, which increases its reliability (after all, if any center fails, the entire system controlled by this center ceases to function). Adding new subscribers to the bus is quite simple. You need to enter the parameters of the new access point into the last one, which will only lead to a short-term reboot of the last point. The bus is not afraid of failures of individual points, since all other computers on the network can normally continue communicating with each other, but the remaining computers will not be able to access the Internet. Ring topology
A "ring" is a topology in which each access point is connected to only two others. In this case there is no clearly defined center; all points can be the same.
Connecting new subscribers to the “ring” is usually completely painless, although it requires mandatory shutdown of the two extreme points from the new access point.
At the same time, the main advantage of the ring is that relaying signals by each subscriber allows you to significantly increase the size of the entire network as a whole (sometimes up to several tens of kilometers). The ring is significantly superior to any other topology in this regard.
The topology of connections between points in this mode is an acyclic graph of the tree type, that is, data from the Internet from point 4 to point 2 can pass in two directions - through points 1 and 3. To eliminate unnecessary connections that can lead to the appearance of cycles in the graph, the Spanning tree algorithm is implemented. Its work leads to the identification and blocking of unnecessary connections. When the network topology changes, for example, due to the disconnection of some points or the impossibility of channels working, the Spanning tree algorithm starts again, and previously blocked extra links can be used to replace the failed ones. Star topology“Star” is a topology with a clearly designated center to which all other subscribers are connected. All information exchange occurs exclusively through a central access point, which thus places a very heavy load.
If we talk about the star’s resistance to point failures, then the failure of a regular access point does not in any way affect the functioning of the rest of the network, but any failure of the central point makes the network completely inoperable. A serious disadvantage of the star topology is that it strictly limits the number of subscribers. Since all points operate on the same channel, usually the central subscriber can serve no more than 10 peripheral subscribers due to the large drop in speed.
In most cases, for example, to combine several districts in a city, combined topologies are used.

Repeater mode

A situation may arise when it is impossible, or inconvenient, to connect the access point to the wired infrastructure, or some obstacle makes it difficult for the access point to communicate directly with the location of the clients' wireless stations. In such a situation, you can use the point in Repeater mode.

Similar to a wired repeater, a wireless repeater simply rebroadcasts all packets arriving at its wireless interface. This retransmission is carried out through the same channel through which they were received. When using a repeater access point, be aware that overlapping broadcast domains can cut the channel's throughput in half because the initial access point also “hears” the relayed signal.
The repeater mode is not included in the 802.11 standard, so to implement it it is recommended to use the same type of equipment (down to the firmware version) and from the same manufacturer. With the advent of WDS, this mode lost its relevance, because the WDS functionality replaces it. However, it can be found in older firmware versions and in outdated equipment.

Client mode

When moving from a wired to a wireless architecture, you may sometimes find that your existing network devices support wired Ethernet, but do not have interface connectors for wireless network adapters. To connect such devices to a wireless network, you can use an access point - client

Using a client access point, only one device is connected to the wireless network. This mode is not included in the 802.11 standard and is not supported by all manufacturers.

What is the difference between Ad-hoc (direct connection mode) and Infrastructure (infrastructure mode) wireless connection modes?

Direct connection mode (Ad-hoc):

In an Ad-hoc network, each device can communicate with each other directly. In such a network there is no access point that controls the connection of devices. Ad-hoc network devices can only communicate with other Ad-hoc devices. They cannot connect to devices connected to a wireless network in infrastructure mode or devices connected to a wired network. In addition, the security of Ad-hoc mode is less reliable compared to infrastructure mode.

Infrastructure mode:

An infrastructure mode wireless network requires an access point. The access point manages the wireless connection and provides several important advantages over an ad-hoc network. For example, an infrastructure mode network supports enhanced levels of security, higher data rates, and wired network integration.

If in the case of a “traditional” wireless network we must deploy an often expensive infrastructure of base stations, then in the case of self-organizing networks one or several access points are sufficient.

The essence of self-organizing networks is to provide the subscriber with the opportunity to access various network services by transmitting and receiving “their” traffic through neighboring subscribers.

Self-organizing communication networks are networks with a changeable decentralized infrastructure. In general, these networks have the advantages of wide coverage and a theoretically wide subscriber base without a large number of expensive base stations and increased signal power.

In simple terms, the structure of the simplest self-organizing network consists of a large number of subscribers in a certain area, which can be simply called the network coverage area, and one or more access points to external networks. Each subscriber device, depending on its power, has its own range of action. If a subscriber, being “on the periphery,” sends a packet to a subscriber located in the center of the network or to an access point, the so-called multi-hop process of transmitting the packet through nodes located along the path of a pre-defined route occurs. Thus, we can say that each new subscriber, using its resources, increases the range of the network. Therefore, the power of each individual device can be minimal. And this implies both lower costs of subscriber devices and better safety and electromagnetic compatibility indicators.

At the moment, there is a wide range of research and applications of self-organizing networks in the following areas:

Military communications;

Intelligent transport systems;

Local networks;

Sensor networks;

All these areas will be discussed in the following articles.

Currently, there are several “core” technologies for self-organizing networks:

1.Bluetooth

Self-organizing devices based on Bluetooth consist of master and slave devices (these roles can be combined), capable of transmitting data in both synchronous and asynchronous modes. Synchronous transmission mode involves direct communication between master and slave devices with an assigned channel and access time slots. This mode is used in case of time-limited transmissions. Asynchronous mode involves the exchange of data between a master and several slave devices using packet data transfer. Used to organize piconets. One device (both master and slave) can support up to 3 synchronous connections.

In synchronous mode, the maximum data transfer rate is 64 kbit/s. The maximum transmission speed in asynchronous mode is 720 kbit/s.

Advantages of Bluetooth-based networks:

    possibility of rapid deployment;

    relatively low power consumption of subscriber devices;

    a wide range of devices supporting this technology.

Network disadvantages:

    small range of action (the range of one subscriber device is 0.1 - 100 m);

    low data transfer rates (for comparison: in WiFi networks this figure is 11 - 108 Mbit/s);

    lack of frequency resource.

Perhaps the latter problem will be solved with the release of Bluetooth 3.0 devices, where it is assumed that it will be possible to use alternative protocols at the MAC and physical levels for the purpose of accelerated transmission of Bluetooth profiles (AMP). In particular, 802.11 standard protocols can be used.

Based on the above, we can conclude that Bluetooth-based networks are applicable only in crowded places (for example, in city centers, small offices, shops). For example, such a network can be used to organize video surveillance at a small facility.

802.11 networks were originally conceived as a way to replace wired networks. However, relatively high transmission speeds (up to 108 Mbit/s) make it promising for possible use in those self-organizing networks in which it is necessary to transmit large amounts of information in real time (for example, video signals).

In 2007, a draft version of the 802.11s standard was first released, defining the main characteristics of self-organizing WiFi-based networks.

Unlike traditional WiFi networks, in which there are only two types of devices - “access point” and “terminal”, the 802.11s standard assumes the presence of so-called “network nodes” and “network portals”. Nodes can communicate with each other and support various services. Nodes can be combined with access points, while portals serve to connect to external networks.

Based on existing 802.11 standards, it is possible to build MANET networks (mobile self-organizing networks), the distinctive feature of which is a large coverage area (several square kilometers).

Problems that require special attention in the further development of self-organizing WiFi-based networks can be divided into the following classes:

Bandwidth problems;

Network scalability problems.

3.ZigBee

The 802.15.4 (ZigBee) standard describes low-speed, short-range communication networks with low-power transmitting devices. The use of three frequency ranges is provided: 868-868.6 MHz, 902-928 MHz, 2.4-2.4835 GHz.

The channel access method uses DSSS with different sequence lengths for the 868/915 and 2450 MHz bands.

Data rates range from 20 to 250 kbps.

According to the standard, the ZigBee network supports work with star and each-to-each topologies.

There are two types of transceiver devices: full-featured (FFD) and non-full-featured (RFD). The fundamental difference between these devices is that FFDs can communicate directly with any device, while RFDs can only communicate with FFDs.

A ZigBee network can consist of several clusters formed by FFD devices.

ZigBee networks can operate in mesh mode. It is assumed that each network node (the network node forms an FFD device, RFDs work as so-called sensors) constantly monitors the state of neighboring nodes, updating their routing tables if necessary.

Unlike all previous versions of ad hoc networks, ZigBee is designed for low data transfer rates and there are no problems with the possibility of increasing them.

Initially written for the Chief, who wanted to connect to the Internet through the laptop of my colleague, Tanya. Therefore, I leave proper names in the article.

On the main computer (Tanin) you need to create an ad-hoc network, and then establish the so-called Internet Connection Sharing.

Step 1

We click on the icon with the left mouse button 2 times and get into the window of available wireless networks.

Step 2

Please note that other networks may be detected. Protected ones have a padlock icon. There are also open ones.

Those. When connecting to them, no passwords or keys are required. We will make our network secure.

Click on “Change advanced settings”.

Step 3

In the window that opens, select “Internet Protocol TCP/IP” and click the properties button.

Step 4

We check whether the “IP address” and “Subnet mask” are set.
By default, the IP address is 192.168.0.1, and the subnet mask is 255.255.255.0 - so we won’t change anything.
Click "OK"

In principle, this step is not necessary. If you do not specify an IP address, the APIPA automatic addressing service will be used.

However, after completing steps 9-21, the address will be replaced by the master with the one in the figure.

Step 5

In this window, check the “Use Windows for configuration” checkbox.

and just below click the “Add” button.

Step 6

Enter the following parameters:

  • Network name (SSID) – the name of our network.
  • Authentication – choose joint
  • Data encryption - WEP
  • The key is provided automatically - uncheck this box, otherwise you will not be able to set your key.
  • Network key – you must enter a fairly long key consisting of letters and numbers.
  • Confirmation - repeat the key.
  • Check the box “This is a direct computer-to-computer connection, access points are not used.”

Go to the “Connection” tab.

Step 7

Check the “Connect if the network is within range” checkbox.

Click “Ok”.

Step 8

Click on the wireless connection icon in the tray again and see that our connection appears in the list of available networks.

Now, we can say that the network is ready, only for the moment, it will be of little use, because our goal is access
to the Internet using your laptop. To do this, in the same window, click “Change additional settings” again.

Step 9

In the window that opens, go to the “Advanced” tab. Select the “Home Network Wizard” item.

Step 12

Check the “Ignore disabled network equipment” checkbox.
It is disabled because we have not yet connected our laptop to it. Click next.

Step 13

Here, select the option that suits you.
In your case, this is the 2nd point - through the gateway.

Step 14

The setup wizard prompts you to select an Internet connection.

Select the adapter with which Tanya’s computer is connected to the network, click “Next”.

Step 15

Check the box next to “Wireless network connection” and click “Next”.

Step 16

Here you are free to enter whatever you want or the parameters of your local area. In short, just click “Next”.

Step 17

Enter the name of the working group (any name, you can use the default one) and click “Next”.

Step 18

We select “Disable sharing”, because if you need it,

Step 20

Select “Just complete the wizard” and click “Next”.

Step 21

Click the “Done” button. After this, the computer will prompt you to reboot. We agree.

Then your computer needs to be connected to this ad hoc networks

You must follow step 1 and 2 from the previous part of the instructions.

In this case, you should see the network (as in step 8), the name of which you specified in step 6.

This is where you need to connect.

You may need to do additional steps to configure your laptop to use a shared Internet connection:

Click the Start button on the taskbar and select Control Panel.

In Control Panel, click Network and Internet Connections under Select a Category.

In this section or in Control Panel, click the Internet Options icon.

In the Internet Options dialog box, click the Connections tab.

Click the Install button.

The New Connection Wizard will launch.

On the New Connection Wizard page, click Next.

Select the Internet connection option and click Next.

Select the Set up a connection manually option and click Next.

Select the Connect via persistent broadband connection option and click Next.

On the Completing the New Connection Wizard page, click Finish.

Close the control panel.

It seems like everything. I hope it works.

An ad hoc network, or independent basic service area (IBSS), occurs when individual client devices form a self-sustaining network without the use of a separate access point (AP). When such networks are created, no maps of their deployment location or preliminary plans are developed, so they are usually small and have a limited extent sufficient to transmit shared data when the need arises.

Since IBSS does not have an access point, timing is distributed non-centrally. A client initiating transmission in IBSS sets a beacon interval to create a set of target beacon transmission time (TBTT). When TTTT completes, each IBSS client does the following:

Suspends all untried backoff timers from the previous TVTT;

Defines a new random delay;

Basic Service Areas (BSS)

A BSS is a group of 802.11 stations that communicate with each other. BSS technology requires the presence of a special station called an AP (Access Point). The access point is the central point of communication for all BSS stations. Client stations do not communicate directly with one another. Instead, they communicate with the access point, and it then forwards the frames to the destination station. The access point may have an uplink port through which the BSS connects to a wired network (for example, an Ethernet uplink). Therefore, BSS is sometimes called BSS infrastructure. Figure 4 shows a typical BSS infrastructure.

  1. BSS local wireless network infrastructure

Extended Service Areas (ESS)

Multiple BSS infrastructures can be connected via their uplink interfaces. Where the 802.11 standard is in effect, the uplink interface connects the BBS to the Distribution System (DS). Multiple BBSs interconnected through a distribution system form an Extended Service Area (ESS). The uplink to the distribution system does not necessarily have to use a wired connection. Figure 5 shows an example of a practical implementation of ESS. The 802.11 standard specification leaves the possibility of implementing this channel as a wireless channel. But more often, the uplinks to the distribution system are wired Ethernet links.

Infrastructure connection

This model is used when it is necessary to connect more than two computers. A server with an access point can act as a router and independently distribute the Internet channel.

Access point using a router and modem

The access point is connected to the router, the router is connected to the modem (these devices can be combined into two or even one). Now the Internet will work on every computer within the Wi-Fi coverage area that has a Wi-Fi adapter.

  1. Extended ess wireless service area

Client point

In this mode, the access point acts as a client and can connect to an access point operating in infrastructure mode. But only one MAC address can be connected to it. Here the task is to connect only two computers. Two Wi-Fi adapters can work with each other directly without central antennas.

Bridge connection

Computers are connected to a wired network. Each group of networks is connected to access points that connect to each other via a radio channel. This mode is designed to combine two or more wired networks. Wireless clients cannot connect to an access point operating in bridge mode.

Equipment designed to work in the 802.11 standard is mainly divided into two classes - clients and access points. The role of clients can be played by desktop computers, laptops, PDAs, phones, printers, game consoles and other portable and stationary household appliances equipped with a Wi-Fi module. If a PC or PDA initially lacks support for wireless networks, then in most cases this can be easily compensated for by purchasing the appropriate adapter, which can be implemented in the form of almost any expansion card. Access points are usually designed as a separate external device that connects directly to a wired Ethernet cable or any other compatible source of broadband Internet access. Sometimes access points are combined with some other device, for example, ADSL modems combined with a Wi-Fi access point are very common. The access point bears the lion's share of the work in maintaining a wireless network: it must not only support radio transmission with all clients and connect the network with the outside world, but also regulate traffic, process data and perform a host of other operations. Also, in some cases, additional equipment may be required: for example, if the signal level is insufficient, antennas are needed, and if it is necessary to connect two networks, bridges are needed.

Equipment

To build a wireless LAN you need the following types of equipment:

    Access points (Access Point, AP) are used to connect users to a LAN via a radio channel;

    Wireless bridges (Wireless Brigde) are used to connect two or more LANs over a radio channel;

    External antennas are used to amplify the radio signal and/or to change the direction of signal propagation;

    Network radio cards for clients (Wireless Netcard), used to connect the client’s computer to the AP;

    Wireless LAN Controllers are used to centrally manage the entire enterprise wireless network.

Access points are divided into autonomous (Autonomous) and simplified (Lightweight).

The difference between simplified access points is the need to use a wireless network controller. In this case, all intelligence is concentrated in the controller, and the access point acts only as a radio receiver/transmitter. The controller provides:

    Automatic receipt of the current configuration by access points;

    Automatic selection of channel and power of each transmitter to ensure optimal coverage area and prevent interference caused by overlapping coverage areas of transmitters with the same radio channel;

    Centralized application of security and quality of service (QoS) policies;

    Providing roaming for mobile users.

It is advisable to use simplified access points in networks with a large number of access points and a coverage area of ​​complex geometric shape.

Autonomous access points are usually used in cases where their number is small, for example, to organize a radio channel between buildings or for wireless networks with a small coverage area, for which 1-2 points are enough.