DAKNET 1. INTRODUCTION Now a day it is very easy to establish communication from one part of the world to other. Despite this even now in remote areas villagers travel to talk to family members or to get forms which citizens in-developed countries an call up on a computer in a matter of seconds. The government tries to give telephone connection in very village in the mistaken belief that ordinary telephone is the cheapest way to provide connectivity. But the recent advancements in wireless technology make running a copper wire to an analog telephone much more expensive than the broadband wireless Internet connectivity. Daknet, an ad hoc network uses wireless technology to provide digital connectivity. Daknet takes advantages of the existing transportation and communication 1
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
DAKNET
1. INTRODUCTION
Now a day it is very easy to establish communication
from one part of the world to other. Despite this even
now in remote areas villagers travel to talk to family
members or to get forms which citizens in-developed
countries an call up on a computer in a matter of
seconds. The government tries to give telephone
connection in very village in the mistaken belief that
ordinary telephone is the cheapest way to provide
connectivity. But the recent advancements in wireless
technology make running a copper wire to an analog
telephone much more expensive than the broadband
wireless Internet connectivity. Daknet, an ad hoc
network uses wireless technology to provide digital
connectivity. Daknet takes advantages of the existing
transportation and communication infrastructure to
provide digital connectivity. Daknet whose name
derives from the Hindi word “Dak” for postal
combines a physical means of transportation with
wireless data transfer to extend the internet
connectivity that a uplink, a cyber café or post office
provides.
1
2. WHY DAKNET
Real time communications need large capital
investment and hence high level of user adoption to
receiver costs. The average villager cannot even
afford a personnel communications device such as a
telephone or computer. To recover cost, users must
share the communication infrastructure. Real time
aspect of telephony can also be a disadvantage.
Studies show that the current market for successful
rural Information and Communication Technology
(ICT) services does not appear to rely on real-time
connectivity, but rather on affordability and basic
interactivity. The poor not only need digital services,
but they are willing and able to pay for them to offset
the much higher costs of poor transportation, unfair
pricing, and corruption.
It is useful to consider non real-time
infrastructures and applications such as voice mail,
e-mail, and electronic bulletin boards. Technologies
like store- and forward or asynchronous modes of
communication can be significantly lower in cost and
do not necessarily sacrifice the functionality required
to deliver valuable user services. In addition to non
real-time applications such as e-mail and voice
2
messaging , providers can use asynchronous modes of
communication to create local information
repositories that community members can add to and
query.
2.1WIRELESS CATALYST
Advances in the IEEE 802 standards have led to
huge commercial success and low pricing for
broadband networks. These techniques can provide
broadband access to even the most remote areas at
low price.
Important considerations in a WLAN are
Security: In a WLAN, access is not limited to the
wired PCs but it is also open to all the wireless
network devices, making it for a hacker to easily
breach the security of that network.
Reach: WLAN should have optimum coverage and
performance for mobile users to seamlessly roam in
the wireless network
Interference: Minimize the interference and
obstruction by designing the wireless network with
proper placement of wireless devices.
Interoperability: Choose a wireless technology
standard that would make the WLAN a truly
interoperable network with devices from different
vendors integrated into the same.
3
Reliability: WLAN should provide reliable network
connection in the enterprise network.
Manageability: A manageable WLAN allows network
administrators to manage, make changes and
troubleshoot problems with fewer hassles.
Wireless data networks based on the IEEE 802.11 or
wifi standard are perhaps the most promising of the
wireless technologies. Features of wifi include ease
of setup, use and maintenance, relatively high
bandwidth; and relatively low cost for both users and
providers.
Daknet combines physical means of
transportation with wireless data transfer to extend
the internet connectivity. In this innovative vehicle
mounted access points using 802.11b based
technology to provide broadband, asynchronous,
store and forward connectivity in rural areas.
3. WIFI
. Wi-Fi refers to a set of high frequency wireless
local area network (WLAN) technologies more
specifically referred to as 802.11a 802.11b and
802.11g. These standards are universally in use
around the globe, and allow users that have a Wi-Fi
capable device, like a laptop or PDA, to connect
4
anywhere there is a Wi-Fi access point that is
available. The three standards that are referred to
signify the speed of the connection they are capable
of producing. 802.11b ( which transmits at 11
Megabits per Second ) is the most common, although
the faster Wi-Fi standards are quickly replacing it.
Across the board, all of these Wi-Fi standards are fast
enough to generally allow a broadband connection.
Wi-Fi is an emerging technology that will likely be as
common as electrical outlets and phone lines within a
few years. Wi-Fi adds tremendous levels of
convenience and increased productivity for workers
whose offices are equipped with Wi-Fi, as well as
travelers that can increasingly access Wi-Fi in
airports, coffee shops, and hotels around world.
A Wi-Fi network operates just like a wired
network , without the restrictions imposed by wires.
Not only does it enable users to move around and be
mobile at home and at work, it also provides easy
connections to the Internet and business networks
while traveling.
Wireless Fidelity, which is also known, as
802.11b is the corporate choice and has a suitably
wide range for use in big office spaces. Wi-Fi is
currently the most popular and least expensive
wireless LAN specification. It operates in the 2.4GHz
5
radio spectrum and can transmit data at speeds up to
11Mbps within 30m ranges. It can affect by
interference from mobile phones and Bluetooth
devices, which can reduce the transmission speeds.
Wi-Fi is an emerging technology that will likely be as
common as electrical outlets and phone lines within a
few years.
Wi-Fi adds tremendous levels of convenience and
increased productivity for workers whose offices are
equipped with Wi-Fi, as well as travelers that can
increasingly access Wi-Fi in airports, coffee shops,
and hotels around. It is the standard fitment to many
wireless laptops including the new Centrino based
models.
Security Aspect
In Wi-Fi technology, data is broadcast over the
air using radio waves. This means that any WLAN –
enabled computing device within reach of a wireless
access point can reach of a wireless access point can
receive data transmitted to or from the access point.
Because radio waves travel through ceilings, floors
and walls, the transmitted data can reach the wrong
recipients on different floors or even outside the
building. Intruders can use unsecured access points
6
to get into corporate resources and launch denial-of-
service attacks that can bog down servers with bogus
requests and prevent user access to data and
applications.
To ensure security, 802.11 wireless
communications have a function called wired-
equivalent privacy (WEP), a form of encryption, which
provides privacy comparable to that of a traditional
wired network. If the wireless network has some
information that must be secured, WEP should be
used to ensure data protection at traditional wired
network levels. But as we know, there is never 100
percent security, and the WEP standard was itself
breached. Of late, WPA (Wi-Fi protected Access) has
over broken WEP as the de facto security standard for