SlideShare a Scribd company logo
1 of 4
Download to read offline
ISSN: 2278 – 1323
                             International Journal of Advanced Research in Computer Engineering & Technology
                                                                                  Volume 1, Issue 5, July 2012




    A SURVEY ON AD-HOC IN WIRELESS
          SENSOR NETWORKS
                                                KARTHIKA.M
                               Research scholar, Department of Computer Science,
                                         NGM College, Pollachi, India.
                                          Email:krth.1001@gmail.com

                                          DR.R.MANICKA CHEZIAN
                              Assistant Professor, Department of Computer Science,
                                          NGM College, Pollachi, India.

Abstract - This paper says the performance of wireless          places, in congested areas easily. Quite a lot of
ad hoc network. A wireless network has several types in         protocols can be anticipated to work with even
it. For more expedient usage in the wireless trait ad hoc       difficult challenges of ad hoc network. Minimal
network is introduced. Ad-hoc network is a collection of        configuration and speedy deployment make Ad hoc
mobile wireless nodes forming a network without any             networks suitable for emergency situations like
centralized administration. Ad-hoc network consist of           natural disasters or military conflicts. In an ad hoc
self organizing feature with low bandwidth. An ad hoc           network     forwarding      the     packets    mobile
network doesn't rely on preexisting feature. Minimal            communication is used.. Wireless Ad hoc networks
configuration and speedy deployment make ad hoc                 can be classified by their application: Wireless Mesh
networks suitable for emergency situations like natural         Networks (WMN), Mobile Ad-Hoc Networks
disasters or military conflicts. The dynamic and                (MANET), and Wireless Sensor Networks (WSN).
adaptive characteristic made the routing protocols              The importance of sensor networks is highlighted by
enables ad-hoc networks to be formed quickly. This              their multiple usages. Wireless networks are used
paper also presents an overview of issues related to            according to the
Medium Access Control (MAC), and transport in
                                                                on-demand basis.
wireless ad hoc networks routing techniques proposed
                                                                     II. TYPES OF WIRELESS NETWORKS
to improve the performance of protocols.
                                                                A. WIRELESS MESH NETWORKS
Key Terms: Wireless network, Ad-Hoc network,
                                                                         A WMN is dynamically self-organized and
Wireless Mesh Networks, Wireless Sensor Networks.
                                                                Self-configured. The gateway/bridge functionalities
                                                                in mesh routers enable the integration of WMNs with
                I. INTRODUCTION                                 various existing wireless networks.
                                                                         .
          Wireless networks are getting more popular            B. MANET
because of its effortlessness. Sensory data comes
from multiple sensors of different modalities in                          The term MANET referred as (Mobile Ad
distributed locations. Wireless networks are being              hoc Network). MANET are connected by wireless
more and more used in the communication among                   links, it is a self-configuring router. The routers can
devices of the most varied types and sizes. The                 change their location and organize itself randomly.
wireless Ad hoc network consists of two operating               The main issue in
modes: Infrastructure mode, Ad hoc mode.                         MANET is dynamically changing topology in
Infrastructure mode is used to connect computers                network. Proactive protocols are also used for
with wireless network adapters. Ad hoc mode is used             convenient usage.
to connect wireless clients directly together, without
the need for a wireless router or access point.
Wireless networks can be arranged even in desert


                                                                                                                  270

                                           All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                            International Journal of Advanced Research in Computer Engineering & Technology
                                                                                 Volume 1, Issue 5, July 2012



C. WIRELES SENSOR NETWORKS                                    must waits for the pre-defined interval of time.
                                                              Slotted-ALOHA doubled the efficiency of ALOHA;
          In most wireless Ad hoc networks, the nodes         however, it introduced the necessity of
compete for way in to shared wireless medium, often           synchronization. To minimize the number of collision
resulting interference. Using cooperative wireless            another access scheme called CSMA was introduced,
communications improves immunity to interference              which carries sensing before transmitting the data to
by having the destination node combine self-                  be sent. The CSMA senses the medium when sending
interference and other- node interference to improve          the current data. If the medium is busy, the carrier is
decoding of the desired signal. Multiple nodes and            sensed, and the station postpones its medium access
links are used for an ad-hoc network. Links can be            to avoid collision. The medium transmits the data
connected or disconnected at any time; a functioning          frame only if the medium is idle. After sensing the
network must be able to cope with this dynamic                medium, depending on the scheme deployed to
restructuring, preferably in a way that is timely,            attempt a transmission after sensing the medium busy
efficient, reliable, robust and scalable. Wireless            CSMA can act as non-persistent or p-persistent.
networking has witnessed an explosion of interest             When the medium
from consumers in recent years for its applications in        gets idle, the p-persistent CSMA the station transmits
mobile and personal communications. Since the                 with a probability p and a random period of time was
network interface is a significant consumer of power,         set to another medium access which is non-persistent.
considerable research has been devoted to low-power           The most famous access scheme for wired networks
design of the entire network protocol stack of                is a variation of CSMA persistent that detects
wireless networks in an effort to enhance energy              collisions. This scheme is employed by Ethernet and
efficiency. In Ad hoc networks, each node may                 is called Carrier Sense Multiple Access with
communicate directly to each other. Nodes that are            Collision Detection. Here, the collision is not
not directly connected communicate by forwarding              possible if there is a free space. This occurrence is
their traffic through intermediate nodes.                     referred as Hidden Terminal Problem. To represent
                                                              the own transmission range each station is centered
C. MEDIUM         ACCESS       CONTROL        (MAC)           with dotted circle. Bluetooth and IEEE 802.11 are the
PROTOCOLS                                                     technologies which are used mainly for implementing
                                                              in wireless ad hoc networks. The station A is
          The important issue for an Ad hoc network           transmitting to B. As station C cannot sense the
is the design of a suitable Medium Access Control             ongoing transmission, it may also transmit to B,
(MAC) protocol. The low energy consumption,                   resulting in a collision at B.
scalability, requirements such as quality of service
(Qos), are efficiently provided by the MAC protocol.
Contention-free and contention based are the
classifications of protocols for wireless networks
[1].Without contending the medium, the contention
free schemes pre-define assignments to allow stations
to transmit. In general the contention-free
mechanisms are employed to provide bounded end
to-end delay and minimum bandwidth, privileging
delay sensitive applications. MAC mechanism is used                      Fig.1 the Hidden Terminal
in Bluetooth personal area networks to employ a
                                                                                   Problem
master-slave. On the other hand, contention-based
schemes are more suitable for periodic data transfer          CSMA carries sensing techniques but the
on mobile networks due to the arbitrary and                   MACA(Multiple Access With Collision Avoidance)
impermanent nature of the topologies. Wi-Fi local             protocol does not carries sensing instead it knows
area networks in their Ad hoc mode employ                     carrier sense is not possible before transmitting, so
contention-based MAC protocols. For medium                    that the collision is may be reduced but not
access, ALOHA and Slotted-ALOHA are the two                   completely eliminated. An RTS (Request-To-Send)
contention-based schemes. When ALOHA has its                  request is sent containing the length of the
frame to send station accesses the medium as soon             transmission. After receiving the RTS, the destination
as possible. Collision will occur if two or more data         part will send a CTS (Clear-To-Send) packet to the
sent to a station at the same. But in Slotted-ALOHA           sender. According to the time announced in CTS, the
access scheme to decrease the collision probability,          range of destination will defer. The length of the data
before beginning to start transmission the station            frame is also mentioned. When the data is long or

                                                                                                                271

                                         All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                             International Journal of Advanced Research in Computer Engineering & Technology
                                                                                  Volume 1, Issue 5, July 2012



have some errors the sending and receiving range of             products are compliant with specification. The
those data will defer, postponed. The station performs          Bluetooth architecture consists of a basic unit called
the collision action even after sending the RTS                 piconet and of scatternets. A piconet is an ad hoc
transmission, the CTS is not received. A binary                 network formed by a master and slaves devices. The
exponential bakeoff is performed by the station to              device can be a master or a slave, but not both at the
resolve collision. MACAW (MACA for Wireless                     same time. The master is the device that establishes
LANs), which adds the acknowledge (ACK) for data                the piconet and the slaves are the other devices that
frames, it accelerates the loss frame recovery,                 belong to the piconet. The master informs the slaves
initiated only in transport level. In Figure 2, station C       the logical addresses to be used, when the slaves can
does not transmit to D even if its transmission will            transmit and for how long and what Frequencies must
not interfere at destination A. All station does not            be used in transmission. Communication is always
send frames within the range of communicating node.             between a master and one or more slaves (point-to-
So, the transmission uses FAMA (Floor Acquisition               point or point-to-multipoint). There is no direct
Multiple Access) protocol sensing used with CTS                 communication between slaves. A piconet is
mechanism.                                                      composed of a master and up to seven active slaves.
                                                                Moreover, there may be up to 255 inactive devices in
                                                                the network, in a low-power state. The maximum
                                                                number of active devices could limit the applicability
                                                                of Bluetooth, but a Bluetooth network can be
                                                                extended by the interconnection of piconets. In this
                                                                case, the network is called a scatternet and the
                                                                piconets are interconnected by bridge nodes. The
                                                                bridge between the piconets can have the role of
                                                                slave in all piconets to which they belong or of
                                                                master in one piconet and slave on the others. A
                                                                bridge cannot be master in more than one piconet,
                                                                because the master is the unit that establishes the
        Fig.2 the Exposed Terminal                              frequencies to be used in communication. Bluetooth
                  Problem                                       uses a Time Division Duplexing (TDD) scheme, with
In Figure 1, depending on the propagation delays, a             a 625 μs slot time. The master begins its transmission
CTS from B to A may have already been received at               in even slots and slaves transmit in odd slots. Frames
A, but not at C. When A starts sending its data frame,          can be one, three or five slots long, depending on the
C has not yet received the CTS, it will                         frame type. M Frames are transmitted over links
simultaneously send a RTS to B. FAMA is able to                 called logical channels between the master and one or
solve these problems by sending the intervals called            more slaves. There are two kinds of links: ACL
inter-frame spaces which increases the propagation              (Asynchronous        Connectionless)      and     SCO
and process the delay of network within the station.            (Synchronous Connection-Oriented). The ACL is a
There is enough time to for transmission within this            point-to-multipoint link between the master and all
amount of time gap. The CSMA/CA (CSMA with                      active slaves of the piconet. There is only one ACL
Collision Avoidance) combines characteristics of                link per piconet.
CSMA, MACA/MACAW, and FAMA. CSMA/CA
senses the medium before transmissions, deploys                 V. SIMULATION OF WIRELESS AD-HOC
RTS/CTS, acknowledges data frames, and uses inter-              NETWORKS
frame spaces to compensate propagation delays. In
that Single Channel Protocol setup reservation for                       One key problem to Wireless Ad Hoc
transmissions and subsequently transmit their data.             networks is foreseeing the variety of possible
Multiple Channel Protocol uses more than one                    situations that can occur. As a result, Modeling and
channel to coordinate session among transmitter and             Simulation using extensive parameter sweeping and
receiver are also referred for more convenience.                what-if analysis becomes an extremely important
                                                                paradigm for use in ad hoc networks. Traditional
                                                                M&S tools include NS2,(and recently NS3), OPNET
IV. BLUETOOTH
                                                                Modeler, and Net Sim. However, these tools focus
        Bluetooth is a wireless technology that is              primarily on the simulation of the entire protocol
being used to deploy personal area networks and                 stack of the system. Although that can be important
adopted as IEEE 802.15.1 standard. Most Bluetooth               in the proof-of-concept implementations of systems,
                                                                the need for a more advanced simulation

                                                                                                                 272

                                           All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                            International Journal of Advanced Research in Computer Engineering & Technology
                                                                                 Volume 1, Issue 5, July 2012



methodology is always there. Agent-based modeling
and simulation offers such a paradigm. Not to be              [3] Z. J. Haas and J. Deng, “Dual busy tone multiple
confused with multi-agent systems and intelligent             access (DBTMA)-A multiple access control scheme
agents, agent-based modeling originated from social           for ad hoc networks,” IEEE Transactions on
sciences, where the goal was to evaluate and view             Communications,
large-scale systems with numerous interacting                 vol. 50, no. 6, pp. 975–985, June 2002.
"AGENT" or components in a wide variety of
random situations to observe global phenomena.                [4] R. O. Baldwin, N. J. D. IV, and S. F. Midkiff, “A
Unlike traditional AI systems with intelligent agents,        real-time medium access control protocol for ad hoc
agent-based modeling is similar to the real world.            wireless local area networks,” ACM SIGMOBILE
Agent-based models are thus effective in modeling             Mobile Computing and Communications Review, vol.
bio-inspired and nature-inspired systems. In these            3, no. 2, pp. 20–27, Apr. 1999.
systems, the basic interactions of the components the
system, also called Complex Adaptive System, are
simple but result in advanced global phenomena such           [6] S. Kumar, V. S. Raghavan, and J. Deng,
as emergence.                                                 “Medium access control protocols for ad hoc wireless
                                                              networks: A survey,” Ad Hoc Networks, vol. 4, no. 3,
VI. CONCLUSION AND FUTURE SCOPE                               pp. 326–358, 2006.

                                                              [7] I. A. Akyildiz and X. Wang, “A survey on
          This Chapter has discussed WSN issues and           wireless mesh networks,” IEEE Communications
example solutions for the MAC layer, routing,
                                                              Magazine, vol. 43, no. 9, pp. S23–S30, Sept. 2005
localization. These solutions are deferent from past
networking solutions was stressed. The future work            [8] G. Pei, M. Gerla, and X. Hong, LANMAR:
of wireless networks become an integral component
                                                              Landmark routing for large scale wireless ad hoc
of the modern communication infrastructure, energy            networks with group mobility. In Proceedings of the
efficiency will be an important design consideration          ACM Symposium on Mobile Ad Hoc Networking
due to the limited battery life of mobile terminals.
                                                              and Computing (MOBIHOC), pages 11-18, 2000.

                                                              [9] K. Xu, M. Gerla, L. Qi, and Y. Shu, “Enhancing
VII. REFERENCES                                               TCP fairness in ad hoc wireless networks using
                                                              neighborhood red,” in Proc. of ACM MOBICOM,
[1] S. Kumar, V. S. Raghavan, and J. Deng,                    San Diego, CA, USA, Sep. 2003, pp. 16–28.
“Medium access control protocols for
ad hoc wireless networks: A survey,” Ad Hoc                   [10] C. L. Fullmer and J. J. Garcia-Luna-Aceves,
Networks, vol. 4, no. 3, pp. 326–358,                         “Floor acquisition multiple access
May 2006.                                                     (FAMA) for packet-radio networks,” in ACM
                                                              SIGCOMM, pp. 262–273, Aug. 1995.
[2] Ian F. Akyildiz, Xudong Wang, Welin Wang
Computer Network, 2005




                                                                                                              273

                                         All Rights Reserved © 2012 IJARCET

More Related Content

What's hot

Design and Performance Evaluation Of Modulation Techniques Suitable For ADSL ...
Design and Performance Evaluation Of Modulation Techniques Suitable For ADSL ...Design and Performance Evaluation Of Modulation Techniques Suitable For ADSL ...
Design and Performance Evaluation Of Modulation Techniques Suitable For ADSL ...Ash Milan
 
Cooperative Communication for a Multiple-Satellite Network
Cooperative Communication for a Multiple-Satellite NetworkCooperative Communication for a Multiple-Satellite Network
Cooperative Communication for a Multiple-Satellite Networkchiragwarty
 
Small form factor cognitive radio implemented via fpga partial reconfiguratio...
Small form factor cognitive radio implemented via fpga partial reconfiguratio...Small form factor cognitive radio implemented via fpga partial reconfiguratio...
Small form factor cognitive radio implemented via fpga partial reconfiguratio...Roberto Uribeetxeberria
 
Matlab Based Decimeter Design Analysis Wimax Appliacation
Matlab Based Decimeter Design Analysis Wimax AppliacationMatlab Based Decimeter Design Analysis Wimax Appliacation
Matlab Based Decimeter Design Analysis Wimax Appliacationiosrjce
 
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...optljjournal
 
A prototyping of software defined radio using qpsk modulation
A prototyping of software defined radio using qpsk modulationA prototyping of software defined radio using qpsk modulation
A prototyping of software defined radio using qpsk modulationIAEME Publication
 
Comparative study of_digital_modulation (1)
Comparative study of_digital_modulation (1)Comparative study of_digital_modulation (1)
Comparative study of_digital_modulation (1)Bindia Kumari
 

What's hot (17)

Design and Performance Evaluation Of Modulation Techniques Suitable For ADSL ...
Design and Performance Evaluation Of Modulation Techniques Suitable For ADSL ...Design and Performance Evaluation Of Modulation Techniques Suitable For ADSL ...
Design and Performance Evaluation Of Modulation Techniques Suitable For ADSL ...
 
38 41
38 4138 41
38 41
 
Cooperative Communication for a Multiple-Satellite Network
Cooperative Communication for a Multiple-Satellite NetworkCooperative Communication for a Multiple-Satellite Network
Cooperative Communication for a Multiple-Satellite Network
 
Y25124127
Y25124127Y25124127
Y25124127
 
Small form factor cognitive radio implemented via fpga partial reconfiguratio...
Small form factor cognitive radio implemented via fpga partial reconfiguratio...Small form factor cognitive radio implemented via fpga partial reconfiguratio...
Small form factor cognitive radio implemented via fpga partial reconfiguratio...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Matlab Based Decimeter Design Analysis Wimax Appliacation
Matlab Based Decimeter Design Analysis Wimax AppliacationMatlab Based Decimeter Design Analysis Wimax Appliacation
Matlab Based Decimeter Design Analysis Wimax Appliacation
 
40120140503001 2-3
40120140503001 2-340120140503001 2-3
40120140503001 2-3
 
Gg2612711275
Gg2612711275Gg2612711275
Gg2612711275
 
Ipmc003 2
Ipmc003 2Ipmc003 2
Ipmc003 2
 
J010234960
J010234960J010234960
J010234960
 
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...
ANALYTICAL PERFORMANCE EVALUATION OF AN LDPC CODED INDOOR OPTICAL WIRELESS CO...
 
Ff34970973
Ff34970973Ff34970973
Ff34970973
 
A prototyping of software defined radio using qpsk modulation
A prototyping of software defined radio using qpsk modulationA prototyping of software defined radio using qpsk modulation
A prototyping of software defined radio using qpsk modulation
 
Comparative study of_digital_modulation (1)
Comparative study of_digital_modulation (1)Comparative study of_digital_modulation (1)
Comparative study of_digital_modulation (1)
 
Gq2411921196
Gq2411921196Gq2411921196
Gq2411921196
 
60 64
60 6460 64
60 64
 

Viewers also liked

E-Learning Patterns as an analysis framwork to foster excellent e-learning
E-Learning Patterns as an analysis framwork to foster excellent e-learningE-Learning Patterns as an analysis framwork to foster excellent e-learning
E-Learning Patterns as an analysis framwork to foster excellent e-learningChristian Kohls
 
Règlement du Concours Amateurs 2009 de PHOTOFr
Règlement du Concours Amateurs 2009 de PHOTOFrRèglement du Concours Amateurs 2009 de PHOTOFr
Règlement du Concours Amateurs 2009 de PHOTOFrPHOTO.fr
 
Kinaaa
KinaaaKinaaa
Kinaaakto351
 
Calendarioeventosregionales2009
Calendarioeventosregionales2009Calendarioeventosregionales2009
Calendarioeventosregionales2009lizye
 

Viewers also liked (7)

E-Learning Patterns as an analysis framwork to foster excellent e-learning
E-Learning Patterns as an analysis framwork to foster excellent e-learningE-Learning Patterns as an analysis framwork to foster excellent e-learning
E-Learning Patterns as an analysis framwork to foster excellent e-learning
 
319 325
319 325319 325
319 325
 
252 256
252 256252 256
252 256
 
Règlement du Concours Amateurs 2009 de PHOTOFr
Règlement du Concours Amateurs 2009 de PHOTOFrRèglement du Concours Amateurs 2009 de PHOTOFr
Règlement du Concours Amateurs 2009 de PHOTOFr
 
Kinaaa
KinaaaKinaaa
Kinaaa
 
Calendarioeventosregionales2009
Calendarioeventosregionales2009Calendarioeventosregionales2009
Calendarioeventosregionales2009
 
Prague NRN Presentations
Prague NRN PresentationsPrague NRN Presentations
Prague NRN Presentations
 

Similar to 270 273

Introductory Approach on Ad-hoc Networks and its Paradigms
Introductory Approach on Ad-hoc Networks and its Paradigms Introductory Approach on Ad-hoc Networks and its Paradigms
Introductory Approach on Ad-hoc Networks and its Paradigms IJORCS
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkSanjeev Kumar Jaiswal
 
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...ijsrd.com
 
Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networkschris zlatis
 
WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSnanocdac
 
ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.Mangesh Vasu
 
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...IJEEE
 
EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK
EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK
EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK IJORCS
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
Survey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering TechniquesSurvey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering TechniquesIJMER
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 
207088 633815660985047486
207088 633815660985047486207088 633815660985047486
207088 633815660985047486Sathish Pilla
 

Similar to 270 273 (20)

Mobile adhoc networks
Mobile adhoc networksMobile adhoc networks
Mobile adhoc networks
 
Introductory Approach on Ad-hoc Networks and its Paradigms
Introductory Approach on Ad-hoc Networks and its Paradigms Introductory Approach on Ad-hoc Networks and its Paradigms
Introductory Approach on Ad-hoc Networks and its Paradigms
 
H010524049
H010524049H010524049
H010524049
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
36 40
36 4036 40
36 40
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-network
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
 
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...
 
Wireless Mesh Networks
Wireless Mesh NetworksWireless Mesh Networks
Wireless Mesh Networks
 
Aj32242252
Aj32242252Aj32242252
Aj32242252
 
WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKS
 
ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.
 
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
 
EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK
EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK
EFFICIENT REAL-TIME VIDEO TRANSMISSION IN WIRELESS MESH NETWORK
 
01306496
0130649601306496
01306496
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Survey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering TechniquesSurvey of Routing Scheme in MANET with Clustering Techniques
Survey of Routing Scheme in MANET with Clustering Techniques
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
207088 633815660985047486
207088 633815660985047486207088 633815660985047486
207088 633815660985047486
 

More from Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

More from Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Recently uploaded

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

270 273

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 A SURVEY ON AD-HOC IN WIRELESS SENSOR NETWORKS KARTHIKA.M Research scholar, Department of Computer Science, NGM College, Pollachi, India. Email:krth.1001@gmail.com DR.R.MANICKA CHEZIAN Assistant Professor, Department of Computer Science, NGM College, Pollachi, India. Abstract - This paper says the performance of wireless places, in congested areas easily. Quite a lot of ad hoc network. A wireless network has several types in protocols can be anticipated to work with even it. For more expedient usage in the wireless trait ad hoc difficult challenges of ad hoc network. Minimal network is introduced. Ad-hoc network is a collection of configuration and speedy deployment make Ad hoc mobile wireless nodes forming a network without any networks suitable for emergency situations like centralized administration. Ad-hoc network consist of natural disasters or military conflicts. In an ad hoc self organizing feature with low bandwidth. An ad hoc network forwarding the packets mobile network doesn't rely on preexisting feature. Minimal communication is used.. Wireless Ad hoc networks configuration and speedy deployment make ad hoc can be classified by their application: Wireless Mesh networks suitable for emergency situations like natural Networks (WMN), Mobile Ad-Hoc Networks disasters or military conflicts. The dynamic and (MANET), and Wireless Sensor Networks (WSN). adaptive characteristic made the routing protocols The importance of sensor networks is highlighted by enables ad-hoc networks to be formed quickly. This their multiple usages. Wireless networks are used paper also presents an overview of issues related to according to the Medium Access Control (MAC), and transport in on-demand basis. wireless ad hoc networks routing techniques proposed II. TYPES OF WIRELESS NETWORKS to improve the performance of protocols. A. WIRELESS MESH NETWORKS Key Terms: Wireless network, Ad-Hoc network, A WMN is dynamically self-organized and Wireless Mesh Networks, Wireless Sensor Networks. Self-configured. The gateway/bridge functionalities in mesh routers enable the integration of WMNs with I. INTRODUCTION various existing wireless networks. . Wireless networks are getting more popular B. MANET because of its effortlessness. Sensory data comes from multiple sensors of different modalities in The term MANET referred as (Mobile Ad distributed locations. Wireless networks are being hoc Network). MANET are connected by wireless more and more used in the communication among links, it is a self-configuring router. The routers can devices of the most varied types and sizes. The change their location and organize itself randomly. wireless Ad hoc network consists of two operating The main issue in modes: Infrastructure mode, Ad hoc mode. MANET is dynamically changing topology in Infrastructure mode is used to connect computers network. Proactive protocols are also used for with wireless network adapters. Ad hoc mode is used convenient usage. to connect wireless clients directly together, without the need for a wireless router or access point. Wireless networks can be arranged even in desert 270 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 C. WIRELES SENSOR NETWORKS must waits for the pre-defined interval of time. Slotted-ALOHA doubled the efficiency of ALOHA; In most wireless Ad hoc networks, the nodes however, it introduced the necessity of compete for way in to shared wireless medium, often synchronization. To minimize the number of collision resulting interference. Using cooperative wireless another access scheme called CSMA was introduced, communications improves immunity to interference which carries sensing before transmitting the data to by having the destination node combine self- be sent. The CSMA senses the medium when sending interference and other- node interference to improve the current data. If the medium is busy, the carrier is decoding of the desired signal. Multiple nodes and sensed, and the station postpones its medium access links are used for an ad-hoc network. Links can be to avoid collision. The medium transmits the data connected or disconnected at any time; a functioning frame only if the medium is idle. After sensing the network must be able to cope with this dynamic medium, depending on the scheme deployed to restructuring, preferably in a way that is timely, attempt a transmission after sensing the medium busy efficient, reliable, robust and scalable. Wireless CSMA can act as non-persistent or p-persistent. networking has witnessed an explosion of interest When the medium from consumers in recent years for its applications in gets idle, the p-persistent CSMA the station transmits mobile and personal communications. Since the with a probability p and a random period of time was network interface is a significant consumer of power, set to another medium access which is non-persistent. considerable research has been devoted to low-power The most famous access scheme for wired networks design of the entire network protocol stack of is a variation of CSMA persistent that detects wireless networks in an effort to enhance energy collisions. This scheme is employed by Ethernet and efficiency. In Ad hoc networks, each node may is called Carrier Sense Multiple Access with communicate directly to each other. Nodes that are Collision Detection. Here, the collision is not not directly connected communicate by forwarding possible if there is a free space. This occurrence is their traffic through intermediate nodes. referred as Hidden Terminal Problem. To represent the own transmission range each station is centered C. MEDIUM ACCESS CONTROL (MAC) with dotted circle. Bluetooth and IEEE 802.11 are the PROTOCOLS technologies which are used mainly for implementing in wireless ad hoc networks. The station A is The important issue for an Ad hoc network transmitting to B. As station C cannot sense the is the design of a suitable Medium Access Control ongoing transmission, it may also transmit to B, (MAC) protocol. The low energy consumption, resulting in a collision at B. scalability, requirements such as quality of service (Qos), are efficiently provided by the MAC protocol. Contention-free and contention based are the classifications of protocols for wireless networks [1].Without contending the medium, the contention free schemes pre-define assignments to allow stations to transmit. In general the contention-free mechanisms are employed to provide bounded end to-end delay and minimum bandwidth, privileging delay sensitive applications. MAC mechanism is used Fig.1 the Hidden Terminal in Bluetooth personal area networks to employ a Problem master-slave. On the other hand, contention-based schemes are more suitable for periodic data transfer CSMA carries sensing techniques but the on mobile networks due to the arbitrary and MACA(Multiple Access With Collision Avoidance) impermanent nature of the topologies. Wi-Fi local protocol does not carries sensing instead it knows area networks in their Ad hoc mode employ carrier sense is not possible before transmitting, so contention-based MAC protocols. For medium that the collision is may be reduced but not access, ALOHA and Slotted-ALOHA are the two completely eliminated. An RTS (Request-To-Send) contention-based schemes. When ALOHA has its request is sent containing the length of the frame to send station accesses the medium as soon transmission. After receiving the RTS, the destination as possible. Collision will occur if two or more data part will send a CTS (Clear-To-Send) packet to the sent to a station at the same. But in Slotted-ALOHA sender. According to the time announced in CTS, the access scheme to decrease the collision probability, range of destination will defer. The length of the data before beginning to start transmission the station frame is also mentioned. When the data is long or 271 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 have some errors the sending and receiving range of products are compliant with specification. The those data will defer, postponed. The station performs Bluetooth architecture consists of a basic unit called the collision action even after sending the RTS piconet and of scatternets. A piconet is an ad hoc transmission, the CTS is not received. A binary network formed by a master and slaves devices. The exponential bakeoff is performed by the station to device can be a master or a slave, but not both at the resolve collision. MACAW (MACA for Wireless same time. The master is the device that establishes LANs), which adds the acknowledge (ACK) for data the piconet and the slaves are the other devices that frames, it accelerates the loss frame recovery, belong to the piconet. The master informs the slaves initiated only in transport level. In Figure 2, station C the logical addresses to be used, when the slaves can does not transmit to D even if its transmission will transmit and for how long and what Frequencies must not interfere at destination A. All station does not be used in transmission. Communication is always send frames within the range of communicating node. between a master and one or more slaves (point-to- So, the transmission uses FAMA (Floor Acquisition point or point-to-multipoint). There is no direct Multiple Access) protocol sensing used with CTS communication between slaves. A piconet is mechanism. composed of a master and up to seven active slaves. Moreover, there may be up to 255 inactive devices in the network, in a low-power state. The maximum number of active devices could limit the applicability of Bluetooth, but a Bluetooth network can be extended by the interconnection of piconets. In this case, the network is called a scatternet and the piconets are interconnected by bridge nodes. The bridge between the piconets can have the role of slave in all piconets to which they belong or of master in one piconet and slave on the others. A bridge cannot be master in more than one piconet, because the master is the unit that establishes the Fig.2 the Exposed Terminal frequencies to be used in communication. Bluetooth Problem uses a Time Division Duplexing (TDD) scheme, with In Figure 1, depending on the propagation delays, a a 625 μs slot time. The master begins its transmission CTS from B to A may have already been received at in even slots and slaves transmit in odd slots. Frames A, but not at C. When A starts sending its data frame, can be one, three or five slots long, depending on the C has not yet received the CTS, it will frame type. M Frames are transmitted over links simultaneously send a RTS to B. FAMA is able to called logical channels between the master and one or solve these problems by sending the intervals called more slaves. There are two kinds of links: ACL inter-frame spaces which increases the propagation (Asynchronous Connectionless) and SCO and process the delay of network within the station. (Synchronous Connection-Oriented). The ACL is a There is enough time to for transmission within this point-to-multipoint link between the master and all amount of time gap. The CSMA/CA (CSMA with active slaves of the piconet. There is only one ACL Collision Avoidance) combines characteristics of link per piconet. CSMA, MACA/MACAW, and FAMA. CSMA/CA senses the medium before transmissions, deploys V. SIMULATION OF WIRELESS AD-HOC RTS/CTS, acknowledges data frames, and uses inter- NETWORKS frame spaces to compensate propagation delays. In that Single Channel Protocol setup reservation for One key problem to Wireless Ad Hoc transmissions and subsequently transmit their data. networks is foreseeing the variety of possible Multiple Channel Protocol uses more than one situations that can occur. As a result, Modeling and channel to coordinate session among transmitter and Simulation using extensive parameter sweeping and receiver are also referred for more convenience. what-if analysis becomes an extremely important paradigm for use in ad hoc networks. Traditional M&S tools include NS2,(and recently NS3), OPNET IV. BLUETOOTH Modeler, and Net Sim. However, these tools focus Bluetooth is a wireless technology that is primarily on the simulation of the entire protocol being used to deploy personal area networks and stack of the system. Although that can be important adopted as IEEE 802.15.1 standard. Most Bluetooth in the proof-of-concept implementations of systems, the need for a more advanced simulation 272 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 methodology is always there. Agent-based modeling and simulation offers such a paradigm. Not to be [3] Z. J. Haas and J. Deng, “Dual busy tone multiple confused with multi-agent systems and intelligent access (DBTMA)-A multiple access control scheme agents, agent-based modeling originated from social for ad hoc networks,” IEEE Transactions on sciences, where the goal was to evaluate and view Communications, large-scale systems with numerous interacting vol. 50, no. 6, pp. 975–985, June 2002. "AGENT" or components in a wide variety of random situations to observe global phenomena. [4] R. O. Baldwin, N. J. D. IV, and S. F. Midkiff, “A Unlike traditional AI systems with intelligent agents, real-time medium access control protocol for ad hoc agent-based modeling is similar to the real world. wireless local area networks,” ACM SIGMOBILE Agent-based models are thus effective in modeling Mobile Computing and Communications Review, vol. bio-inspired and nature-inspired systems. In these 3, no. 2, pp. 20–27, Apr. 1999. systems, the basic interactions of the components the system, also called Complex Adaptive System, are simple but result in advanced global phenomena such [6] S. Kumar, V. S. Raghavan, and J. Deng, as emergence. “Medium access control protocols for ad hoc wireless networks: A survey,” Ad Hoc Networks, vol. 4, no. 3, VI. CONCLUSION AND FUTURE SCOPE pp. 326–358, 2006. [7] I. A. Akyildiz and X. Wang, “A survey on This Chapter has discussed WSN issues and wireless mesh networks,” IEEE Communications example solutions for the MAC layer, routing, Magazine, vol. 43, no. 9, pp. S23–S30, Sept. 2005 localization. These solutions are deferent from past networking solutions was stressed. The future work [8] G. Pei, M. Gerla, and X. Hong, LANMAR: of wireless networks become an integral component Landmark routing for large scale wireless ad hoc of the modern communication infrastructure, energy networks with group mobility. In Proceedings of the efficiency will be an important design consideration ACM Symposium on Mobile Ad Hoc Networking due to the limited battery life of mobile terminals. and Computing (MOBIHOC), pages 11-18, 2000. [9] K. Xu, M. Gerla, L. Qi, and Y. Shu, “Enhancing VII. REFERENCES TCP fairness in ad hoc wireless networks using neighborhood red,” in Proc. of ACM MOBICOM, [1] S. Kumar, V. S. Raghavan, and J. Deng, San Diego, CA, USA, Sep. 2003, pp. 16–28. “Medium access control protocols for ad hoc wireless networks: A survey,” Ad Hoc [10] C. L. Fullmer and J. J. Garcia-Luna-Aceves, Networks, vol. 4, no. 3, pp. 326–358, “Floor acquisition multiple access May 2006. (FAMA) for packet-radio networks,” in ACM SIGCOMM, pp. 262–273, Aug. 1995. [2] Ian F. Akyildiz, Xudong Wang, Welin Wang Computer Network, 2005 273 All Rights Reserved © 2012 IJARCET